Lattice-Based Inner Product Argument Unlocks Post-Quantum Transparent SNARKs
The Lattice-IPA primitive achieves a succinct, transparent, and quantum-resistant proof system, fundamentally securing verifiable computation against future quantum adversaries.
New Quantum Rewinding Secures Succinct Arguments against Future Attacks
A novel quantum rewinding technique proves post-quantum security for succinct arguments, establishing a foundation for quantum-resistant verifiable computation.
Generalizing MPC-in-the-head for Superposition-Secure Quantum Zero-Knowledge Proofs
We generalize MPC-in-the-head to create post-quantum zero-knowledge arguments, securing verifiable computation against quantum superposition attacks using LWE.
Lattice Cryptography Secures Blockchain Longevity against Quantum Computing Threat
Foundational research integrates lattice-based cryptography, utilizing the LWE problem's hardness, to future-proof blockchain security against quantum decryption.
Lattice-Based Publicly Verifiable Secret Sharing Achieves Post-Quantum Standard Model Security
Researchers constructed the first lattice-based Publicly Verifiable Secret Sharing scheme, achieving post-quantum security in the rigorous standard model, securing decentralized key management against future threats.
Lattice-Based Zero-Knowledge Signatures Eliminate Cryptographic Trapdoors
A new post-quantum signature framework converts non-trapdoor zero-knowledge proofs into digital signatures, fundamentally enhancing long-term security assurances.
First Standard-Model One-Shot Signatures and Commitment Scheme Separation
New one-shot signature construction leverages indistinguishability obfuscation, resolving a decade-old cryptographic commitment problem and bolstering post-quantum security.
Succinct Oblivious Tensor Evaluation Unlocks Efficient Adaptive Cryptographic Primitives
A novel succinct oblivious tensor evaluation primitive, secured by Learning With Errors, enables adaptively-secure laconic function evaluation and optimal trapdoor hashing, advancing private verifiable computation.
