Blockchain Privacy and Searchable Encryption

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

Flashcards covering Zero Knowledge Proofs (ZK-SNARKs, ZK-STARKs, Zcash) and Searchable Encryption (SSE, PEKS, and related security attacks).

Last updated 12:06 AM on 5/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

24 Terms

1
New cards

Blockchain

A decentralized ledger spread over networks to allow transactions over different computers; it is immutable and allows transactions over multiple processes.

2
New cards

Zero Knowledge Proof (ZKP)

A protocol where a prover sends a proof to a verifier to verify information while hiding specific inputs and amounts from other sources.

3
New cards

Completeness

A property of ZKPs where if the prover has made a true statement, it will be accepted by both parties.

4
New cards

Soundness

A property of ZKPs where if a statement is false, no cheating prover can prove it correct to the verifier.

5
New cards

Zero Knowledge (Property)

The requirement that the verifier learns nothing except the fact that the statement is true, without gaining access to the prover's inputs.

6
New cards

ZK-SNARKs

An acronym for Zero Knowledge Succinct Non-Interactive Argument of Knowledge.

7
New cards

Succinct

A characteristic of ZK-SNARKs meaning they use very few computations and are very fast to verify.

8
New cards

Non-interactive Argument

The ability in ZK-SNARKs to send only one proof instead of multiple rounds of communication to reduce time and execution costs.

9
New cards

QAP (Quadratic Arithmetic Program)

A format that contains mathematical computations converted from an algorithm, used to generate proofs in the SNARKs process.

10
New cards

Common Reference String (CRS)

Public parameters generated during a one-time trusted setup used to verify if calculations match the prover's claims.

11
New cards

Groth 16

The version of SNARKs used in Zcash that requires a trusted setup ceremony to generate public parameters.

12
New cards

Trusted Setup Ceremony

A process using multiple coordinators and randomness to generate public parameters while preventing the creation of counterfeit proofs.

13
New cards

Toxic Waste

The secret trapdoor information used to create public parameters in a trusted setup that must be destroyed to ensure system security.

14
New cards

ZK-STARKs

A newer version of zero knowledge proofs that utilizes a transparent setup and is quantum resistant.

15
New cards

Halo

An advanced improvement for zero knowledge proofs used in the Zcash version to address limitations of previous SNARKs.

16
New cards

Searchable Encryption

The ability to perform searches on data held by an untrusted third party without decrypting the data first.

17
New cards

Sequential Scan

An indexing method where one computes down the encrypted document comparing values until a match is found.

18
New cards

Document-based Indexing

An indexing method where keywords are embedded directly into the encrypted file to make searches more efficient.

19
New cards

Keyword-based Index

A method that links keywords to a file's location, increasing search efficiency at the expense of complexity when updating the index.

20
New cards

SSE (Symmetric Searchable Encryption)

A method that uses a cryptographically secure pseudo-random number generator (PRNG) and XORs the output with plain text to produce ciphertext.

21
New cards

PEKS (Public Key Encryption with Keyword Search)

A model where a keyword is encrypted with a public key and the receiver computes a trapdoor with their private key to test against keywords on the server.

22
New cards

Trapdoor

In searchable encryption, an encrypted form of a keyword (similar to a hash) that is sent to a server to perform a search without revealing the plaintext keyword.

23
New cards

Keyword Guessing Attack

A query recovery attack on PEKS where an attacker tests individual encrypted keywords using a captured trapdoor and a public key.

24
New cards

File Injection Attack

A query recovery attack where a malicious server sends emails to itself so that when a client encrypts them, the server can identify which keywords correspond to the queries.