DeepFold Optimizes Zero-Knowledge Proofs with Efficient Multilinear Commitments
DeepFold, a new Reed-Solomon-based polynomial commitment scheme, achieves optimal prover time and concise proofs, unlocking practical, large-scale verifiable computation.
Lattice Polynomial Commitments Unlock Concretely Efficient Post-Quantum Zero-Knowledge Arguments
A new lattice-based polynomial commitment scheme drastically shrinks proof size, providing the essential, quantum-safe primitive for future scalable blockchain privacy.
Lattice Commitments Secure Transparent Post-Quantum Zero-Knowledge Proofs
A new lattice-based polynomial commitment scheme secures zero-knowledge proofs against quantum attacks, eliminating the need for a trusted setup.
Isogeny-Based Commitments Enable Transparent Post-Quantum ZK Arguments
Isogeny-based polynomial commitments deliver the first transparent, quantum-resistant ZK-SNARK, securing all verifiable computation.
Distributed zk-SNARKs Achieve Massive Efficiency through Binary Field Delegation
FDzkS protocol utilizes binary fields and group signatures to enable near-offline proof delegation, eliminating network bottlenecks for scalable privacy.
Zero-Knowledge Proof of Training Secures Private Decentralized Machine Learning
ZKPoT consensus uses zk-SNARKs to prove model accuracy privately, resolving the privacy-utility-efficiency trilemma for federated learning.
ZKPoT Consensus Secures Federated Learning with Verifiable, Private Model Contributions
Zero-Knowledge Proof of Training (ZKPoT) is a new consensus primitive that cryptographically verifies model accuracy without exposing private training data, resolving the privacy-utility conflict in decentralized AI.
Binius and Ligero Unlock Efficient Post-Quantum Client-Side Zero-Knowledge Proving
Benchmarking Binius and Ligero identifies the most efficient post-quantum, transparent ZKPs for mobile devices, enabling secure, scalable decentralized identity.
Lattice-Based Functional Commitments Secure All Functions with Transparent Post-Quantum Setup
New lattice-based functional commitments secure all functions, enabling post-quantum verifiable computation without a trusted setup.
