Highlights
Zero-knowledge proofs
I can prove I’ve solved this Sudoku without revealing it
I can convince you that I’ve solved a sudoku without giving you any information about my solution. We discuss how to do this using what cryptographers call a zero-knowledge proof, and how the same tricks can be used for almost any other problem you can think of.
Quantum Speedup Found for Huge Class of Hard Problems
It’s been difficult to find important questions that quantum computers can answer faster than classical machines, but a new algorithm appears to do it for some critical optimization tasks.
ICICLE-Snark: The Fastest Groth16 Prover in the World
Transpiling a Halo2 circuit into CCS
Updates
Analysis of the Telegram Key Exchange
The Future of Ethereum Scaling: Native Rollups Explained
Timelines for migration to post-quantum cryptography
zkSummit13
Papers
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
webSPDZ: Versatile MPC on the Web
Exploring General Cyclotomic Rings in Torus-Based Fully Homomorphic Encryption: Part I - Prime Power Instances
Tighter Concrete Security for the Simplest OT
SCAPEgoat: Side-channel Analysis Library
Ideal Compartmented Secret Sharing Scheme Based on the Chinese Remainder Theorem for Polynomial Rings
Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning
VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials
Server-Aided Anonymous Credentials
On Extractability of the KZG Family of Polynomial Commitment Schemes
Compressed Sigma Protocols: New Model and Aggregation Techniques
Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action
Designated-Verifier SNARGs with One Group Element
Secret-Sharing Schemes for General Access Structures: An Introduction
Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework
Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33
Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More
Deniable Secret Sharing
AI Agents in Cryptoland: Practical Attacks and No Silver Bullet
**If you'd like to receive updates via email, subscribe us!