Code-Based Homomorphic Encryption Achieves Quantum-Safe Privacy-Preserving Computation
Code-based homomorphic encryption leverages NP-hard decoding problems to construct quantum-resistant privacy primitives, securing future decentralized computation.
Efficient Transparent Zero-Knowledge Proofs Eliminate Trusted Setup for Scalability
A new recursive polynomial commitment scheme, LUMEN, achieves the efficiency of trusted-setup SNARKs while maintaining full transparency, unlocking truly scalable and trustless rollups.
Constant-Size Zero-Knowledge Proofs for Scalable IoT Set Membership Verification
This new OR-aggregation technique yields constant-size zero-knowledge proofs, fundamentally unlocking scalable, privacy-preserving data integrity for IoT networks.
Fully Homomorphic Encryption Enables Private Smart Contracts with Offloaded Computation
FHE enables private smart contracts by allowing miners to compute on encrypted data, shifting the cryptographic burden from lightweight users.
Silently Verifiable Proofs Achieve Constant Communication Batch Zero-Knowledge Verification
Silently Verifiable Proofs introduce a zero-knowledge primitive that enables constant-cost batch verification, unlocking massive private data aggregation and rollup scaling.
Novel Recursive Commitment Scheme Achieves Transparent, Efficient Zero-Knowledge Proofs
LUMEN introduces a recursive polynomial commitment scheme and PIOP protocol, eliminating the trusted setup while maintaining zk-SNARK efficiency, securing rollup scalability.
Fractal Commitments Enable Universal Logarithmic-Size Verifiable Computation
This new fractal commitment scheme recursively compresses polynomial proofs, achieving truly logarithmic verification costs for universal computation without a trusted setup.
Decentralized Functional Encryption Secures Multi-Party Private Computation without Trust
This new cryptographic primitive enables multiple independent parties to compute joint functions on encrypted data, eliminating the central authority trust bottleneck.
Cryptographic Proof Systems Decouple Computation and Trustless Verification
Cryptographic proof systems enable trustless outsourcing of complex computation, drastically reducing verification cost for resource-constrained clients.
