Permissionless Consensus Secured in the Standard Model via Complexity Theory
Foundational security for decentralized systems is achieved by grounding Proof-of-Work in fine-grained complexity, moving beyond idealized models.
New ZK Protocols Achieve Optimal Linear Prover Time and Distributed Proof Generation
Cryptographers introduced new zero-knowledge protocols that achieve optimal linear-time prover complexity and enable fully distributed proof generation, accelerating ZKP adoption for scalable privacy.
ZK Proof of Training Secures Private Federated Learning Consensus
ZKPoT uses zk-SNARKs to verify model contributions without revealing data, solving the privacy-efficiency trade-off for decentralized AI.
Plonky2 Proves SHA-256 Integrity for Scalable Zero-Knowledge Blockchains
A new Plonky2-based methodology efficiently generates zero-knowledge proofs for SHA-256, solving a core computational integrity bottleneck for scaling ZK-Rollups.
Linear Prover Time ZK Proofs Unlock Universal Verifiable Computation
A new argument system achieves linear-time proof generation with succinct proof size, eliminating the primary computational bottleneck for ZK-rollups and verifiable computation.
Sublinear Prover Memory Unlocks Universal Zero-Knowledge Computation and Decentralization
Reframing ZKP generation as a tree evaluation problem cuts prover memory from linear to square-root complexity, enabling ubiquitous verifiable computation.
Recursive Zero-Knowledge Proofs Unlock Verifiable Private Computation Scaling
zkAdHoc introduces recursive proof aggregation to generate a constant-size proof for arbitrarily complex computation, enabling scalable on-chain verification.
Recursive Proof Composition Achieves Logarithmic-Time Zero-Knowledge Verification
A novel folding scheme reduces the verification of long computations to a logarithmic function, fundamentally decoupling security from computational scale.
Linear-Time Zero-Knowledge Provers Unlock Universal Verifiable Computation
A linear-time ZKP prover mechanism achieves optimal computational efficiency, fundamentally enabling scalable, trustless verification for all decentralized applications.
