Cover photo

ZK Insights | 9th Feb 2025

#49

ZK Insights

ZK Insights

Highlights

zkFOCIL: Inclusion List Privacy using Linkable Ring Signatures

使用可链接环签名(LRS)增强 FOCIL 隐私,匿名发布包含列表,提高以太坊抗审查能力。
Use Linkable Ring Signatures (LRS) to enhance FOCIL privacy, anonymously publish inclusion lists, and improve Ethereum's censorship resistance.

New Proofs Probe the Limits of Mathematical Truth

数学家扩展希尔伯特第十问题,证明更多丢番图方程无通用算法,揭示数学不可知性的极限。
Mathematicians extend Hilbert’s 10th problem, proving more Diophantine equations lack general algorithms, revealing limits of mathematical unknowability.

An Introduction to Interactive Theorem Provers

介绍交互式定理证明器(Proof Assistants),如 Lean,助力数学验证和 zkVM 的形式化验证。
Introduction to interactive theorem provers, like Lean, for mathematical verification and zkVM formal verification.

A deep dive into PIR. Revisiting Spiral & Respire - by Prof. David J. Wu

德克萨斯大学的 David J. Wu 教授将向我们介绍他在 PIR 领域的一些最新研究成果。具体来说,就是 Spiral、YPIR 和 Respire 方案。我们将了解它们是如何工作的,建立在什么之上,以及每个方案都带来了什么。

The professor David J. Wu from The University of Texas will introduce us to some of his latest works on the PIR field.Specifically, the schemes Spiral, YPIR and finally Respire.We’ll see how those work, what builds on the top of what and what does each scheme bring to the table.

Introducing ICICLE-Stwo: A GPU-Accelerated Stwo Prover

ICICLE-Stwo 为 Starkware Stwo 证明器 添加 GPU 加速,提升 3.25x–7x 性能,且完全开源
ICICLE-Stwo adds GPU acceleration to Starkware Stwo prover, achieving 3.25x–7x speedup and is fully open-source.

O1Labs: [Project Untitled] Whitepaper (draft)

Updates

ZK Hack V Winners Interview

【漫士】怎么把疯狂的想法变成严谨的数学

Papers

Indocrypt 2024

Quantum function secret sharing

Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World

Secure Showing of Partial Attributes

Learning from Functionality Outputs: Private Join and Compute in the Real World

Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys

Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions

Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography

Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms

SoK: Understanding zk-SNARKs: The Gap Between Research and Practice

A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography

VITARIT: Paying for Threshold Services on Bitcoin and Friends

Updatable Public-Key Encryption, Revisited

HyperLoop: Rationally secure efficient cross-chain bridge

On the Power of Sumcheck in Secure Multiparty Computation


If you’d like to receive updates via email, subscribe us!

Collect this post as an NFT.

Subscribe to ZK Insights to receive new posts directly to your inbox.

ZK Insights | 9th Feb 2025