Highlights
Ethproofs
Ethproofs is the L2beat of zkVMs
Ethproofs 是 zkVM 的 L2beat
MIT 6.5630 Advanced Topics in Cryptography, Fall 2023
This course is about the evolution of proofs in computer science. We will learn about the power of interactive proofs, multi-prover interactive proofs, and probabilistically checkable proofs. We will then show how to use cryptography to convert these powerful proof systems into computationally sound non-interactive arguments (SNARGs).
本课程探讨计算机科学中证明形式的演化。我们将学习交互式证明、多证明者交互式证明以及概率可验证证明的强大之处。之后,我们将展示如何利用密码学将这些强大的证明系统转化为计算上可靠的非交互式论证(SNARGs)。
Blaze will be in Eurocrypt 2025
Blaze is a multilinear polynomial commitment with ultra-efficient proving over binary fields. A step towards 'real-time proving'
Blaze 是一种适用于二元域的多线性多项式承诺方案,具有超高效的证明生成能力。这是迈向「实时证明」的一步。
Updates
Announcing the Scroll Research Blog
Breaking Down the Puzzles in ZK Hack V
Papers
ACM CCS'24
IEEE FOCS 2024
Post-Quantum Online/Offline Signatures
How to Prove False Statements: Practical Attacks on Fiat-Shamir
SoK: PQC PAKEs - Cryptographic Primitives, Design and Security
Module Learning with Errors with Truncated Matrices
Qelect: Lattice-based Single Secret Leader Election Made Practical
Falcon on ARM Cortex-M4: an Update
GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity
Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding
A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures
DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies
Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM
Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials
hax: Verifying Security-Critical Rust Software using Multiple Provers
KZH-Fold: Accountable Voting from Sublinear Accumulation
Practical Asynchronous Distributed Key Reconfiguration and Its Applications
If you’d like to receive updates via email, subscribe
us!