Blockchain Secures Private Cloud Deduplication and Auditing, Eliminating Trusted Third Parties
This research introduces a blockchain-smart contract system using identity-based broadcast encryption to enable private, verifiable cloud data deduplication and auditing, removing central trust.
Scorpius: A Sound and Efficient Post-Quantum Zero-Knowledge Argument System
This research rectifies critical soundness flaws in post-quantum zero-knowledge arguments, introducing Scorpius for robust, efficient verifiable computation.
Zero-Knowledge Mechanisms Enable Private, Verifiable Economic Commitments without Mediators
This work introduces zero-knowledge proofs to mechanism design, allowing verifiable, private economic interactions without revealing underlying rules or needing trusted intermediaries.
Zero-Knowledge Mechanisms: Private Commitment in Mechanism Design
This research introduces a framework for private mechanism design, allowing verifiable commitment to rules without revealing sensitive details, thereby enhancing trust and efficiency in decentralized systems.
Fully Homomorphic Encryption Unlocks Ubiquitous Confidential Smart Contracts On-Chain
The Zama Protocol introduces a novel cross-chain confidentiality layer, leveraging Fully Homomorphic Encryption to enable smart contracts to process encrypted data without decryption, fostering ubiquitous on-chain privacy.
Recursive Proofs Enhance Blockchain Scalability and Verifiable Computation
A novel recursive proof composition scheme enables a single, compact proof to verify an arbitrary sequence of prior zero-knowledge proofs, fundamentally enhancing blockchain scalability.
Zero-Knowledge Proofs: Bridging Theory to Practical Blockchain Privacy and Scale
Zero-knowledge proofs enable verifiable computation without revealing underlying data, fundamentally transforming blockchain privacy, security, and scalability for decentralized systems.
Zero-Knowledge Mechanisms Enable Private, Verifiable Economic Commitments
This research introduces a framework for committing to and executing economic mechanisms without revealing their details, ensuring verifiable properties via zero-knowledge proofs.
Quantum-Safe Threshold Signatures Secure Public Blockchains
New quantum-safe threshold ML-DSA signatures, using MPC, enable secure, collaborative signing for public blockchains, protecting against future quantum threats.
ZKPoT Consensus Secures Federated Learning for Private, Efficient Blockchains
A novel Zero-Knowledge Proof of Training consensus validates federated learning contributions, eliminating inefficiencies and privacy risks for robust blockchain systems.
Quantum-Resistant Zero-Knowledge Proofs Defend against Superposition Attacks
Researchers developed novel zero-knowledge protocols, leveraging Learning With Errors, to withstand quantum superposition attacks, ensuring post-quantum cryptographic security.
Threshold Cryptography Enables Secure, Convenient Digital Wallets without Compromise
Threshold cryptography fundamentally redefines digital asset security by distributing key fragments, enabling seamless user experiences and eliminating single points of failure.
New MPC Scheme Introduces Dwallets for Secure, Scalable Web3 Coordination
Ika's 2PC-MPC cryptography redefines threshold signatures, enabling decentralized dWallets for secure, high-throughput cross-chain asset coordination.
PVPIR with Function Secret Sharing Ensures Auditable, Private Data Access
New FSS-based protocols enable publicly verifiable private information retrieval, allowing external auditing and robust data integrity in decentralized data access.
Verifiable Private Federated Learning Evaluation with Zero-Knowledge Proofs
This research introduces ZKP-FedEval, a novel zero-knowledge proof protocol enabling privacy-preserving, verifiable federated learning evaluation without data leakage.
GuardianMPC: Backdoor-Resilient Neural Network Computation via Secure MPC
A novel framework leverages secure multi-party computation to protect neural networks from backdoor attacks, ensuring private, robust AI inference and training.
New PVPIR Protocols Ensure Data Privacy and Verifiable Integrity
Novel PVPIR protocols ensure data integrity verification without revealing queries, critical for transparent, private decentralized systems.
Quantum Zero-Knowledge Proofs Resist Superposition Attacks with LWE
This work extends MPC-in-the-head to create quantum-resistant zero-knowledge proofs, securing privacy against future superposition attacks using LWE.
Zero-Knowledge Proofs: Practical Cryptographic Privacy and Scalability Advancement
Zero-knowledge proofs enable verifiable computation without revealing underlying data, fundamentally enhancing privacy and scalability across decentralized systems.
Efficient Simulation Extractable Groth16 zk-SNARKs for Enhanced Security
This research introduces an optimized Groth16 zk-SNARK variant, achieving simulation extractability with fewer pairings, bolstering non-malleability for robust blockchain protocols.
Zero-Knowledge Mechanisms Enable Private, Verifiable Mechanism Design
This research introduces a framework for privately committing to and executing economic mechanisms, leveraging zero-knowledge proofs to ensure verifiability without revealing sensitive rules or data, fostering trustless interactions.
Sublinear Space ZKP Prover Enables Efficient On-Device Verifiable Computation
A novel ZKP prover architecture significantly reduces memory footprint, enabling practical verifiable computation on resource-constrained devices, revolutionizing decentralized applications.
ZKPoT Consensus Secures Federated Learning with Proofs
This research introduces a novel Zero-Knowledge Proof of Training consensus, enabling privacy-preserving federated learning by verifying model contributions without exposing sensitive data.
Zero-Knowledge Proofs Enhance Bitcoin’s Functionality and Privacy
This research introduces protocols enabling zero-knowledge proofs on Bitcoin for privacy-preserving applications, leveraging zk-STARKs and BitVM to overcome Bitcoin's inherent programmability limitations.
Quantum-Secure Zero-Knowledge Proofs Resist Quantum Attacks
New quantum-secure zero-knowledge protocols from generalized MPC-in-the-head resist superposition attacks, safeguarding privacy in a quantum era.
Asymmetric Trust Redefines Distributed Fault Tolerance
This research introduces asymmetric Byzantine quorum systems, enabling subjective trust models to secure distributed protocols and consensus mechanisms.
Publicly Verifiable PIR Protocols Enhance Data Integrity and Privacy for Multi-Party Systems
This research introduces publicly verifiable Private Information Retrieval, enabling external validation of query results without compromising data privacy or requiring secret keys.
Libra, Virgo, Virgo++: Optimal Zero-Knowledge Proofs for Practical Systems
New zero-knowledge protocols, Libra, Virgo, and Virgo++, achieve optimal prover time, rapid verification, and succinct proofs, making ZKPs practical for blockchain and AI.
Efficient Robust Threshold Signatures for Decentralized Applications
This research pioneers a robust, highly efficient threshold ECDSA protocol, dramatically reducing communication and verification costs for securing decentralized systems.
