Hierarchical Vector Commitments Enable Scalable Dynamic Data Authenticity
This work introduces Hierarchical Vector Commitments, a cryptographic primitive enabling constant-sized proofs for dynamic data authenticity across complex decentralized architectures.
Optimizing Communication for Secure Multi-Party Computation with Aborts
New protocols drastically reduce communication overhead in secure multi-party computation with selective aborts, enhancing practicality for decentralized applications.
Quantum-Safe Wallets for EdDSA Chains via Zero-Knowledge Proofs
A novel zero-knowledge proof system enables EdDSA-based blockchains to achieve quantum resistance for existing wallets without address changes or asset transfers.
Optimizing Verifiable Delay Function Verification for Ethereum Smart Contracts
This research significantly reduces the gas cost and proof size for Pietrzak's Verifiable Delay Function on Ethereum, enhancing practical blockchain integration.
Orion: High-Throughput Asynchronous BFT with VDF Leader Election
A novel asynchronous Byzantine Fault Tolerant protocol, Orion, uses verifiable delay functions for leader election and pipelined processing to achieve optimal resilience and high throughput.
Zero-Knowledge Mechanisms Enable Private, Verifiable Commitment
A novel framework leverages zero-knowledge proofs to execute economic mechanisms privately, ensuring verifiable commitment without revealing sensitive design parameters.
Verifiable Multi-Granular Machine Unlearning with Forgery Resistance
A novel zero-knowledge framework enables provably secure, multi-granular machine unlearning, enhancing data privacy and AI accountability against adversarial attacks.
Libra: Optimal Prover Time, Succinct Zero-Knowledge Proofs Achieved
Libra's linear-time GKR prover and efficient zero-knowledge masking reduce proof generation, enabling practical, scalable verifiable computation.
Neural Networks Forge Post-Quantum Secure Digital Signatures
A groundbreaking digital signature scheme integrates neural networks with multivariate polynomials, establishing robust post-quantum security against adaptive attacks.
