OR-Aggregation: Constant-Size ZKPs for Resource-Constrained Networks
This research introduces a novel OR-aggregation technique, fundamentally transforming privacy and verifiable computation efficiency in resource-constrained environments.
Optimal Zero-Knowledge Proofs: Faster Provers, Scalable Distributed Computation
Novel ZKP protocols dramatically accelerate proof generation, enabling practical, privacy-preserving computation and scalable blockchain architectures.
Verifiable Delay Functions: Cryptographic Sequentiality for Decentralized Systems
A novel cryptographic primitive, Verifiable Delay Functions, introduces guaranteed sequential computation, enabling trustless time-based operations in decentralized networks.
Affine One-Wayness: Post-Quantum Temporal Verification for Distributed Systems
Affine One-Wayness (AOW) is a novel post-quantum cryptographic primitive, securing verifiable temporal ordering in distributed systems without trusted clocks.
Folding Schemes Enable Efficient Recursive Zero-Knowledge Arguments
A new cryptographic primitive, the folding scheme, dramatically reduces recursive proof overhead, unlocking practical incrementally verifiable computation.
Blockchain-Secured Attribute Encryption for Verifiable, Payable Outsourced Decryption
Blockchain-based attribute encryption enables verifiable, fair outsourced decryption with zero-knowledge proofs, enhancing data privacy and efficiency.
Quantum-Resistant IBE Secures Blockchain Privacy with Delegated Decryption
Introduces a quantum-resistant Identity-Based Encryption scheme allowing private data sharing on blockchains with secure, delegated decryption, enhancing future privacy.
VDFs Are Impossible in the Random Oracle Model
This research fundamentally redefines Verifiable Delay Functions, proving their non-existence in the Random Oracle Model, impacting future cryptographic primitive design.
Sublinear-Space Zero-Knowledge Proofs Enable Efficient On-Device Verification
This research introduces the first sublinear-space zero-knowledge prover, reframing proof generation as a tree evaluation problem to unlock on-device verifiable computation.
