Sublinear Space Zero-Knowledge Proofs Democratize Verifiable Computation on All Devices
New ZKP system achieves square-root memory scaling, solving the hardware bottleneck to unlock private computation on mobile and edge devices.
Scalable ZK Proofs for Hashing Integrity Unlock Trustless Blockchain Verification
A new ZK proof methodology for cryptographic hashing, leveraging Plonky2, ensures computational integrity for scalable, trustworthy systems.
FRIDA Formalizes Data Availability Sampling with Transparent Cryptographic Proofs
FRIDA introduces the first formal cryptographic primitive for Data Availability Sampling, enabling trustless, scalable block data verification for modular blockchains.
Compiler Proves Security for Distributed Cryptography via Foundational Unification
A formal compiler proof automatically synthesizes secure, distributed cryptographic protocols from simple centralized code, enabling robust, private systems.
Asynchronous BFT Achieves Throughput-Oblivious Latency and Censorship Resistance
This new aBFT protocol resolves the fundamental throughput-latency tension by concurrently executing transaction dissemination and agreement, ensuring robust censorship resistance.
Kronos: Secure Generic Sharding Consensus Optimizes Cross-Shard Communication Overhead
Kronos introduces a generic sharding consensus with a jointly managed buffer and batch certification, achieving secure, atomic cross-shard transactions with optimal overhead.
Linear-Time ZK Proof System Achieves Optimal Prover Complexity
Cryptographers developed a zero-knowledge argument system achieving optimal linear-time prover complexity, fundamentally unlocking scalable verifiable computation.
Unauthenticated BFT Consensus Achieves Optimal Complexity and Fast Finality
A novel unauthenticated BFT protocol secures consensus with optimal communication and 5-message finality, simplifying architecture and boosting efficiency.
Mechanism Design Revelation Ensures Truthful Proof-of-Stake Consensus
Applying economic revelation mechanisms to Proof-of-Stake protocols forces validators' self-interest to align with network truthfulness, fundamentally securing consensus.
