Zero-Knowledge Mechanisms Enable Private, Verifiable Mechanism Design
This research introduces a framework for privately committing to and executing economic mechanisms, leveraging zero-knowledge proofs to ensure verifiability without revealing sensitive rules or data, fostering trustless interactions.
Sublinear Zero-Knowledge Proving Transforms On-Device Verifiable Computation
This research introduces the first sublinear-space zero-knowledge prover, reframing proof generation as tree evaluation to enable efficient on-device verifiable computation.
Symmetric-Key Private Set Union Enhances Efficiency and Privacy with Novel Cryptographic Design
A new symmetric-key protocol significantly boosts private set union efficiency and privacy, enabling secure data collaboration.
Fine-Grained Functional Encryption with Revocation Secures Dynamic Data Access
A novel functional encryption scheme enables precise access control and dynamic revocation over encrypted data, critical for privacy in evolving systems like healthcare.
Sublinear ZKP Prover Revolutionizes Verifiable Computation for Constrained Devices
A novel zero-knowledge proof prover architecture drastically reduces memory requirements, enabling ubiquitous verifiable computation on resource-limited hardware.
Oblivious Accumulators Enhance Privacy Hiding Set Elements and Size
This work introduces oblivious accumulators, a cryptographic primitive that conceals set elements and size, enabling truly private on-chain data management.
Efficient Secure Multi-Party Comparison without Data Slack
A novel protocol drastically improves secure multi-party computation efficiency by eliminating data "slack," enabling practical privacy-preserving applications.
Fully Homomorphic Encryption Enables Ubiquitous On-Chain Confidentiality
Zama's fhEVM breakthrough allows smart contracts to process encrypted data, unlocking pervasive privacy for blockchain applications.
Sublinear-Space Zero-Knowledge Proofs Revolutionize Verifiable Computation Efficiency
A novel zero-knowledge prover reduces memory from linear to sublinear, unlocking verifiable computation for resource-constrained devices and massive tasks.
