Epochless Batched Threshold Encryption Secures Practical Private Transaction Ordering
        
        
        
        
          
        
        
      
        
    
        
        BEAT-MEV introduces a novel, epochless Batched Threshold Encryption scheme, eliminating costly MPC setup to enable practical, front-running-resistant private mempools.
        
        Constant-Cost Batch Verification for Private Computation over Secret-Shared Data
        
        
        
        
          
        
        
      
        
    
        
        New silently verifiable proofs achieve constant-size verifier communication for batch ZKPs over secret shares, unlocking scalable private computation.
        
        Hierarchical Aggregate VRFs Decouple Consensus Scalability from Overhead
        
        
        
        
          
        
        
      
        
    
        
        Introducing Hierarchical Aggregate Verifiable Random Functions (HAVRFs), a primitive that compresses multiple VRF proofs into a single, constant-size proof, enabling scalable and secure committee-based consensus.
        
        Zero-Knowledge Proof of Training Secures Private Federated Learning Consensus
        
        
        
        
          
        
        
      
        
    
        
        ZKPoT, a novel zk-SNARK-based consensus, verifies decentralized machine learning contributions without exposing private data, ensuring both efficiency and privacy.
        
        Lattice-Based Publicly Verifiable Secret Sharing Achieves Post-Quantum Standard Model Security
        
        
        
        
          
        
        
      
        
    
        
        Researchers constructed the first lattice-based Publicly Verifiable Secret Sharing scheme, achieving post-quantum security in the rigorous standard model, securing decentralized key management against future threats.
        
        Sublinear Vector Commitments Achieve Optimal Stateless Client Update Efficiency
        
        
        
        
          
        
        
      
        
    
        
        A new vector commitment scheme achieves sublinear complexity for both global update size and local proof updates, solving the stateless client efficiency trade-off.
        
        Incremental Proofs Maintain Constant-Size Sequential Work for Continuous Verification
        
        
        
        
          
        
        
      
        
    
        
        This new cryptographic primitive enables constant-size proofs for arbitrarily long sequential computations, fundamentally solving the accumulated overhead problem for VDFs.
        
        Sublinear Prover PlonK Cuts Verifiable Computation Cost by Proving Active Circuits
        
        
        
        
          
        
        
      
        
    
        
        SublonK introduces a novel SNARK prover whose runtime scales only with the active circuit, fundamentally optimizing large-scale verifiable computation.
        
        Decentralized Time-Lock Encryption Eliminates Single Point of Failure
        
        
        
        
          
        
        
      
        
    
        
        This protocol introduces a Time-Lapse Cryptography Service using secret sharing to construct a decryption key, guaranteeing conditional information release without a trusted single party.
        
        Efficient Lattice Commitments Secure Post-Quantum Verifiable Computation
        
        
        
        
          
        
        
      
        
    
        
        Greyhound introduces the first concretely efficient lattice-based polynomial commitment scheme, providing quantum-resistant security for all verifiable computation.
        
        FRI-IOP Establishes Quantum-Resistant Polynomial Commitments for Scalable Proofs
        
        
        
        
          
        
        
      
        
    
        
        FRI-based polynomial commitments replace pairing-based cryptography with hash-based, quantum-resistant security, enabling transparent, scalable ZK-SNARKs and data availability.
        
        Zero-Knowledge Proof of Training Secures Decentralized Federated Learning
        
        
        
        
          
        
        
      
        
    
        
        ZKPoT leverages zk-SNARKs to prove model performance without revealing private data, solving the privacy-efficiency trade-off in decentralized AI.
        
        Quantum Consensus Mechanism Secures Consortium Blockchains against Future Threats
        
        
        
        
          
        
        
      
        
    
        
        This novel quantum-enhanced Proof-of-Vote protocol integrates quantum signatures and entangled states to establish the first post-quantum security model for permissioned decentralized ledgers.
        
        OR-Aggregation Secures Efficient Zero-Knowledge Set Membership Proofs
        
        
        
        
          
        
        
      
        
    
        
        A novel OR-aggregation technique drastically reduces proof size and computation for set membership, enabling private, scalable data management in IoT.
        
        Recursive Inner Product Arguments Enable Universal Transparent Polynomial Commitments
        
        
        
        
          
        
        
      
        
    
        
        A novel recursive folding of polynomial commitments into Inner Product Arguments yields universal, transparent proof systems for highly scalable verifiable computation.
        
        Verifiable Computation for Approximate FHE Unlocks Private AI Scalability
        
        
        
        
          
        
        
      
        
    
        
        This new cryptographic framework efficiently integrates Verifiable Computation with approximate Homomorphic Encryption, enabling trustless, private AI computation at scale.
        
        Constraint-Reduced Circuits Achieve Orders of Magnitude Faster Zero-Knowledge Proving
        
        
        
        
          
        
        
      
        
    
        
        New Constraint-Reduced Polynomial Circuits (CRPC) primitives cut ZKP complexity from cubic to linear, unlocking practical verifiable AI and ZK-EVMs.
        
        New Transparent Recursive Commitment Scheme Eliminates Trusted Setup Efficiency Trade-Off
        
        
        
        
          
        
        
      
        
    
        
        LUMEN introduces a novel recursive polynomial commitment scheme, achieving transparent zk-SNARK efficiency on par with trusted-setup protocols.
        
        Rondo Protocol Achieves Optimal Linear Complexity for Decentralized Randomness Beacon Sharing
        
        
        
        
          
        
        
      
        
    
        
        Rondo introduces batched asynchronous verifiable secret sharing with partial output, cutting message complexity to linear for scalable, reconfigurable randomness beacons.
        
        Zero-Knowledge Proof of Training Secures Decentralized Federated Learning Consensus
        
        
        
        
          
        
        
      
        
    
        
        A new Zero-Knowledge Proof of Training (ZKPoT) consensus mechanism leverages zk-SNARKs to validate machine learning model contributions privately, resolving the efficiency and privacy trade-off in decentralized AI.
        
        Rondo Protocol Achieves Scalable, Dynamic Distributed Randomness Beacon
        
        
        
        
          
        
        
      
        
    
        
        The Rondo protocol introduces Batched Asynchronous Verifiable Secret Sharing with Partial Output, enabling dynamic node membership and optimal O(n) message complexity for scalable, unpredictable randomness.
        
        Ika Launches Dwallet Primitive for Secure Multi-Chain Asset Interoperability
        
        
        
        
          
        
        
      
        
    
        
        Ika's parallel MPC dWallet establishes a zero-trust primitive, unlocking multi-trillion dollar asset flows for the Sui DeFi ecosystem.
        
        Lattice zkSNARKs Achieve Practical Succinctness for Post-Quantum Security
        
        
        
        
          
        
        
      
        
    
        
        New lattice-based zkSNARKs drastically shrink proof size, making quantum-resistant, privacy-preserving computation viable for next-generation decentralized systems.
        
        Verifiable Decryption Secures Proposer-Builder Separation against Censorship
        
        
        
        
          
        
        
      
        
    
        
        A new two-tiered architecture incorporates publicly verifiable decryption, resolving the censorship vulnerability inherent in existing block-building separation models.
        
        Collaborative SNARKs Enable Private Shared State Computation without Revealing Secrets
        
        
        
        
          
        
        
      
        
    
        
        Collaborative SNARKs merge ZKPs and MPC to allow distributed parties to jointly prove a statement over private inputs, unlocking secure data collaboration.
        
        Batched Identity-Based Encryption Enables Selective, Efficient, and Privacy-Preserving Data Access
        
        
        
        
          
        
        
      
        
    
        
        The new Batched IBE primitive allows public aggregation of decryption rights for specific data subsets, unlocking private, auditable data batching on-chain.
        
        Linear-Time Field-Agnostic SNARKs Unlock Massively Scalable Verifiable Computation
        
        
        
        
          
        
        
      
        
    
        
        Brakedown introduces a practical linear-time encodable code, enabling the first O(N) SNARK prover, fundamentally scaling verifiable computation and ZK-Rollups.
        
        Decoupled Vector Commitments Enable Sublinear Stateless Client Verification
        
        
        
        
          
        
        
      
        
    
        
        A new Decoupled Vector Commitment primitive fundamentally lowers client verification cost from linear to sublinear time, enabling true stateless decentralization.
        
        Verifiable Entropy Functions Secure Optimal Decentralized Randomness Extraction
        
        
        
        
          
        
        
      
        
    
        
        The Verifiable Entropy Function, a new primitive, guarantees maximal unbiased randomness from distributed inputs, fundamentally securing Proof-of-Stake consensus.
