<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>DLT</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Privacy-Preserving Multi-Objective Optimization using Bellman-Ford Algorithm via Zero-Knowledge Proofs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Goshgar C. Ismayilov</string-name>
          <email>goshgar.ismayilov@boun.edu.tr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Can Ozturan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Bogazici University</institution>
          ,
          <addr-line>Istanbul</addr-line>
          ,
          <country country="TR">Turkey</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>7</volume>
      <fpage>12</fpage>
      <lpage>14</lpage>
      <abstract>
        <p>Multi-objective optimization has been extensively used to eficiently solve real-world problems. In this work, we address privacy-preserving multi-objective optimization of non-fungible token bartering problem with the consideration of two conflicting objectives as: (i) the maximization of the number of bids satisfied and (ii) the maximization of the budget after the bids costs are paid. To solve this problem, we propose a novel multiobjective approach (i.e. zkMOBF - Z ero K nowledge-based Multi-Objective Bellman-Ford) utilizing zero-knowledge proofs to preserve the privacy of these bids. Our approach takes the global bid graph as input and extracts optimized bartering solution(s) through four phases. Publicly-verifiable proof of this approach is generated of-chain and later verified on-chain on Ethereum Sepolia test network. In our empirical study, we measure proof generation/verification times, proof artifact sizes and blockchain gas consumption for three bartering scenarios. The work justifies the validity and the applicability of our approach.</p>
      </abstract>
      <kwd-group>
        <kwd>blockchain</kwd>
        <kwd>zero-knowledge proof</kwd>
        <kwd>privacy</kwd>
        <kwd>multi-objective optimization</kwd>
        <kwd>bartering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Multi-objective optimization refers to a specific group of problems that involve the minimization or
maximization of multiple objectives simultaneously [1]. Multi-objective modelings of real-world problems
may ofer certain benefits over their single-objective counterparts by allowing for the consideration
of trade-ofs. For instance, single-objective modelings may neglect significant objectives while trying
to push the limit of only one objective (e.g. neglecting cost to minimize time) where it may lead to
practically infeasible solutions (e.g. too high cost to pay). In the literature, there exist many works that
adopt multi-objective techniques [2, 3, 4]. Therefore, we model a multi-objective bartering with two
conflicting objectives in this work as the maximization of number of bids satisfied and maximization of
the budget after bid costs are paid. The cost of a bid may result from the urgency to satisfy it where an
urgent bid is associated with a lower cost.</p>
      <p>In certain scenarios, privacy concerns may arise in real-world multi-objective optimization while
processing confidential user data (e.g. recommendation systems on mobile user data [ 5]). In this context,
we define privacy-preserving variant of multi-objective optimization as a more specific group of
problems with multiple objectives, which ensures the confidentiality of certain data during computation.
There also exist works that address the notion of privacy-preservation on blockchain, especially for
federated learning [6]. However, to the best of our knowledge, there exists no work that considers
both privacy-preservation and multi-objective optimization on blockchains in the literature. In this
work, we propose a multi-objective approach for token bartering by preserving the privacy of bids via
zero-knowledge proofs and deploying the corresponding contract on blockchain for proof verification.</p>
      <p>The main contributions of our work can be enumerated as follows:
• We address privacy-preserving multi-objective optimization of our token bartering problem which
involves performing a publicly-verifiable computation on the private bids to find an optimal</p>
      <p>CEUR
Workshop</p>
      <p>ISSN1613-0073</p>
      <p>bartering solution by considering multiple objectives.
• We propose a novel privacy-preserving approach (i.e. zkMOBF ) with four phases: (i) detecting
cycles in bid graph with the Bellman-Ford algorithm, (ii) evaluating these cycles (i.e. solutions) for
two conflicting objectives, (iii) ranking the feasible solutions with
pareto-domination to find the
non-dominated solutions and (iv) applying a utility function over the non-dominated solutions to
determine the final solution. To the best of our knowledge, this is the first work that introduces
novelty of solving a multi-objective problem on zero-knowledge proof in the literature.
• We perform experiments over three scenarios (i.e. small, medium and large) with respect to the
number of bids to measure (i) proof generation and verification times, (ii) proof artifact size (e.g.
size of proof circuit) and (iii) blockchain gas consumption for contract deployment. This study
justifies the applicability of our protocol.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Privacy-Preserving Multi-Objective Bartering Problem</title>
      <p>
        Privacy-preserving multi-objective bartering problem refers to a secure optimization problem which
aims to find the best token bartering solution(s) with respect to the available bids and by considering
several conflicting objectives at the same time. In the scope of the problem, we define the set of bidders
 as:
where   represents the  th bidder while  is the total number of bidders. We also define the set of
non-fungible tokens (e.g. NFTs) as:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )

 = { 0,  1, … ,   , … ,   −1 }
 = { 0,  1, ....,   , ...,  −1 }
  ∶ ⟨ −, 
+, 
 ⟩

.  (
      </p>
      <p>) = { 1(  ),  2(  )}
 1(  ) =

..</p>
      <p>∑  − ⋅   ≥
∑  + ⋅  
where   represents the  th token while  is the total number of tokens. Each bidder   is associated
with a bid   as:
also assume that each bidder   can propose one bid   at most at a time.
where  − ∈  is the token to be supplied,  + ∈  is the token to be demanded and  
the bid   while Φ is the set of all bids. The problem is a single-token single-instance bartering problem
where bidders can supply and demand at most one instance of one token (| −| = | +| = 1). Here, we
is the cost of</p>
      <p>
        The multi-objective modeling of this problem evaluates the set of feasible solutions with several
objectives simultaneously by mapping each solution   ∶ ⟨ 0 ,  1 , … ,   , … ,  , −1 ⟩ and   ∈ {0, 1} from
the decision space to a point in the objective space:
where Equation (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) refers to the multi-objective optimization of two objectives where Equation (
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
defines the first objective as the maximization of the number of total bids included in the solution
while Equation (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) defines the second objective as the maximization of the fixed total budget value
(which is globally shared among bidders) left after the costs of the bids included are covered. Finally,
the constraint in Equation (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) implies that the total number of tokens supplied must be at least equal to
or greater than the total number of tokens demanded in the solution. A solution   is considered as
feasible if it satisfies this condition. Furthermore, each solution is assumed to have only a single simple
cycle. In the problem definition, there is no explicit supply constraint since we assume that the bidders
already have suficient balances to propose bids.
      </p>
      <p>
        We present a simple bartering scenario in Fig. (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) where there exist six bids at total as
{ 0,  1,  2,  3,  4,  5} for five diferent tokens { 1,  2,  3,  4,  5}. Out of these bids, it is possible to
construct a bid graph where the tokens are the nodes and the bids are the edges. For instance, the bid  3
connects the third node (i.e. source node)  3 to the fourth node (i.e. target node)  4. In the bid graph,
there are two diferent cycles (i.e. bartering solutions) as  0,  1 ∈  where  0 and  1 are shown in blue
and red, respectively while  is the set of feasible solutions. The first objective  1 of  0 is the number
of bids satisfied as 3 while the second objective  2 is the budget left as 10 − (1 + 1 + 1) = 7 where the
total budget is taken as 10. We can compute the objectives of  1 in similar fashion. These two solutions
can be represented as points (e.g. blue and red points) in the objective space of ( 1,  2). The resulting
objective space shows that  0 is non-dominated by outperforming  1 at every objective (i.e. maximizing
the objectives more). The set of all such non-dominated solutions forms the pareto-optimal set,   [1].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. The zkMOBF Approach</title>
      <p>
        In this section, we propose the zkMOBF approach with four phases as: (i) detecting cycles on bid graph
with the Bellman-Ford algorithm, (ii) evaluating feasible cycles (i.e. solutions) with the objectives, (iii)
ranking solutions with pareto-domination and (iv) decision-making with utility function for the final
solution. This approach is: (i) privacy-preserving since it protects the privacy of bids throughout the
calculations, (ii) multi-objective since it considers the optimization of two objectives at the same time, (iii)
publicly-verifiable since the of-chain proof generation for the calculations can be verified in blockchain,
(iv) non-interactive since it does not require communication during proof generation or verification.
We present where zkMOBF is positioned to solve the privacy-preserving multi-objective bartering
problem in Fig. (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) where (i) we assume that barterers propose their bids through their corresponding
commitments in the first stage, (ii) they all individually apply our proposed approach to arrive the same
bartering solution in the second stage and (iii) they individually apply the solution to exchange tokens
in the third stage. Barterers must find the same solution since they run the same deterministic proof
circuit over the same inputs. In this paper, we specifically address the challenges of the second stage.
Refer to the following work [7] for a potential solution to the first stage.
      </p>
      <sec id="sec-3-1">
        <title>3.1. Detecting Cycles with Bellman-Ford Algorithm</title>
        <p>
          The bids of the bidders constitute the global bid graph altogether. The constraint given in Equation (
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
implicitly limits the valid bartering solutions over this graph to be complete cycles. More intuitively,
the token demanded in the last bid in the cycle must be supplied from the first bid in the same cycle.
This lets us to use a cycle detection algorithm (i.e. Bellman-Ford) to find the cycles available in the
1: def zkMOBF(private bids Φ):
2: Find cycles (i.e. solutions   ) from bids Φ with Bellman-Ford algorithm
3: for each solution   do
4: Add   to set of feasible solutions  as:  ←  ∪  
5: Evaluate   with the first objective  1 as:  1(  )
6: Evaluate   with the second objective  2 as:  2(  )
7: for each solution   ∈  do
8: for each solution  ′ ∈  that is   ≠  ′ do
9: Compare   and  ′ through pareto-domination
10: Add   to pareto-optimal set   if it is non-dominated
11: for each solution   ∈   do
12: Apply utility function over   to compute the final score
13: if   has better score than the best score then
14: Select   as the best solution as  ∗
15: return the best solution found  ∗
graph. The calculations for this phase correspond to Line 2 in Fig. (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) where it traverses every node in
the graph as start node by setting distances to infinity except the start node itself. Then, it iteratively
relaxes all the edges to find the shortest paths by updating the distances. After its completion, in case it
could not find any further improvement over the distances, it means there is no cycle. Otherwise, it
simply backtracks the previous nodes to construct a complete cycle. This cycle is included into the set
of feasible solutions in Line 4. This can be seen in Fig. (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) where the cycles are highlighted.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Evaluating Feasible Cycles with Objectives</title>
        <p>
          The cycles (i.e. feasible solutions) found in the given global bid graph must be evaluated with respect to
the existing objectives of the multi-objective optimization to find their qualities. We already
mathematically define our two objectives in Equation (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) and Equation (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ). The calculations for this phase
correspond to Lines 5-6 in Fig. (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ). For the first objective, it simply counts the number of the bids
satisfied for every feasible solution. For the second objective, it sums the costs of the bids and later
subtracts the total cost from the available budget for every feasible solution. This phase is especially
important to transform the solutions (as collection of decision variables) in the decision space to the
points in the objective space. This transformation can be seen in Fig. (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ).
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Ranking Solutions with Non-Dominated Sorting</title>
        <p>
          In single-objective optimization, the solutions can be ranked by simply sorting their values on that
objective ascendingly or descendingly with respect to the type of the problem (i.e. minimization or
maximization). However, multi-objective optimization requires a more sophisticated ranking mechanism
where we apply pareto-domination in this work. This technique is based on pairwise solution comparison
where a solution  1 dominates another solution  2 in case  1 is no worse than  2 for all the objectives
and  1 is strictly better than  2 in at least one objective,  2 ≺  1. More formally:
∀   ( 2) ≤   ( 1) ∧ ∃   ( 2) &lt;   ( 1)
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
where  1 is a non-dominated solution. The calculations for this phase correspond to Lines 7-10 in Fig. (
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
where it compares every solution   with all the other feasible solutions and marks   as non-dominated
if there is not another solution that dominates   . The set of all non-dominated solutions constitutes
  in Line 10. This can be seen in Fig. (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) where the blue solutions are non-dominated.
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Decision-Making for Final Solution with Utility Function</title>
        <p>
          In our work, the third phase generates a pareto-optimal set (i.e. POS) that consists of only the
nondominated solutions by cleansing the useless solutions for our problem. The selection of the final
solution to be applied over the bids from this set requires an additional phase. For this phase, we
incorporate a utility function  that represents a group of probabilities to measure user preferences.
These preferences simply show how important an objective is with respect to the other objective(s).
Since we have two objectives in our problem, we can represent this function as  ∶ ⟨ 1,  2⟩ where  1
and  2 are the probabilities for the first and second objectives, respectively by satisfying the condition
of  1 +  2 = 1. The calculations for this phase correspond to Lines 11-14 in Fig. (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) where it applies
the preferences over the objectives for every optimal solution. It iterates over all the optimal solutions
to find the single best solution with the best score in Line 14. This is seen in Fig. (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ) where the green
solution is shown as the best.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Study</title>
      <p>We use the ZoKrates framework [8] to implement zkMOBF over zero-knowledge proof. The proof
generations and verifications are performed of-chain on the command line. The smart contracts
corresponding to the proofs are automatically generated by the framework itself and ready to be
deployed on Ethereum Sepolia only for proof verification. During our experiments, we consider three
increasingly-complex graphs as small (with 10 bids), medium (with 30 bids) and large (with 50 bids).
The open-source implementation of zkMOBF is available in our website [9] for further inspection and
experimental reproducibility. The experiments are carried out on MacBook Air with M2 chip, 8 GB
memory and 8 cores.</p>
      <sec id="sec-4-1">
        <title>4.1. Zero-Knowledge Proof Generation/Verification Times</title>
        <p>In this experiment, we measure the proof generation and verification times on the command line with
ten independent runs. The results of the experiment are given in Table 1 for the small, medium and
large bid graphs. From the table, we simply observe that the time to generate proof increases with
the increasing graph complexity (e.g. from 23.67 seconds for small to 188.75 seconds for large). But,
the standard deviations between runs are quite low (e.g. 0.01, 1.2 and 1.8 seconds for small, medium
and large, respectively). On the other hand, we observe that the proof verification remains constant
regardless of the graph complexity. This implies that the proof generation is computationally more
expensive than the proof verification, especially for complex instances. Hence, ZoKrates strategically
moves proof generation out of blockchain to external nodes while still keeping proof verification
on-chain.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Proof Artifact Size</title>
        <p>In this experiment, we measure the size of several proof artifacts including the proof circuit, the proving
key, the verification key and the proof itself. The results of the experiment are given in Table 2 for
the small, medium and large bid graphs. From the table, we observe that the number of constraints
in circuits and the proving key size increase with the increasing graph complexity (e.g. from +1.5M
for small to +8.5M for large in circuits and from 0.63GB for small to 3.78GB for large in proving key).
On the other hand, verification keys and proofs remain constant all the time. This is beneficial for
blockchain applications since verification keys and proofs are processed on-chain while proving keys
are stored of-chain. For the large graph, the proving key is x2.7M larger than the verification key while
the proof is the shortest.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Blockchain Gas Consumption</title>
        <p>In this experiment, we simply deploy the smart contracts that the ZoKrates framework automatically
generates to blockchain. The structures of these contracts for small, medium and large graphs are
basically the same except the verification keys. These keys result from the one-time setup where they
are perfectly matched with their corresponding proving keys. According to our experiments, the smart
contracts need approximately 1,069,149 gas units (i.e. approximately $3.51) to be deployed on Ethereum
Sepolia.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>We address the privacy-preserving multi-objective bartering problem to find optimal bartering solution(s)
to be applied over the bids. It considers two objectives as the maximization of the number of bids and
the maximization of the budget left over. For the problem, we contribute a novel privacy-preserving
approach (i.e. zkMOBF ) on zero-knowledge proof by incorporating the Bellman-Ford algorithm, the
nondominated ranking and the utility function-based decision-making. We evaluate the performance over
three bartering scenarios with increasing complexity to measure proof generation times, proof artifact
size and blockchain gas consumption. This empirical study indicates the validity and applicability of
the approach. In the future, we also plan to construct solutions as union of cycles.
During the preparation of this work, the author(s) used ChatGPT in order to: Grammar and spelling
check, Peer review simulation. After using this tool/service, the author(s) reviewed and edited the
content as needed and take(s) full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Branke</surname>
          </string-name>
          ,
          <article-title>Multiobjective optimization: Interactive and evolutionary approaches</article-title>
          , volume
          <volume>5252</volume>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>Science</given-names>
          </string-name>
          &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.</surname>
          </string-name>
          <article-title>Zhang, Multi-objective gate allocation problem based on multi-commodity network flow model</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <fpage>9849</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Khezri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Khodayifar</surname>
          </string-name>
          ,
          <article-title>Joint chance-constrained multi-objective multi-commodity minimum cost network flow problem with copula theory</article-title>
          ,
          <source>Computers &amp; Operations Research</source>
          <volume>156</volume>
          (
          <year>2023</year>
          )
          <fpage>106260</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ismayilov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. R.</given-names>
            <surname>Topcuoglu</surname>
          </string-name>
          ,
          <article-title>Dynamic multi-objective workflow scheduling for cloud computing based on evolutionary algorithms</article-title>
          , in: 2018 IEEE/ACM International Conference on Utility and
          <article-title>Cloud Computing Companion (UCC Companion)</article-title>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>103</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <article-title>A privacy-preserving recommendation method based on multi-objective optimisation for mobile users</article-title>
          ,
          <source>International Journal of Bio-Inspired Computation</source>
          <volume>16</volume>
          (
          <year>2020</year>
          )
          <fpage>23</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Heiss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Grünewald</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Haimerl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schulte</surname>
          </string-name>
          ,
          <article-title>Advancing blockchain-based federated learning through verifiable of-chain computations</article-title>
          ,
          <source>in: 2022 IEEE international conference on blockchain (Blockchain)</source>
          , IEEE,
          <year>2022</year>
          , pp.
          <fpage>194</fpage>
          -
          <lpage>201</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Ismayilov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Özturan</surname>
          </string-name>
          ,
          <article-title>Trustless privacy-preserving data aggregation on ethereum with hypercube network topology</article-title>
          ,
          <source>Computer Communications</source>
          <volume>230</volume>
          (
          <year>2025</year>
          )
          <fpage>108009</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Eberhardt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tai</surname>
          </string-name>
          ,
          <article-title>Zokrates-scalable privacy-preserving of-chain computations</article-title>
          ,
          <source>in: 2018 IEEE International Conference on Internet of Things (iThings)</source>
          and
          <article-title>IEEE Green Computing and Communications (GreenCom) and</article-title>
          IEEE Cyber,
          <article-title>Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)</article-title>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>1084</fpage>
          -
          <lpage>1091</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9] zkMOBF, zkmobf github page,
          <year>2025</year>
          . URL: https://github.com/GoshgarIsmayilov/zkMOBF.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>