Highlights
zkFOCIL: Inclusion List Privacy using Linkable Ring Signatures
使用可链接环签名(LRS)增强 FOCIL 隐私,匿名发布包含列表,提高以太坊抗审查能力。
Use Linkable Ring Signatures (LRS) to enhance FOCIL privacy, anonymously publish inclusion lists, and improve Ethereum's censorship resistance.
New Proofs Probe the Limits of Mathematical Truth
数学家扩展希尔伯特第十问题,证明更多丢番图方程无通用算法,揭示数学不可知性的极限。
Mathematicians extend Hilbert’s 10th problem, proving more Diophantine equations lack general algorithms, revealing limits of mathematical unknowability.
An Introduction to Interactive Theorem Provers
介绍交互式定理证明器(Proof Assistants),如 Lean,助力数学验证和 zkVM 的形式化验证。
Introduction to interactive theorem provers, like Lean, for mathematical verification and zkVM formal verification.
A deep dive into PIR. Revisiting Spiral & Respire - by Prof. David J. Wu
德克萨斯大学的 David J. Wu 教授将向我们介绍他在 PIR 领域的一些最新研究成果。具体来说,就是 Spiral、YPIR 和 Respire 方案。我们将了解它们是如何工作的,建立在什么之上,以及每个方案都带来了什么。
The professor David J. Wu from The University of Texas will introduce us to some of his latest works on the PIR field.Specifically, the schemes Spiral, YPIR and finally Respire.We’ll see how those work, what builds on the top of what and what does each scheme bring to the table.
Introducing ICICLE-Stwo: A GPU-Accelerated Stwo Prover
ICICLE-Stwo 为 Starkware Stwo 证明器 添加 GPU 加速,提升 3.25x–7x 性能,且完全开源。
ICICLE-Stwo adds GPU acceleration to Starkware Stwo prover, achieving 3.25x–7x speedup and is fully open-source.
O1Labs: [Project Untitled] Whitepaper (draft)
Updates
ZK Hack V Winners Interview
【漫士】怎么把疯狂的想法变成严谨的数学
Papers
Indocrypt 2024
Quantum function secret sharing
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World
Secure Showing of Partial Attributes
Learning from Functionality Outputs: Private Join and Compute in the Real World
Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys
Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography
VITARIT: Paying for Threshold Services on Bitcoin and Friends
Updatable Public-Key Encryption, Revisited
HyperLoop: Rationally secure efficient cross-chain bridge
On the Power of Sumcheck in Secure Multiparty Computation
If you’d like to receive updates via email, subscribe
us!