Highlights
Verifiable Multi-Exponentiation and Multi-Scalar Multiplication (MSM)
Presenting a method for verifying multi-exponentiations and multi-scalar multiplications (MSMs) to facilitate outsourcing these computations, which allows the prover to perform the computation typically done by the verifier.
介绍了一种验证多指数和多标量乘法 (MSM) 的方法,以方便外包这些计算。这允许证明者执行通常由验证者完成的计算。
Lattice-Based Proof Systems
This article explores lattice-based zero-knowledge proofs and their role in post-quantum cryptography for secure and efficient cryptographic protocols.
本文探讨基于格的零知识证明及其在后量子密码学中构建安全高效密码协议的作用。
Circle STARKs: Part II, Circles
This article explores the algebraic foundations of Circle STARKs, introducing the group structure of complex numbers, the unit circle, and its application in the Circle STARKs proof system.
这篇文章探讨了 Circle STARKs 的代数基础,介绍了复数、单位圆的群结构,以及其在 Circle STARKs 证明系统中的应用。
Projects That Shaped Modern zkVMs — Part 1
This post introduces the concept of zkVM and reviews the key projects that have shaped the development of modern zkVM.
这篇文章介绍了 zkVM(零知识虚拟机) 的概念,并回顾了塑造现代 zkVM 发展的关键项目。
Publicly Verifiable & Private Collaborative ML Model Training
This project integrates MPC and ZK to train logistic regression models privately and verifiably using Noir and co-noir tools.
本项目结合 MPC 与 ZK,利用 Noir 和 co-noir 实现私密且可验证的逻辑回归模型训练。
I helped install a quantum computer myself. Is the quantum era coming?[CN]
特稿 | “矛”与“盾”的较量——西安电子科技大学密码学科发展侧记
Known Attacks On Elliptic Curve Cryptography
The article will explain what elliptic curves are, the basic operations that can be performed on them, and how they are used in a cryptographic context, mostly with examples of known attacks against incorrect implementation or misuse.
本系列文章将介绍椭圆曲线是什么、可以对它们执行的基本操作以及如何在加密上下文中使用它们,大部分内容都是针对不正确实现或错误使用的已知攻击示例。
Updates
Ligero Inc. has raised $4M in seed funding
Session 03 of Proof is in the Pudding
@cryptodavidw breaks down a recent paper on Fiat-Shamir, GKR, and how to prove false statements
@cryptodavidw 分析了最近关于 Fiat-Shamir、GKR 以及如何证明虚假陈述的论文。
PQC Rewind (2024 Edition): Stay Agile, Stay Ahead!
A 2024 review of post-quantum cryptography advancements, including hybrid key exchange, ML-KEM vulnerabilities, NIST updates, and Google's quantum chip Willow.
Papers
Fine-Grained Complexity in a World without Cryptography
On Quantum Money and Evasive Obfuscation
Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension
Fully Asymmetric Anamorphic Homomorphic Encryption from LWE
Towards a White-Box Secure Fiat-Shamir Transformation
(Multi-Input) FE for Randomized Functionalities, Revisited
How to Share an NP Statement or Combiners for Zero-Knowledge Proofs
Privacy-Preserving Multi-Signatures: Generic Techniques and Constructions Without Pairings
Traceable Threshold Encryption without Trusted Dealer
Publicly Verifiable Generalized Secret Sharing and Its Application in Building Decentralized Exchange
Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure
Efficient NIZK Arguments with Straight-Line Simulation and Extraction
Stronger Security for Threshold Blind Signatures
If you’d like to receive updates via email, subscribe
us!