Restructuring Gas Incentives Enable Safe Parallel EVM Execution
Restructured gas mechanics and transaction access boundaries enable safe, parallel EVM execution, dramatically improving blockchain throughput and lowering transaction costs.
Binius and Ligero Unlock Efficient Post-Quantum Client-Side Zero-Knowledge Proving
Benchmarking Binius and Ligero identifies the most efficient post-quantum, transparent ZKPs for mobile devices, enabling secure, scalable decentralized identity.
Transparent Constant-Sized Polynomial Commitments Enable Practical Trustless zk-SNARKs
Dew introduces the first transparent polynomial commitment scheme with constant proof size and logarithmic verification, eliminating the trusted setup barrier for succinct verifiable computation.
Non-Interactive Verifiable Aggregation Secures Private Decentralized Data Computation
A new cryptographic primitive, NIVA, combines functional encryption and verifiable proofs to enable private, robust, and non-interactive data aggregation by untrusted servers.
Non-Delegatable Commitments Enforce Cryptographic Proof of Work and Identity
Non-Delegatable Commitments cryptographically bind action to private key possession, preventing outsourcing and enforcing honest participation in attestations.
Zero-Knowledge Proof Consensus Secures Decentralized Machine Learning without Accuracy Trade-Offs
ZKPoT consensus uses zk-SNARKs to privately verify model training quality, resolving the efficiency-privacy trade-off in decentralized AI.
Lattice-Based Functional Commitments Secure All Functions with Transparent Post-Quantum Setup
New lattice-based functional commitments secure all functions, enabling post-quantum verifiable computation without a trusted setup.
AI-Native Cryptography Secures Open AI Models with Fingerprinting
Model fingerprinting, an AI-native cryptographic primitive, transforms backdoor attacks into a verifiable ownership mechanism, securing open-source AI monetization.
Decentralizing Attribute Encryption Eliminates Single Authority Trust Risk
A blockchain-based mechanism distributes key generation for CP-ABE, resolving the centralized trusted authority problem and securing outsourced data access.