Oblivious Accumulators Conceal Set Elements and Dynamic Changes
This research introduces oblivious accumulators, a novel cryptographic primitive that hides both the elements and the size of a committed set, fundamentally enhancing privacy in decentralized systems.
Formal Security Comparison: Proof-of-Work Outperforms Proof-of-Stake
This research systematically compares the formal security properties of Proof-of-Work and Proof-of-Stake, clarifying their inherent guarantees and trade-offs.
Zero-Knowledge Mechanisms: Private Commitment without Disclosure or Mediators
This research introduces zero-knowledge mechanisms, enabling verifiable, private economic interactions without revealing underlying rules or requiring trusted intermediaries.
Comparing Solidity and Move Formal Verification for Enhanced Smart Contract Security
This analysis reveals how smart contract language design fundamentally impacts formal verification efficacy, paving the way for more secure blockchain architectures.
Ligetron: Scalable, Post-Quantum, Memory-Efficient Zero-Knowledge Proofs for Web Applications
This research introduces Ligetron, a novel zero-knowledge proof system that leverages WebAssembly semantics to achieve sublinear memory usage and post-quantum security, enabling scalable verifiable computation on commodity hardware and browsers.
Verifiable One-Time Programs Enable Quantum-Assisted Secure Computation
This research introduces verifiable one-time programs, unlocking secure, single-round quantum-assisted computation for critical blockchain and internet applications.
Sublinear-Space Zero-Knowledge Proving for Resource-Constrained Devices
A novel sublinear-space zero-knowledge prover reframes proof generation as tree evaluation, enabling efficient on-device verifiable computation for widespread adoption.
Reputation-Based Byzantine Consensus Enhances IoT Blockchain Efficiency and Security
This research introduces a novel reputation-based Byzantine consensus mechanism, fundamentally improving IoT blockchain scalability and security by reimagining node trust.
Quantum Zero-Knowledge Resists Superposition Attacks with Learning Errors
Researchers introduce novel zero-knowledge protocols, secured by Learning With Errors, to withstand quantum superposition attacks, ensuring privacy in a post-quantum cryptographic landscape.
