Scalable Distributed Randomness via Insertion-Secure Accumulators
        
        
        
        
          
        
        
      
        
    
        
        Research demonstrates a scalable distributed randomness beacon by enforcing verifiable inclusion of all entropy contributions using insertion-secure accumulators.
        
        Distributed Verifiable Randomness Secures Consensus and On-Chain Fairness
        
        
        
        
          
        
        
      
        
    
        
        A Distributed Verifiable Random Function, built with threshold cryptography and zk-SNARKs, creates a publicly-verifiable, un-biasable randomness primitive essential for secure leader election and MEV mitigation.
        
        Zero-Knowledge Proof of Training Secures Federated Consensus
        
        
        
        
          
        
        
      
        
    
        
        Research introduces ZKPoT consensus, leveraging zk-SNARKs to cryptographically verify machine learning contributions without exposing private training data or model parameters.
        
        Interplanetary Bitcoin Standard with Proof-of-Transit Timestamping
        
        
        
        
          
        
        
      
        
    
        
        This research introduces Proof-of-Transit Timestamping, a novel cryptographic primitive enabling tamper-evident audit trails for Bitcoin across high-latency, intermittently-connected interplanetary links.
        
        Post-Quantum Dynamic K-Times Anonymous Authentication Enhances Privacy and Management
        
        
        
        
          
        
        
      
        
    
        
        Pioneering lattice-based dynamic k-TAA enables adaptable, post-quantum anonymous authentication, critical for future privacy-preserving systems.
        
        zk-SNARKs: Succinct Proofs for Verifiable, Private Computation
        
        
        
        
          
        
        
      
        
    
        
        zk-SNARKs enable proving computational integrity and data privacy without revealing underlying information, revolutionizing secure and scalable decentralized systems.
        
        Sublinear-Space Zero-Knowledge Proofs Enable Pervasive Verifiable Computation.
        
        
        
        
          
        
        
      
        
    
        
        This research introduces the first sublinear-space zero-knowledge prover, transforming proof generation into a tree evaluation problem to unlock on-device verifiable computation.
        
        Multi-Client Functional Encryption Secures Private Multi-Source Data Computation
        
        
        
        
          
        
        
      
        
    
        
        A novel Multi-Client Functional Encryption scheme enables secure, privacy-preserving inner product computations over data from multiple independent sources.
        
        Sublinear-Space Zero-Knowledge Proofs Enable Ubiquitous Verifiable Computation
        
        
        
        
          
        
        
      
        
    
        
        A novel equivalence reframes ZKP generation as tree evaluation, yielding the first sublinear-space prover, unlocking on-device verifiable computation for resource-constrained systems.
        
        PIPFRI: Accelerating Zero-Knowledge Proofs with Novel Polynomial Commitments
        
        
        
        
          
        
        
      
        
    
        
        A new FRI-based polynomial commitment scheme, PIPFRI, dramatically enhances ZKP prover efficiency, enabling practical, scalable blockchain applications.
        
        In-Memory Processing Revolutionizes Private Information Retrieval Efficiency and Scalability
        
        
        
        
          
        
        
      
        
    
        
        IM-PIR leverages Processing-in-Memory to overcome PIR's memory-bound limitations, significantly boosting query throughput.
        
        Proof-of-Transit Timestamping Enables Reliable Interplanetary Bitcoin Transactions
        
        
        
        
          
        
        
      
        
    
        
        This research introduces Proof-of-Transit Timestamping, a cryptographic primitive for verifiable data trails, ensuring Bitcoin's reliability across high-latency space communication.
        
        Quantum Proof of Work Secures Blockchains, Reduces Energy Consumption
        
        
        
        
          
        
        
      
        
    
        
        This research introduces a blockchain architecture leveraging Proof of Quantum Work, rendering mining classically intractable while providing quantum-safe security and reducing environmental impact.
        
        Verifiable Delay Functions: Ensuring Sequential Computation and Efficient Proof
        
        
        
        
          
        
        
      
        
    
        
        A novel cryptographic primitive, the Verifiable Delay Function, guarantees a predetermined computation time with rapid, public verification, securing decentralized randomness and fair ordering.
        
        Delegatable Updatable Private Set Intersection Enhances Dynamic Privacy
        
        
        
        
          
        
        
      
        
    
        
        A novel framework enables third-party computation and efficient set updates for private set intersection, expanding its utility in dynamic, privacy-preserving distributed systems.
        
        Verifiably Encrypted Threshold Key Derivation Secures On-Chain Privacy
        
        
        
        
          
        
        
      
        
    
        
        vetKD enables dapps to securely derive and transport private cryptographic keys on public blockchains, ensuring data confidentiality without centralized trust.
        
        Publicly Verifiable PIR Enhances Data Privacy with Provable Integrity for Blockchains
        
        
        
        
          
        
        
      
        
    
        
        This work introduces publicly verifiable private information retrieval, allowing any party to confirm data integrity without compromising query privacy, crucial for transparent decentralized systems.
        
        Batched IBE Enhances Blockchain Privacy and Scalability
        
        
        
        
          
        
        
      
        
    
        
        This research introduces Batched Identity-Based Encryption, a novel primitive enabling selective transaction decryption to advance blockchain mempool privacy and efficiency.
        
        Oblivious Accumulators Enhance Blockchain Privacy and Statelessness
        
        
        
        
          
        
        
      
        
    
        
        This research introduces oblivious accumulators, a novel cryptographic primitive that conceals set elements and size, enabling private and stateless blockchain architectures.
        
        Verifiable Delay Functions Ensure Fair Transaction Ordering in DEXs
        
        
        
        
          
        
        
      
        
    
        
        A novel mechanism integrates Verifiable Delay Functions into decentralized exchanges, cryptographically enforcing fair transaction ordering and mitigating front-running.
        
        Random Oracle Model Precludes Verifiable Delay Functions
        
        
        
        
          
        
        
      
        
    
        
        This research fundamentally proves Verifiable Delay Functions cannot exist in the Random Oracle Model, challenging foundational assumptions for secure randomness in decentralized systems.
        
        Standard-Model One-Shot Signatures via Permutable Pseudorandom Permutations for Secure Transactions
        
        
        
        
          
        
        
      
        
    
        
        A new cryptographic primitive, permutable pseudorandom permutations, enables the first standard-model one-shot signatures, securing single-use digital transactions.
        
        Group Verifiable Random Functions Revolutionize Anonymous Token Issuance
        
        
        
        
          
        
        
      
        
    
        
        A novel cryptographic primitive, Group Verifiable Random Functions, enables scalable, user-generated anonymous tokens, fundamentally transforming privacy-preserving access control and authentication.
        
        Practical Quantum Public Key Encryption for Noisy Intermediate-Scale Quantum Devices
        
        
        
        
          
        
        
      
        
    
        
        A noise-resilient quantum-classical public key encryption scheme is designed for current noisy quantum computers, requiring minimal qubits.
        
        Fully Homomorphic Encryption Revolutionizes Blockchain Privacy and Scalability
        
        
        
        
          
        
        
      
        
    
        
        FHE enables encrypted data computation, fundamentally transforming blockchain privacy and scalability through continuous data confidentiality.
        
        EByFTVeS Fortifies Verifiable Secret Sharing in Privacy-Preserving Machine Learning
        
        
        
        
          
        
        
      
        
    
        
        A novel Byzantine Fault Tolerant verifiable secret-sharing scheme thwarts adaptive model poisoning attacks, ensuring robust consistency in distributed private machine learning.
        
        Affine One-Wayness: Post-Quantum Temporal Verification Primitive
        
        
        
        
          
        
        
      
        
    
        
        A new post-quantum cryptographic primitive, Affine One-Wayness (AOW), enables verifiable temporal ordering in distributed systems without trusted authorities, crucial for future blockchain security.
        
        Succinct One-Sided Private Set Intersection for Confidential Data Matching
        
        
        
        
          
        
        
      
        
    
        
        This research introduces a novel cryptographic primitive enabling private set intersection where one party learns the common elements succinctly, without revealing their own set.
        
        Algebraic Verifiable Delay Functions Vulnerable to Parallel Computation
        
        
        
        
          
        
        
      
        
    
        
        Cryptanalysis reveals fundamental flaws in algebraic Verifiable Delay Functions, demonstrating parallel computation can bypass intended sequential delays, necessitating new secure designs.