Highlights

Google Quantum AI: Meet Willow, our state-of-the-art quantum chip

New chip demonstrates error correction and performance that paves the way to a useful, large-scale quantum computer

Your definitive guide to zkVMs

The goal of this article is to not only provide objective performance metrics but also talk about the subjective experience while we were building using this toolkit.

Introducing the fhEVM Coprocessor: Run FHE smart contracts on Ethereum, Base, and other EVM chains

Zama’s fhEVM Coprocessor enables confidential smart contracts on EVM chains using FHE, ensuring data privacy, scalability, and composability, supporting applications like private stablecoins, governance, and tokenization, all programmable via Solidity.

Brave: Commitments and zero-knowledge attestations over TLS 1.3: DiStefano protocol

Brave’s DiStefano protocol enables zero-knowledge proofs over TLS 1.3, ensuring secure data commitments, privacy-preserving attestations, and efficient integration for applications like age verification and anti-fraud checks.

Scribe: Low-memory SNARKs via Read-Write Streaming

Scribe!Scribe is a new low-memory SNARK that is able to prove arbitrarily-large circuits while using minimal memory.

zk, verifiability, and privacy projects on Solana

A Technical Dive into Jolt: The RISC-V zkVM

The article provides a detailed explanation of how Jolt zkVM works, covering instruction lookup, offline memory checking, and R1CS constraints to verify RISC-V program correctness using zero-knowledge proofs.

Improving the Security of the Jolt zkVM

The article uncovers critical security flaws in Jolt zkVM, including execution trace validation, output checking, and memory layout issues, detailing their fixes.

Mathematicians Uncover a New Way to Count Prime Numbers

The article details how mathematicians used rough primes and Gowers norms to prove the infinitude of specific prime forms, marking a breakthrough in number theory.

2024 ZK Market Map

Made by Electric Capital, there are five major directions, including: applications, protocols, developer tools and services, interoperability and middleware, and core infrastructure, with the technical difficulty increasing in sequence.

Updates

Keccak256 hash trace proving & verifying with Binius

Papers

【论文速递】Asiacrypt'24(零知识协议、可验证计算、折叠方案、简洁论证)

【论文速递】TCC'2024 (证明、单向函数、格、同态、混淆)

On the Security of LWE-based KEMs under Various Distributions: A Case Study of Kyber

Low Communication Threshold Fully Homomorphic Encryption

Garbled Circuits with 1 Bit per Gate

BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPs

Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based Encryption

BitVM: Quasi-Turing Complete Computation on Bitcoin

Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

Xiezhi: Toward Succinct Proofs of Solvency

Regev's attack on hyperelliptic cryptosystems

The Mis/Dis-information Problem is Hard to Solve

Anonymous credentials from ECDSA

Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures

Crescent: Stronger Privacy for Existing Credentials

Universal SNARGs for NP from Proofs of Correctness

The Existence of Quantum One-Way Functions

On the BUFF Security of ECDSA with Key Recovery

The Revisited Hidden Weight Bit Function

Learnings

0xPARC book: Programmable Cryptography

awesome-miden

Lattice Based Cryptography for Beginners

Introduction to Blockchain Mechanism Math, Terminology, and Hieroglyphics


If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!