DAG Protocol Achieves MEV Protection with Zero Overhead
Fino, a new DAG-based BFT protocol, integrates a commit-reveal scheme to achieve Blind Order-Fairness, eliminating MEV risk with zero message overhead and no latency penalty.
Zero-Knowledge Proofs of Quantumness Secure Quantum Computing Verification
ZKPoQ formalizes quantum completeness and classical soundness with a verifier-side zero-knowledge argument, preventing classical verifiers from exploiting quantum provers' secrets.
HyperPlonk’s Multilinear Arithmetization Unlocks Linear Prover Time for ZK-SNARKs
HyperPlonk eliminates the FFT bottleneck in Plonk by using multilinear polynomials over the boolean hypercube, enabling linear-time ZK-proof generation for massive circuits.
Quantum Algorithm Invalidates Post-Quantum SNARK Security Assumptions, Forcing Re-Evaluation
A quantum polynomial-time sampler breaks the hardness assumption for lattice-based SNARKs, demanding new post-quantum security proofs.
Lattice Cryptography Shrinks Quantum-Secure Zero-Knowledge Proofs
A new lattice-based zk-SNARK construction fundamentally shrinks proof size by over 10x, making quantum-resistant verifiable computation practical for all blockchain architectures.
Zero-Knowledge Accumulators Achieve Full Privacy for Dynamic Set Operations
A new cryptographic primitive provides succinct set membership and non-membership proofs while guaranteeing that the set's contents and updates remain entirely private.
Committed VOLE Enables Consistent Private Computation across Multiple Parties
C-VOLE is a new cryptographic primitive that ensures input consistency across multiple private computations, fundamentally accelerating secure multi-party protocols.
Efficient Byzantine Verifiable Secret Sharing Secures Decentralized Systems Foundationally
EByFTVeS introduces an Adaptive Share Delay Provision strategy to resolve consistency and efficiency burdens in BFT-based Verifiable Secret Sharing, strengthening core cryptographic primitives.
Verifiable Delay Functions Cryptographically Eliminate Frontrunning and Transaction Ordering Attacks
Verifiable Delay Functions Cryptographically Eliminate Frontrunning and Transaction Ordering Attacks
The FIRST framework uses Verifiable Delay Functions to enforce a mandatory pre-execution time lock, making transaction frontrunning probabilistically impossible.
