Lattice-Based Publicly Verifiable Secret Sharing Achieves Post-Quantum Standard Model Security
        
        
        
        
          
        
        
      
        
    
        
        Researchers constructed the first lattice-based Publicly Verifiable Secret Sharing scheme, achieving post-quantum security in the rigorous standard model, securing decentralized key management against future threats.
        
        Decentralized Proving Markets Secure Verifiable Computation Outsourcing Efficiency
        
        
        
        
          
        
        
      
        
    
        
        This paper introduces a mechanism design framework for a decentralized proving market, transforming zero-knowledge proof generation into a competitive, economically efficient service.
        
        Zero-Knowledge Mechanisms Enable Private Rules with Public Verifiability
        
        
        
        
          
        
        
      
        
    
        
        This framework introduces a new cryptographic primitive that allows mechanism rules to remain secret while using ZKPs to publicly verify incentive compatibility and outcomes, removing the need for a trusted mediator.
        
        Zero-Knowledge Verifiable Computation Secures High-Frequency Trustless Trading Infrastructure
        
        
        
        
          
        
        
      
        
    
        
        Integrating ZK-SNARKs with novel data structures creates a publicly verifiable compute engine, enabling trustless, high-frequency trading at scale.
        
        Verifiable Decapsulation Secures Post-Quantum Key Exchange Implementation Correctness
        
        
        
        
          
        
        
      
        
    
        
        This new cryptographic primitive enables provable correctness for post-quantum key exchange mechanisms, transforming un-auditable local operations into publicly verifiable proofs of secure shared secret derivation.
        
        Delivery-Fairness Secures Decentralized Randomness Beacons against Time-Advantage Attacks
        
        
        
        
          
        
        
      
        
    
        
        Introducing delivery-fairness, a new formal property, rigorously quantifies and mitigates the time-advantage vulnerability in randomness beacons, ensuring protocol-level fairness.
        
        Distributed Verifiable Randomness Secures Consensus and On-Chain Fairness
        
        
        
        
          
        
        
      
        
    
        
        A Distributed Verifiable Random Function, built with threshold cryptography and zk-SNARKs, creates a publicly-verifiable, un-biasable randomness primitive essential for secure leader election and MEV mitigation.
        
        Commitment Schemes Crucial for Robust Multi-Party Computation Security
        
        
        
        
          
        
        
      
        
    
        
        This paper illuminates how cryptographic commitment schemes are foundational for achieving robust security and privacy in diverse multi-party computation applications.
        
        Publicly Verifiable PIR Enhances Data Privacy with Provable Integrity for Blockchains
        
        
        
        
          
        
        
      
        
    
        
        This work introduces publicly verifiable private information retrieval, allowing any party to confirm data integrity without compromising query privacy, crucial for transparent decentralized systems.
        
        PVPIR with Function Secret Sharing Ensures Auditable, Private Data Access
        
        
        
        
          
        
        
      
        
    
        
        New FSS-based protocols enable publicly verifiable private information retrieval, allowing external auditing and robust data integrity in decentralized data access.
        
        New PVPIR Protocols Ensure Data Privacy and Verifiable Integrity
        
        
        
        
          
        
        
      
        
    
        
        Novel PVPIR protocols ensure data integrity verification without revealing queries, critical for transparent, private decentralized systems.
        
        Publicly Verifiable PIR Protocols Enhance Data Integrity and Privacy for Multi-Party Systems
        
        
        
        
          
        
        
      
        
    
        
        This research introduces publicly verifiable Private Information Retrieval, enabling external validation of query results without compromising data privacy or requiring secret keys.
        
        Efficient Robust Threshold Signatures for Decentralized Applications
        
        
        
        
          
        
        
      
        
    
        
        This research pioneers a robust, highly efficient threshold ECDSA protocol, dramatically reducing communication and verification costs for securing decentralized systems.
        
        Publicly Verifiable PIR: Private Queries with Public Result Integrity
        
        
        
        
          
        
        
      
        
    
        
        This research introduces Publicly Verifiable Private Information Retrieval, enabling transparent, auditable private data queries in decentralized systems.
        
        Verifiable Delay Functions: Cryptographic Sequentiality for Decentralized Systems
        
        
        
        
          
        
        
      
        
    
        
        A novel cryptographic primitive, Verifiable Delay Functions, introduces guaranteed sequential computation, enabling trustless time-based operations in decentralized networks.
