Sublinear-Space Zero-Knowledge Proofs Enable Ubiquitous Verifiable Computation
A novel equivalence reframes ZKP generation as tree evaluation, yielding the first sublinear-space prover, unlocking on-device verifiable computation for resource-constrained systems.
Zero-Knowledge Proof-Based Consensus Secures Federated Learning Privacy and Efficiency
A novel Zero-Knowledge Proof of Training consensus mechanism secures federated learning, validating model performance privately while enhancing blockchain efficiency.
GRVT Secures $19 Million to Launch Private ZK-Powered Perpetual DEX
GRVT's ZK-powered perpetual exchange redefines institutional DeFi engagement, mitigating "position hunting" risks through on-chain privacy.
Biometric Bound Credentials Revolutionize Private Age Verification
A novel cryptographic primitive, Biometric Bound Credentials, enables privacy-preserving age verification without storing biometric data, preventing credential sharing.
Private Smart Contracts with Delegated Transactions on Permissioned Blockchains
This research introduces a zk-SNARK-based framework for private smart contracts on permissioned blockchains, enabling secure, decentralized transactions like Delivery vs. Payment.
ZKPoT: Private, Scalable Consensus for Blockchain-Secured Federated Learning
A novel Zero-Knowledge Proof of Training (ZKPoT) consensus mechanism uses zk-SNARKs to validate federated learning contributions privately and efficiently, advancing secure decentralized AI.
ZKPoT Consensus Secures Federated Learning for Private, Efficient Blockchains
A novel Zero-Knowledge Proof of Training consensus validates federated learning contributions, eliminating inefficiencies and privacy risks for robust blockchain systems.
Secure Multiparty Protocols Advance Blockchain Fairness and Scalability
This research pioneers protocols leveraging secure computation and zero-knowledge proofs to enable fair, scalable, and private blockchain applications.
Zero-Knowledge Proofs of Quantumness: Securing Quantum Computation Verification
ZKPoQ enables secure verification of quantum computational advantage without revealing sensitive quantum data, safeguarding future quantum protocols.
