zk-STARKs Enable Scalable Private Identity and Verifiable Credential Revocation
A zk-STARKs-based framework uses cryptographic accumulators to resolve the privacy-transparency conflict, enabling scalable, anonymous credential revocation.
Post-Quantum Succinct Arguments Secure Verifiable Computation against Quantum Adversaries
This work proves a foundational succinct argument is secure in the Quantum Random Oracle Model, guaranteeing long-term security for verifiable computation.
Linear-Time Post-Quantum SNARKs Achieve Optimal Prover Efficiency
Brakedown introduces the first built linear-time SNARK, achieving optimal O(N) prover complexity for large computations while eliminating trusted setup.
Accountable Delegation Secures Proof-of-Stake Liveness and Safety
A new Verifiable Inactivity Proof primitive enforces real-time delegate accountability, fundamentally securing DPoS liveness against non-participation.
Verifiable Training Proofs Secure Decentralized AI Consensus
The Zero-Knowledge Proof of Training (ZKPoT) mechanism leverages zk-SNARKs to create a consensus primitive that validates collaborative AI model updates with cryptographic privacy.
Equifficient Polynomial Commitments Enable Ultra-Succinct, Faster Zero-Knowledge Proofs
Equifficient Polynomial Commitments introduce a new cryptographic primitive that separates linear and nonlinear constraints, setting the new frontier for zk-SNARK efficiency.
Proof of Compute Transforms Verifiable Work into a Consensus Primitive
Proof of Compute re-engineers consensus by rewarding verifiable ZK computation, fundamentally transforming computational work into a yield-bearing asset.
Optimal Prover Time Unlocks Scalable Zero-Knowledge Verifiable Computation
A new zero-knowledge argument system achieves optimal linear prover time, fundamentally eliminating the computational bottleneck for verifiable execution of large programs.
Zero-Knowledge Credentials from ECDSA Signatures Enable Private Identity
This ZK argument system composes Ligero with sumcheck-based verifiable computation to create privacy-preserving digital identity from existing ECDSA standards.
