Verifiable Computation for Approximate Homomorphic Encryption Secures Private AI
New HE-IOP primitive solves the integrity problem for approximate homomorphic encryption, enabling verifiable, private, outsourced computation for AI models.
Sublinear Zero-Knowledge Proofs Unlock Ubiquitous Private Computation
A new proof system eliminates ZKP memory bottlenecks by achieving square-root scaling, enabling verifiable computation on all devices.
Collaborative zk-SNARKs Enable Private, Decentralized, Scalable Proof Generation
Scalable collaborative zk-SNARKs use MPC to secret-share the witness, simultaneously achieving privacy and $24times$ faster proof outsourcing.
Zero-Knowledge Consensus Establishes Trustless Cross-Chain Finality and Global Readability
A new ZK consensus layer compresses chain finality into a single, verifiable proof, replacing trusted bridges with mathematical certainty.
Fractal Commitments Enable Universal Logarithmic-Size Verifiable Computation
This new fractal commitment scheme recursively compresses polynomial proofs, achieving truly logarithmic verification costs for universal computation without a trusted setup.
Lattice-Based Arguments Achieve Succinct Post-Quantum Verification Using Homomorphic Commitments
This work delivers the first lattice-based argument with polylogarithmic verification time, resolving the trade-off between post-quantum security and SNARK succinctness.
Logarithmic-Cost Data Availability Sampling Vector Commitments
Introducing a novel vector commitment scheme that reduces data availability proof size from linear to logarithmic, fundamentally unlocking scalable decentralized rollups.
Time-Bound Signatures Restore EIP-1559 Equilibrium and Mitigate MEV Extraction
A modified Schnorr signature scheme expiring at a specific block height forces block producers to include transactions, curbing harmful MEV and stabilizing fee markets.
zk-STARKs Secure Scalable Decentralized Identity and Private Data Sharing
Integrating zk-STARKs with W3C DID standards enables selective credential disclosure and scalable revocation, securing user data sovereignty.
