Blockchain Designated Verifier Proofs Ensure Non-Transferable Privacy on Public Ledgers
The Blockchain Designated Verifier Proof (BDVP) uses a verifier-held trapdoor to simulate fake proofs, restoring non-transferable privacy to ZKPs on public chains.
Lattice Polynomial Commitments Unlock Concretely Efficient Post-Quantum Zero-Knowledge Arguments
A new lattice-based polynomial commitment scheme drastically shrinks proof size, providing the essential, quantum-safe primitive for future scalable blockchain privacy.
Lattice Commitments Secure Transparent Post-Quantum Zero-Knowledge Proofs
A new lattice-based polynomial commitment scheme secures zero-knowledge proofs against quantum attacks, eliminating the need for a trusted setup.
Code-Based Homomorphic Encryption Achieves Quantum-Safe Privacy-Preserving Computation
Code-based homomorphic encryption leverages NP-hard decoding problems to construct quantum-resistant privacy primitives, securing future decentralized computation.
Lattice Polynomial Commitments Achieve Post-Quantum Transparent SNARKs
This research delivers the first efficient lattice-based polynomial commitment scheme, securing succinct arguments against quantum adversaries without a trusted setup.
Major Blockchains Face Existential Threat from Advancing Quantum Computing Cryptography
The imminent breaking of Elliptic Curve Cryptography by quantum processors creates a systemic, time-sensitive risk to all digital asset security.
Binius and Ligero Unlock Efficient Post-Quantum Client-Side Zero-Knowledge Proving
Benchmarking Binius and Ligero identifies the most efficient post-quantum, transparent ZKPs for mobile devices, enabling secure, scalable decentralized identity.
Lattice-Based Functional Commitments Secure All Functions with Transparent Post-Quantum Setup
New lattice-based functional commitments secure all functions, enabling post-quantum verifiable computation without a trusted setup.
Lattice ZKPs Match CRHF Proof Size for Post-Quantum Security
Researchers achieved lattice-based ZKPs with proof sizes comparable to hash-based systems, enabling practical, post-quantum private computation.
