Highlights

Zero-knowledge proofs

I can prove I’ve solved this Sudoku without revealing it

I can convince you that I’ve solved a sudoku without giving you any information about my solution. We discuss how to do this using what cryptographers call a zero-knowledge proof, and how the same tricks can be used for almost any other problem you can think of.

Quantum Speedup Found for Huge Class of Hard Problems

It’s been difficult to find important questions that quantum computers can answer faster than classical machines, but a new algorithm appears to do it for some critical optimization tasks.

ICICLE-Snark: The Fastest Groth16 Prover in the World

Transpiling a Halo2 circuit into CCS

Updates

Analysis of the Telegram Key Exchange

The Future of Ethereum Scaling: Native Rollups Explained

Timelines for migration to post-quantum cryptography

zkSummit13

Papers

On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations

webSPDZ: Versatile MPC on the Web

Exploring General Cyclotomic Rings in Torus-Based Fully Homomorphic Encryption: Part I - Prime Power Instances

Tighter Concrete Security for the Simplest OT

SCAPEgoat: Side-channel Analysis Library

Ideal Compartmented Secret Sharing Scheme Based on the Chinese Remainder Theorem for Polynomial Rings

Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning

VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials

Server-Aided Anonymous Credentials

On Extractability of the KZG Family of Polynomial Commitment Schemes

Compressed Sigma Protocols: New Model and Aggregation Techniques

Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action

Designated-Verifier SNARGs with One Group Element

Secret-Sharing Schemes for General Access Structures: An Introduction

Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework

Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33

Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More

Deniable Secret Sharing

AI Agents in Cryptoland: Practical Attacks and No Silver Bullet


**If you'd like to receive updates via email, subscribe us!