Scalable Zero-Knowledge Proofs for Machine Learning Fairness
Researchers developed FAIRZK, a novel system that uses zero-knowledge proofs and new fairness bounds to efficiently verify machine learning model fairness without revealing sensitive data, enabling scalable and confidential algorithmic auditing.
Fully Homomorphic Encryption Enables Confidential Computation for Smart Contracts
This research introduces a protocol for confidential smart contracts, leveraging Fully Homomorphic Encryption to process encrypted data on-chain, securing sensitive information in decentralized applications.
Dstack: Zero Trust Framework for Confidential Web3 Containers
A novel framework integrates Trusted Execution Environments with blockchain governance, enabling verifiable, portable, and censorship-resistant confidential computing for decentralized applications.
Microsecond TFHE Bootstrapping Accelerates Confidential Blockchain Computation
Zama achieved microsecond TFHE bootstrapping on GPU, enabling practical confidential computation and accelerating FHE adoption in blockchain applications.
Fully Homomorphic Encryption: Unlocking Ubiquitous Confidentiality for Blockchain Transactions
This research leverages Fully Homomorphic Encryption to enable on-chain computation over encrypted data, fundamentally transforming blockchain transparency into pervasive confidentiality.
Hardware-Backed Trust Enhances Blockchain Privacy and Scalability
Trusted Execution Environments introduce hardware-level isolation for confidential computation, fundamentally expanding blockchain's capacity for privacy and off-chain scalability.
Succinct One-Sided Private Set Intersection for Confidential Data Matching
This research introduces a novel cryptographic primitive enabling private set intersection where one party learns the common elements succinctly, without revealing their own set.
In-Memory PIR Architecture Revolutionizes Private Data Query Performance
IM-PIR leverages Processing-in-Memory to overcome data bandwidth limitations, enabling practical, high-throughput private information retrieval.
Fully Homomorphic Encryption Unlocks Ubiquitous Confidential Smart Contracts On-Chain
The Zama Protocol introduces a novel cross-chain confidentiality layer, leveraging Fully Homomorphic Encryption to enable smart contracts to process encrypted data without decryption, fostering ubiquitous on-chain privacy.
