Recursive Sumchecks Enable Linear-Time Verifiable Computation Proving
The Goldwasser-Kalai-Rothblum protocol's linear-time prover complexity radically lowers proof generation costs, unlocking practical, high-throughput ZK-rollup scaling.
Post-Quantum Zero-Knowledge Proving on Constrained Client Devices
New transparent, post-quantum ZK protocols enable secure, low-resource proving on mobile devices, fundamentally unlocking decentralized identity at scale.
Distributed zkSNARKs Achieve Linear Prover Scalability with Constant Communication
A new distributed zkSNARK protocol, Pianist, achieves linear prover scalability by parallelizing proof generation with constant communication overhead, resolving the ZKP bottleneck for zkRollups.
Black-Box Commit-and-Prove SNARKs Unlock Verifiable Computation Scaling
Artemis, a new black-box SNARK construction, modularly solves the commitment verification bottleneck, enabling practical, large-scale zero-knowledge machine learning.
zk-STARKs Enable Scalable Private Identity and Verifiable Credential Revocation
A zk-STARKs-based framework uses cryptographic accumulators to resolve the privacy-transparency conflict, enabling scalable, anonymous credential revocation.
Equifficient Polynomial Commitments Enable Faster, Smaller zk-SNARKs
Research introduces Equifficient Polynomial Commitments, a new primitive that yields Pari, the smallest SNARK at 160 bytes, and Garuda, a prover three times faster than Groth16.
Universal Commitment Schemes Achieve Optimal Prover Efficiency
A new polynomial commitment scheme enables optimal linear-time prover complexity with a universal, updatable setup, finally resolving the ZK-SNARK trust-efficiency paradox.
Linear Prover Time Unlocks Optimal Succinct Argument Efficiency
This new Interactive Oracle Proof system resolves the prover-verifier efficiency trade-off, achieving linear prover time and polylogarithmic verification complexity.
zk-STARKs Secure Scalable Decentralized Identity and Private Data Sharing
Integrating zk-STARKs with W3C DID standards enables selective credential disclosure and scalable revocation, securing user data sovereignty.
