Optimal ZKP Prover Time Unlocks Practical Succinct Verifiable Computation
Libra achieves the theoretical optimum for ZKP prover efficiency, utilizing a linear-time GKR algorithm to finally scale zero-knowledge proofs.
ZKPoT Secures Decentralized Machine Learning by Proving Training without Revealing Data
A new ZKPoT consensus uses zk-SNARKs to cryptographically verify decentralized AI model training performance while preserving data privacy.
Committed VOLE Enables Consistent Private Computation across Multiple Parties
C-VOLE is a new cryptographic primitive that ensures input consistency across multiple private computations, fundamentally accelerating secure multi-party protocols.
Linear-Time ZK Proof System Achieves Optimal Prover Complexity
Cryptographers developed a zero-knowledge argument system achieving optimal linear-time prover complexity, fundamentally unlocking scalable verifiable computation.
Zero-Knowledge Proof of Personhood Secures Decentralized Identity and Sybil Resistance
This research introduces Zero-Knowledge Proof of Personhood (ZK-PoP) to cryptographically enforce unique identity without compromising user privacy, solving the Sybil resistance challenge.
Sublinear Zero-Knowledge Proofs Democratize Verifiable Computation on Constrained Devices
A novel proof system reduces ZKP memory from linear to square-root scaling, fundamentally unlocking privacy-preserving computation for all mobile and edge devices.
Sublinear Zero-Knowledge Proofs Unlock Ubiquitous Private Computation
A new proof system eliminates ZKP memory bottlenecks by achieving square-root scaling, enabling verifiable computation on all devices.
Zero-Knowledge Proof of Training Secures Private Decentralized Machine Learning Consensus
Zero-Knowledge Proof of Training (ZKPoT) leverages zk-SNARKs to validate collaborative model performance privately, enabling scalable, secure decentralized AI.
Zero-Knowledge Authenticators Secure Private Policy on Public Blockchains
The Zero-Knowledge Authenticator (zkAt) is a new cryptographic primitive that enables users to prove transaction authenticity against complex private policies without revealing the policy logic or identity, unlocking private on-chain governance.
