Zero-Knowledge Proof of Training Secures Decentralized AI Consensus
A new Zero-Knowledge Proof of Training (ZKPoT) consensus mechanism leverages zk-SNARKs to cryptographically verify model performance, eliminating Proof-of-Stake centralization and preserving data privacy in decentralized machine learning.
Proof-of-Useful-Work Decouples Consensus Security from Wasted Energy
A novel Doubly Parallel Local Search mechanism transforms PoW's wasted energy into a decentralized, provably secure combinatorial optimization engine.
Withdrawable Signatures Enable Retractable Digital Consent for Flexible Decentralized Systems
This new cryptographic primitive introduces secure, conditional signature retraction, fundamentally shifting digital consent from static immutability to dynamic adaptability.
Fuzzing Zero-Knowledge Proof Circuits Ensures Implementation Security and Reliability
Introducing fuzzing to ZKP circuits solves the oracle problem for soundness, establishing a scalable, practical security layer for verifiable computation.
Adaptive Sharding and ZKPs Solve Scalability, Security, and Privacy Tradeoffs
A novel model integrates ZKPs and adaptive sharding, formally verified by TLA+, to achieve a resilient, high-throughput, and private blockchain architecture.
Cornucopia Achieves Scalable Unbiasable Randomness Using Accumulators and Delay Functions
A new framework combines accumulators and VDFs with insertion security to create a scalable, unbiasable distributed randomness beacon for consensus.
LLM-driven Program Partitioning Prevents Smart Contract Data Leakage
LLM-driven program partitioning isolates sensitive contract data, mathematically preventing manipulation attacks and securing decentralized applications.
Blockchain Designated Verifier Proofs Ensure Non-Transferable Privacy on Public Ledgers
The Blockchain Designated Verifier Proof (BDVP) uses a verifier-held trapdoor to simulate fake proofs, restoring non-transferable privacy to ZKPs on public chains.
Distributed Threshold Cryptography Eliminates Single Point of Failure Key Management
This framework introduces a Distributed Threshold Key Management System, using DKG to shard master keys, fundamentally securing decentralized applications.
