Sublinear Prover Memory Unlocks Decentralized Verifiable Computation and Privacy Scale
New sublinear-space prover reduces ZKP memory from linear to square-root complexity, enabling ubiquitous on-device verifiable computation and privacy.
Zero-Knowledge Proof of Training Secures Private Decentralized Federated Learning Consensus
ZKPoT introduces a zk-SNARK-based consensus mechanism that proves model accuracy without revealing private data, resolving the critical privacy-accuracy trade-off in decentralized AI.
Log-Space Commitments Enable Hyper-Efficient Recursive Proofs for Scalable State
A novel Log-Space Verifiable Commitment scheme achieves logarithmic verification complexity for continuous state updates, unlocking truly scalable verifiable systems.
Constant-Cost Batch Verification with Silently Verifiable Proofs
Silently Verifiable Proofs introduce a new zero-knowledge primitive that achieves constant verifier-to-verifier communication for arbitrarily large proof batches, drastically cutting overhead for private computation.
Lattice-Based Polynomial Commitments Achieve Post-Quantum Succinctness and Sublinear Verification
Greyhound is the first concretely efficient lattice-based polynomial commitment scheme, enabling post-quantum secure zero-knowledge proofs with sublinear verifier time.
Epochless Batched Threshold Encryption Secures Practical Private Transaction Ordering
BEAT-MEV introduces a novel, epochless Batched Threshold Encryption scheme, eliminating costly MPC setup to enable practical, front-running-resistant private mempools.
Mechanism Design Balances Decentralization and Efficiency in Verifiable Computation
New game-theoretic mechanisms characterize the decentralization-efficiency trade-off, enabling provably optimal design for verifiable computation markets.
Zero-Knowledge Proof of Training Secures Private Federated Learning Consensus
ZKPoT consensus validates machine learning contributions privately using zk-SNARKs, balancing efficiency, security, and data privacy for decentralized AI.
Cryptographic Proof Systems Decouple Computation and Trustless Verification
Cryptographic proof systems enable trustless outsourcing of complex computation, drastically reducing verification cost for resource-constrained clients.