Lattice-Based Folding Achieves Post-Quantum Recursive Succinct Proof Systems
This lattice-based folding scheme enables the first efficient, post-quantum secure recursive SNARKs, securing future scalable blockchain state against quantum threat.
Logarithmic-Size Lattice Signatures Achieve Post-Quantum Blockchain Scalability
This new lattice-based aggregate signature achieves logarithmic size growth, providing post-quantum security while radically compressing blockchain transaction data.
Recursive Proof Composition Enables Infinite Scalability and Constant Verification
Recursive proof composition collapses unbounded computation history into a single, constant-size artifact, unlocking theoretical infinite scalability.
Lattice-Based Polynomial Commitments Unlock Post-Quantum Succinct Zero-Knowledge Proofs
Greyhound, a new lattice-based polynomial commitment scheme, achieves sublinear verification and 8000X smaller proofs, ensuring quantum-safe scalability.
Adaptive Byzantine Agreement Optimizes Communication Complexity by Fault Count
This new BFT protocol dynamically scales communication cost based on actual faults, fundamentally improving the efficiency and practicality of decentralized consensus.
Sublinear Transparent Commitments Unlock Practical Trustless Zero-Knowledge Proofs
A new polynomial commitment scheme achieves sublinear prover complexity and constant proof size, dramatically accelerating zero-knowledge computation and scaling.
Quantum Shares Enable Publicly Verifiable Cryptographic Data Deletion
This new quantum-secure primitive introduces publicly verifiable deletion to secret sharing, neutralizing the threat of long-term data breach by cryptographically destroying shares on demand.
Lattice-Based Argument Achieves Post-Quantum Succinctness and Transparency
Researchers introduce a new lattice-based succinct argument, solving the post-quantum ZKP trilemma to secure future decentralized systems.
Quantum-Secure Hybrid VRF Model Ensures Post-Quantum Decentralized Randomness
This new hybrid VRF uses Ring-LWE encryption off-chain and NTRU signatures on-chain, securing decentralized randomness against quantum threats.
