Cover photo

ZK Insights | 2nd Feb 2025

#48

ZK Insights

ZK Insights

Highlights

Ethproofs

Ethproofs is the L2beat of zkVMs

Ethproofs 是 zkVM 的 L2beat

MIT 6.5630 Advanced Topics in Cryptography, Fall 2023

This course is about the evolution of proofs in computer science. We will learn about the power of interactive proofs, multi-prover interactive proofs, and probabilistically checkable proofs. We will then show how to use cryptography to convert these powerful proof systems into computationally sound non-interactive arguments (SNARGs).

本课程探讨计算机科学中证明形式的演化。我们将学习交互式证明、多证明者交互式证明以及概率可验证证明的强大之处。之后,我们将展示如何利用密码学将这些强大的证明系统转化为计算上可靠的非交互式论证(SNARGs)。

Blaze will be in Eurocrypt 2025

Blaze is a multilinear polynomial commitment with ultra-efficient proving over binary fields. A step towards 'real-time proving'

Blaze 是一种适用于二元域的多线性多项式承诺方案,具有超高效的证明生成能力。这是迈向「实时证明」的一步。

Updates

Announcing the Scroll Research Blog

Breaking Down the Puzzles in ZK Hack V

Papers

ACM CCS'24

IEEE FOCS 2024

Post-Quantum Online/Offline Signatures

How to Prove False Statements: Practical Attacks on Fiat-Shamir

SoK: PQC PAKEs - Cryptographic Primitives, Design and Security

Module Learning with Errors with Truncated Matrices

Qelect: Lattice-based Single Secret Leader Election Made Practical

Falcon on ARM Cortex-M4: an Update

GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes

Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity

Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding

A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures

DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions

PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies

Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM

Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials

hax: Verifying Security-Critical Rust Software using Multiple Provers

KZH-Fold: Accountable Voting from Sublinear Accumulation

Practical Asynchronous Distributed Key Reconfiguration and Its Applications


If you’d like to receive updates via email, subscribe us!

Collect this post as an NFT.

Subscribe to ZK Insights to receive new posts directly to your inbox.

ZK Insights | 2nd Feb 2025