Recursive SNARKs Enable Constant-Size Proofs for Verifiable AI Inference
This framework uses recursive zero-knowledge proofs to achieve constant-size verification for large AI models, securing transparent, private computation.
Sublinear Memory Proofs Democratize Zero-Knowledge Computation on Resource-Constrained Devices
New sublinear memory ZK proofs reduce prover space from linear to square-root, enabling verifiable computation on all mobile devices.
Mercury MLPCS Achieves Constant Proof Size and Linear Prover Time
Mercury, a new pairing-based multilinear polynomial commitment scheme, fundamentally resolves the proof size versus prover time trade-off for scalable verifiable computation.
Sublinear Transparent Commitments Unlock Practical Trustless Zero-Knowledge Proofs
A new polynomial commitment scheme achieves sublinear prover complexity and constant proof size, dramatically accelerating zero-knowledge computation and scaling.
Modular Cryptography Enables Expressive Verifiable Databases
QEDB is a new protocol that uses specialized cryptographic data structures to verify complex SQL queries on large databases, yielding constant-size proofs.
Constant-Size Proofs Secure Distributed Verifiable Random Functions Efficiently
Cryptographers developed a Distributed Verifiable Random Function with proofs of constant size, eliminating bilinear pairings for faster, pairing-free verification.
Linear-Time Prover SNARK with Constant Proof Size Achieves ZKP Optimality
Samaritan introduces a multilinear polynomial commitment scheme that achieves the theoretical optimum: linear prover time and constant proof size for scalable verifiable computation.
New Folding Scheme Enables Logarithmic Recursive Proof Verification
This new folding scheme aggregates multiple zero-knowledge instances into a single, compact proof, achieving logarithmic-time recursive verification for unprecedented rollup scalability.
Transparent Succinct Proofs Eliminate Trusted Setup and Large Proof Size
A novel Vector Hash Commitment achieves constant-size, transparent proofs, resolving the critical trade-off between ZK-SNARK succinctness and ZK-STARK setup-free security.
