Straightline Extractors Prove Recursive Zero-Knowledge Security without Loss
New analysis proves recursive SNARK composition incurs no security loss, formally validating the foundational security model for all scalable zero-knowledge rollups.
Transparent Constant-Size Zero-Knowledge Proofs Eliminate Trusted Setup
This breakthrough cryptographic primitive, based on Groups of Unknown Order, yields a truly succinct zk-SNARK without a trusted setup, unlocking scalable, trustless computation.
Lattice Polynomial Commitments Achieve Quantum-Safe, Transparent, Succinct Proofs
A new lattice-based polynomial commitment, secured by the SIS problem, delivers post-quantum SNARKs with smaller proofs and no trusted setup.
Threshold Cryptography Secures Decentralized Fairness and Verifiable Privacy
Integrating Threshold Paillier Cryptosystems into decentralized work protocols ensures verifiable computation and dual fairness without compromising worker privacy.
DeepFold Optimizes Zero-Knowledge Proofs with Efficient Multilinear Commitments
DeepFold, a new Reed-Solomon-based polynomial commitment scheme, achieves optimal prover time and concise proofs, unlocking practical, large-scale verifiable computation.
Blockchain Designated Verifier Proofs Ensure Non-Transferable Privacy on Public Ledgers
The Blockchain Designated Verifier Proof (BDVP) uses a verifier-held trapdoor to simulate fake proofs, restoring non-transferable privacy to ZKPs on public chains.
Sublinear Vector Commitments Enable Trustless Stateless Data Availability
A new vector commitment scheme allows light clients to verify massive datasets with logarithmic communication, fundamentally solving the stateless data availability problem.
Lattice Polynomial Commitments Unlock Concretely Efficient Post-Quantum Zero-Knowledge Arguments
A new lattice-based polynomial commitment scheme drastically shrinks proof size, providing the essential, quantum-safe primitive for future scalable blockchain privacy.
Universal Updatable Proofs Secure All Zero-Knowledge Circuits
A universal and continually updatable Structured Reference String eliminates per-circuit trusted setups, unlocking composable, production-ready ZK systems.
