Highlights
Google Quantum AI: Meet Willow, our state-of-the-art quantum chip
New chip demonstrates error correction and performance that paves the way to a useful, large-scale quantum computer
Your definitive guide to zkVMs
The goal of this article is to not only provide objective performance metrics but also talk about the subjective experience while we were building using this toolkit.
Introducing the fhEVM Coprocessor: Run FHE smart contracts on Ethereum, Base, and other EVM chains
Zama’s fhEVM Coprocessor enables confidential smart contracts on EVM chains using FHE, ensuring data privacy, scalability, and composability, supporting applications like private stablecoins, governance, and tokenization, all programmable via Solidity.
Brave: Commitments and zero-knowledge attestations over TLS 1.3: DiStefano protocol
Brave’s DiStefano protocol enables zero-knowledge proofs over TLS 1.3, ensuring secure data commitments, privacy-preserving attestations, and efficient integration for applications like age verification and anti-fraud checks.
Scribe: Low-memory SNARKs via Read-Write Streaming
Scribe!Scribe is a new low-memory SNARK that is able to prove arbitrarily-large circuits while using minimal memory.
zk, verifiability, and privacy projects on Solana
A Technical Dive into Jolt: The RISC-V zkVM
The article provides a detailed explanation of how Jolt zkVM works, covering instruction lookup, offline memory checking, and R1CS constraints to verify RISC-V program correctness using zero-knowledge proofs.
Improving the Security of the Jolt zkVM
The article uncovers critical security flaws in Jolt zkVM, including execution trace validation, output checking, and memory layout issues, detailing their fixes.
Mathematicians Uncover a New Way to Count Prime Numbers
The article details how mathematicians used rough primes and Gowers norms to prove the infinitude of specific prime forms, marking a breakthrough in number theory.
2024 ZK Market Map
Made by Electric Capital, there are five major directions, including: applications, protocols, developer tools and services, interoperability and middleware, and core infrastructure, with the technical difficulty increasing in sequence.
Updates
Keccak256 hash trace proving & verifying with Binius
- https://x.com/bartolomeo_diaz/status/1866025026778198050
- https://keccak.binius.iosis.tech/
- https://github.com/Okm165/binius-web-snark
Papers
【论文速递】Asiacrypt'24(零知识协议、可验证计算、折叠方案、简洁论证)
【论文速递】TCC'2024 (证明、单向函数、格、同态、混淆)
On the Security of LWE-based KEMs under Various Distributions: A Case Study of Kyber
Low Communication Threshold Fully Homomorphic Encryption
Garbled Circuits with 1 Bit per Gate
BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPs
Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based Encryption
BitVM: Quasi-Turing Complete Computation on Bitcoin
Evasive LWE Assumptions: Definitions, Classes, and Counterexamples
Xiezhi: Toward Succinct Proofs of Solvency
Regev's attack on hyperelliptic cryptosystems
The Mis/Dis-information Problem is Hard to Solve
Anonymous credentials from ECDSA
Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures
Crescent: Stronger Privacy for Existing Credentials
Universal SNARGs for NP from Proofs of Correctness
The Existence of Quantum One-Way Functions
On the BUFF Security of ECDSA with Key Recovery
The Revisited Hidden Weight Bit Function
Learnings
0xPARC book: Programmable Cryptography
awesome-miden
Lattice Based Cryptography for Beginners
Introduction to Blockchain Mechanism Math, Terminology, and Hieroglyphics
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!