Efficient Non-Malleable Zero-Knowledge via Instance-Based Commitment Primitive
A new commitment primitive enables the first practical non-malleable zero-knowledge proofs, securing concurrent protocols without performance loss.
MAD-DAG: Novel Ledger Function Secures Consensus against Selfish MEV Mining
A new DAG ledger function cryptographically destroys conflicting MEV, raising the selfish mining security threshold to ensure protocol integrity.
Recursive Zero-Knowledge Secures Private Verifiable AI Model Inference
The new recursive ZK framework allows constant-size proofs for massive AI models, solving the critical trade-off between model privacy and verifiability.
Zero-Knowledge Proofs Extend Bitcoin Capabilities for Privacy and Succinct Verification
Applying zk-STARKs to Bitcoin enables private Proof-of-Reserves and trust-minimized light clients, fundamentally expanding the protocol's utility.
Verifiable Computation Secures Approximate Homomorphic Encryption for Private AI
New polynomial interactive proofs efficiently verify complex, non-algebraic homomorphic encryption operations, unlocking trustless, private computation on real-world data.
Threshold Cryptography Secures Location Privacy against Collusion and Trust
A new framework combines secret sharing and token incentives on temporary private chains to provably secure location data against third-party trust and collusion.
Lattice-Based Folding Secures Recursive Zero-Knowledge Proofs against Quantum Threats
LatticeFold is the first post-quantum folding scheme, leveraging lattice cryptography to enable quantum-resistant, efficient recursive proof systems.
Single-Root Context-Isolated Identity Primitive Secures Decentralized Systems
MSCIKDF introduces a single-root, context-isolated identity primitive, transforming monolithic key management into a stateless, PQC-pluggable derivation architecture.
Robust Distributed Arrays Secure Data Availability Sampling Networking Layer
Researchers introduce Robust Distributed Arrays, a novel distributed data structure that secures the DAS networking layer based on absolute honest nodes, enabling scalable data availability.
