Selective Batched IBE Enables Constant-Cost Threshold Key Issuance
This new cryptographic primitive enables distributed authorities to generate a single, succinct decryption key for an arbitrary batch of identities at a cost independent of the batch size, fundamentally solving key management scalability in threshold systems.
Hyper-Efficient Prover Unlocks Universal Transparent Zero-Knowledge Scaling
This new HyperPlonk scheme achieves linear prover time for universal transparent SNARKs, fundamentally accelerating verifiable computation for all decentralized applications.
Sublinear Prover Memory Unlocks Decentralized Verifiable Computation and Privacy Scale
New sublinear-space prover reduces ZKP memory from linear to square-root complexity, enabling ubiquitous on-device verifiable computation and privacy.
Batched Identity-Based Encryption Enables Selective, Efficient, and Privacy-Preserving Data Access
The new Batched IBE primitive allows public aggregation of decryption rights for specific data subsets, unlocking private, auditable data batching on-chain.
Oblivious Accumulators Achieve Private Set Commitments Hiding Elements and Size
Oblivious Accumulators introduce element hiding and update indistinguishability, enabling privacy-preserving set membership proofs for decentralized systems.
Lattice Zero-Knowledge Proofs Secure Scalable Blockchains Post-Quantum
Lattice cryptography enables a quantum-secure ZK proof system, future-proofing on-chain privacy and scalability against cryptographic collapse.
Iron Fish Establishes Universal Privacy Layer with Zero-Knowledge Proofs
Iron Fish's Layer 1 solution employs zk-SNARKs for default transaction encryption, fundamentally reshaping digital asset confidentiality and fostering auditable privacy for broader Web3 adoption.
Oblivious Accumulators Conceal Set Elements and Dynamic Changes
This research introduces oblivious accumulators, a novel cryptographic primitive that hides both the elements and the size of a committed set, fundamentally enhancing privacy in decentralized systems.
Sublinear-Space Zero-Knowledge Proofs Enable Ubiquitous Verifiable Computation
A novel equivalence reframes ZKP generation as tree evaluation, yielding the first sublinear-space prover, unlocking on-device verifiable computation for resource-constrained systems.
Fully Homomorphic Encryption Unlocks Ubiquitous Confidential Smart Contracts On-Chain
The Zama Protocol introduces a novel cross-chain confidentiality layer, leveraging Fully Homomorphic Encryption to enable smart contracts to process encrypted data without decryption, fostering ubiquitous on-chain privacy.
Fully Homomorphic Encryption Revolutionizes Blockchain Privacy and Scalability
FHE enables encrypted data computation, fundamentally transforming blockchain privacy and scalability through continuous data confidentiality.
Zama Protocol Enables Confidential Smart Contracts with Fully Homomorphic Encryption
The Zama Protocol introduces a novel architecture enabling fully homomorphic encryption for confidential smart contracts, overcoming blockchain's inherent transparency limitations.
Succinct One-Sided Private Set Intersection for Confidential Data Matching
This research introduces a novel cryptographic primitive enabling private set intersection where one party learns the common elements succinctly, without revealing their own set.
Fully Homomorphic Encryption: Unlocking Ubiquitous Confidentiality for Blockchain Transactions
This research leverages Fully Homomorphic Encryption to enable on-chain computation over encrypted data, fundamentally transforming blockchain transparency into pervasive confidentiality.
Fully Homomorphic Encryption Enables Private Shared State on Blockchains
Fully Homomorphic Encryption, offloaded to coprocessors, enables collaborative computation on encrypted blockchain data, fostering truly private shared state.
SNARK Implementation Security: A Comprehensive Vulnerability Taxonomy
This research comprehensively maps vulnerabilities across SNARK implementation layers, shifting focus from theoretical guarantees to practical security challenges.
