In sum, this means (i) more efficient folding SNARKs (no heavy hash-gadget proofs), (ii) better security (no FS-in-circuit hacks), and (iii) a new paradigm for more scalable post-quantum succinct proofs.
17.10.2025 17:24 β π 1 π 0 π¬ 0 π 0
We diverge from recursive folding and propose
(i) a lattice folding scheme that folds thousands of statements in one shot. So folding depth 1-2 is enough for most use cases;
(ii) a framework to turn any group or lattice folding schemes into SNARKs without embedding FS circuits.
17.10.2025 17:24 β π 1 π 0 π¬ 1 π 0
A recent groundbreaking attack (eprint.iacr.org/2025/118.pdf)
shows that proving FS inside SNARK circuits might be risky. Worse still, hashes are expensive to prove, and an efficiency bottleneck of existing folding-based IVC/PCD is indeed the overhead for proving hash computations.
17.10.2025 17:24 β π 0 π 0 π¬ 1 π 0
Typical folding-based SNARKs rely on recursive folding: each step verifies the correctness of the previous step by running a folding verifier. However, folding verifiers are made non-interactive via Fiat-Shamir. So you must prove the hash computations of FS inside the circuit.
17.10.2025 17:24 β π 0 π 0 π¬ 1 π 0
Excited to share eprint.iacr.org/2025/1905.pdf that re-envisions how to use folding/accumulation in succinct proof systems.
We provide a new framework to build folding-based SNARKs by eliminating the need to prove Fiat-Shamir inside circuits and by introducing a high-arity lattice folding scheme.
17.10.2025 17:24 β π 2 π 2 π¬ 1 π 0
eprint.iacr.org/2025/620.pdf
Exciting paper that accelerates Hyperplonk proof generation by 801x over CPUs.
11.04.2025 16:10 β π 5 π 0 π¬ 0 π 0
Security and Privacy of Machine Learning at UofT, Vector Institute, and Google π¨π¦π«π·πͺπΊ Co-Director of Canadian AI Safety Institute (CAISI) Research Program at CIFAR. Opinions mine
Cryptography and ZK. Research Scientist at Offchain Labs.
Web: binarywhales.com
Theoretical Computer Scientist and Cryptographer at U. Salerno, Italy. Juventino.
Lecturer in Cryptography at the University of Tartu.
From Estonia.
ZK proofs, SNARKs, security assumptions.
Homepage: https://sites.google.com/view/jannosiim
PhD Student at UMD studying Cryptography
website: sasha.place
Formerly at Meta/Cornell
PhD candidate @ Stanford Applied Cryptography Group
https://c.rypto.systems/
Associate Professor in Cryptology and Research Group Leader at the NTNU Applied Cryptology Lab in Trondheim, Norway.
Homepage: https://tjerandsilde.no
Research group: https://www.ntnu.edu/iik/nacl-lab
PhD student in Yale Applied Cryptography Lab working on scaling zero-knowledge proofs
www.hadasze.me
X: @idocryptography
Just joined BlueSky!
Assistant Professor at Cornell. CS theory, cryptography, quantum computing. he/him
Principal Researcher @ Hashgraph | Interested in Cryptography and Security | https://pratyay.net/
Iβm a cryptographer working on digital signatures, consensus algorithms, and more. Professor for Computer Science at Ruhr University Bochum.
Unofficial bot tracking the IACR Cryptology ePrint Archive (eprint.iacr.org). Maintained by @str4d.xyz.
Currently only posts about new papers. Author names are linkified to Bluesky accounts (cryptography.social); contact maintainer for inclusion/removal.
Zcash's official load-bearing catgirl. The only good fascist is a dead fascist. How to pronounce my name: 'dΙΛΙΉΙ 'ΙmΙ 'hΙΜpwΚd
CEO @ingonyama.com | High-speed, fancy cryptography.
Loves all languages; speaks only in math.
I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com
Security Engineer interested in cryptography, information security, & privacy engineering.
Applied Scientist at AWS β’ Cryptographer β’ My opinions are my own β’ π³οΈβπ (he/him)
(Real world) Cryptographer.
chelseakomlo.com for more info.