Cover photo

ZK Insights | 9th Mar 2025

#53

ZK Insights

ZK Insights

Highlights

Introducing ZKnox

This new research organization is at the forefront of advanced cryptography, backed by a grant from the Ethereum Foundation. Their mission: provide high impact open source code that improves Ethereum security and efficiency.

这个新研究组织处于先进加密技术的前沿,由以太坊基金会资助。他们的使命:提供高影响力的开源代码,以提高以太坊的安全性和效率。

BitVM: Unlocking Arbitrary Computation on Bitcoin Through Circuit Abstractions

BitVM enables arbitrary computation on Bitcoin via circuit abstractions, overcoming UTXO limitations using covenants, statefulness, and branching.

BitVM 通过电路抽象在比特币上实现任意计算,利用契约、状态保持和分支克服 UTXO 限制。

The Ethereum Cypherpunk Manifesto

Updates

TFHE-rs v1.0.0

zkVMs benchmarks

Unearthing the Reality of zkTLS: A Benchmarking and Cryptanalysis Report

Visual Algebra YouTube lectures

World-leaders in Cryptography: Anna Lysyanskaya

D/INFRA SUMMIT 2025 | ETHDENVER

Papers

The Algebraic One-More MISIS Problem and Applications to Threshold Signatures

Fine-Grained Verifier NIZK and Its Applications

Black-Box (and Fast) Non-Malleable Zero Knowledge

Commitment Schemes Based on Module-LIP

BUFFing Threshold Signature Schemes

A Note on Obfuscation-based Attacks on Private-coin Evasive LWE

Non-Interactive Verifiable Aggregation

Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments

ProofFrog: A Tool For Verifying Game-Hopping Proofs

Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More

Low Communication Threshold FHE from Standard (Module-)LWE

Hybrid Obfuscated Key Exchange and KEMs

Delegatable ABE with Full Security from Witness Encryption

Withdrawable signatures in Fiat-Shamir with aborts constructions

SNARKs for Stateful Computations on Authenticated Data

Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions

Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model

Blind Signatures from Cryptographic Group Actions

Reducing the Number of Qubits in Solving LWE

An Efficient Quantum Oblivious Transfer Protocol

Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity

Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions)

Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures

MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs

On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols

A Complete Security Proof of SQIsign

Evasive LWE: Attacks, Variants & Obfustopia

Simple and General Counterexamples for Private-Coin Evasive LWE

Split Prover Zero-Knowledge SNARKs

Polynomial Secret Sharing Schemes and Algebraic Matroids

Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally

Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY

Lattice-Based Updatable Public-Key Encryption for Group Messaging

Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality

Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials

A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol

The Complexity of Memory Checking with Covert Security

Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions

Commit-and-Prove System for Vectors and Applications to Threshold Signing


If you'd like to receive updates via email, subscribe us!

Collect this post as an NFT.

Subscribe to ZK Insights to receive new posts directly to your inbox.

ZK Insights | 9th Mar 2025