Sublinear Memory ZK Proofs Democratize Verifiable Computation
A new space-efficient tree algorithm reduces ZK proof memory complexity from linear to square-root, enabling verifiable computation on all devices.
Mechanism Design Characterizes Decentralized Verifiable Computation Incentives
This research fundamentally characterizes incentive mechanisms for verifiable computation, balancing decentralization against execution efficiency in strategic environments.
Zero-Knowledge Proof of Training Secures Decentralized Federated Learning Consensus
ZKPoT uses zk-SNARKs to verify decentralized model accuracy without revealing private data, solving the efficiency-privacy trade-off in federated learning.
Zero-Knowledge Proof of Training Secures Private Decentralized Federated Learning
ZKPoT consensus verifiably proves model contribution quality via zk-SNARKs, fundamentally securing private, scalable decentralized AI.
Sublinear Prover Memory Unlocks Decentralized Verifiable Computation and Privacy Scale
New sublinear-space prover reduces ZKP memory from linear to square-root complexity, enabling ubiquitous on-device verifiable computation and privacy.
Goldwasser-Kalai-Rothblum Protocol Turbocharges Verifiable Computation Efficiency
A new proof system architecture uses the sumcheck protocol to commit only to inputs and outputs, achieving logarithmic verification time for layered computations, drastically scaling ZK-EVMs.
Modular Proofs and Verifiable Evaluation Scheme Unlock Composable Computation
The Verifiable Evaluation Scheme enables chaining proofs for sequential operations, resolving the trade-off between custom efficiency and general-purpose composability.
Fractal Commitments Enable Universal Logarithmic-Size Verifiable Computation
This new fractal commitment scheme recursively compresses polynomial proofs, achieving truly logarithmic verification costs for universal computation without a trusted setup.
Sublinear Zero-Knowledge Proofs Democratize Verifiable Computation on Constrained Devices
A novel proof system reduces ZKP memory from linear to square-root scaling, fundamentally unlocking privacy-preserving computation for all mobile and edge devices.
