Optimal Polynomial Commitment Batching Unlocks Scalable Decentralized Cryptography
New KZG batching algorithm achieves optimal $O(N log N)$ prover time and constant proof size, dramatically accelerating Verifiable Secret Sharing.
Federated Distributed Key Generation Secures Threshold Cryptography in Dynamic Decentralized Networks
FDKG introduces participant-defined guardian sets, generalizing DKG to dynamic networks and enhancing the resilience of all threshold-based protocols.
Differentially Private Hints Quantify MEV-Share Privacy for Fairer Transactions
This research introduces Differentially Private aggregate hints, enabling users to quantify privacy loss in MEV-Share, fostering fairer and more efficient decentralized exchanges.
Multi-Level Optical PUF Enhances Hierarchical Cryptographic Security for Diverse Networks
This research introduces a novel multi-level optical physical unclonable function, generating adaptable cryptographic keys to secure diverse networks from IoT to sensitive data.
ZKTorch: Efficient, Private ML Inference via Parallel Zero-Knowledge Proof Accumulation
ZKTorch enables private, verifiable ML inference by compiling models into basic blocks, leveraging parallel proof accumulation for efficiency.
Optimistic Rollup Achieves Full Privacy with Efficient Fraud Proofs
Calyx Pioneers Privacy-Preserving Optimistic Rollups, Securing Off-Chain Transactions with a Novel One-Step Fraud-Proof Mechanism, Enhancing Blockchain Confidentiality.
Blockchain-Native Distributed Key Generation Enables On-Chain Verification
A novel Distributed Key Generation protocol leverages blockchain consensus to make public keys verifiable on-chain, enhancing decentralized security and trust minimization.
Publicly Verifiable Private Information Retrieval via Function Secret Sharing
This research introduces publicly verifiable private information retrieval protocols, ensuring data integrity and query privacy simultaneously for decentralized systems.
Succinct Zero-Knowledge Arguments for Unknown Order Homomorphic Encryption
This research introduces novel ZK arguments for the CL cryptosystem, enabling private, verifiable computations in unknown order groups for enhanced privacy.
