Page 407 - 《软件学报》2025年第8期
P. 407
3830 软件学报 2025 年第 36 卷第 8 期
[18] libsnark. 2023. https://github.com/scipr-lab/libsnark
[19] Ames S, Hazay C, Ishai Y, Venkitasubramaniam M. Ligero: Lightweight sublinear arguments without a trusted setup. In: Proc. of the
2017 ACM Sigsac Conf. on Computer and Communications Security. Dallas: ACM, 2017. 2087–2104. [doi: 10.1145/3133956.3134104]
[20] Ben-Sasson E, Bentov I, Horesh Y, Riabzev M. Scalable, transparent, and post-quantum secure computational integrity. Cryptology
ePrint Archive, 2018. 046. https://eprint.iacr.org/2018/46
[21] Setty S. Spartan: Efficient and general-purpose zkSNARKs without trusted setup. In: Proc. of the 40th Annual Int’l Cryptology Conf. on
Advances in Cryptology. Santa Barbara: Springer, 2020. 704–737. [doi: 10.1007/978-3-030-56877-1_25]
[22] Wahby R S, Tzialla I, Shelat A, Thaler J, Walfish M. Doubly-efficient zkSNARKs without trusted setup. In: Proc. of the 2018 IEEE
Symp. on Security and Privacy (SP). San Francisco: IEEE, 2018. 926–943. [doi: 10.1109/SP.2018.00060]
[23] Wang XD, Hirsch C, Kang S, Lacor C. Multi-objective optimization of turbomachinery using improved NSGA-II and approximation
model. Computer Methods in Applied Mechanics and Engineering, 2011, 200(9–12): 883–895. [doi: 10.1016/j.cma.2010.11.014]
[24] Yusoff Y, Ngadiman MS, Zain AM. Overview of NSGA-II for optimizing machining process parameters. Procedia Engineering, 2011,
15: 3978–3983. [doi: 10.1016/j.proeng.2011.08.745]
[25] Zheng WJ, Liu YF, Doerr B. A first mathematical runtime analysis of the non-dominated sorting genetic algorithm II (NSGA-II). In:
Proc. of the 2022 AAAI Conf. on Artificial Intelligence. Palo Alto: AAAI, 2022. 10408–10416. [doi: 10.1609/aaai.v36i9.21283]
[26] Bünz B, Bootle J, Boneh D, Poelstra A, Wuille P, Maxwell G. Bulletproofs: Short proofs for confidential transactions and more. In: Proc.
of the 2018 IEEE Symp. on Security and Privacy (SP). San Francisco: IEEE, 2018. 315–334. [doi: 10.1109/SP.2018.00020]
[27] Ben-Sasson E, Chiesa A, Riabzev M, Spooner N, Virza M, Ward NP. Aurora: Transparent succinct arguments for R1CS. In: Proc. of the
38th Annual Int’l Conf. on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. Darmstadt: Springer,
2019. 103–128. [doi: 10.1007/978-3-030-17653-2_4]
张子龙(2000-), 男, 博士生, 主要研究领域为区 蒋硕轩(1999-), 男, 硕士, 主要研究领域为区块
块链, 数字货币. 链, 数字货币.
贾林鹏(1995-), 男, 博士, 助理研究员, CCF 专 孙毅(1979-), 男, 博士, 研究员, 博士生导师,
业会员, 主要研究领域为区块链高通量技术. CCF 杰出会员, 主要研究领域为区块链, 社交
视频.

