There is currently no open grant program.

Awarded Grants


2024, SigSing

1-month long event organized for developing practical MPC/FHE and ZK signatures

Awarded Grants (Pre-2024)

These grants were awarded by CryptoNet and funded by Protocol Labs.

Network Grants Program (closed)

2023, Chaya Ganesh: Rational Protocols
  • Applicants: Chaya Ganesh
  • Projected grant completion date: Fall 2023
  • Project title: Rational Protocols
  • Start date: Oct, 2022
2023, Ghada Almashaqbeh: Delegation in Cryptographic Protocols
  • Applicants: Ghada Almashaqbeh
  • Projected grant completion date: Fall 2023
  • Project title: Delegation in Cryptographic Protocols
  • Start date: Oct, 2022

Fellowships Program (closed)

Summer fellowship

2023, Yevgeniy Dodis: Private, Ordered, Verifiable Databases
  • Applicants: Yevgeniy Dodis
  • Projected grant completion date: Summer 2024
  • Project title: Private, Ordered, Verifiable Databases
  • Start date: Summer 2023

Postdoc Fellowships

2022, Kelsey Melissaris: Witness-based Proxy Cryptography
  • Applicants: Kelsey Melissaris
  • Projected grant completion date: TBD
  • Project title: Witness-based Proxy Cryptography
  • Start date: November 2022
2022, Lior Rotem: SNARKs with Better Efficiency
  • Applicants: Lior Rotem (postdoc), Dan Boneh (PI)
  • Projected grant completion date: Fall 2023, possible 1-year renewal
  • Project title: Succinct Arguments of Knowledge: Better Efficiency via Tighter Concrete Security
  • Start date: September 2022
2023, Akira Takahashi: Post-quantum Commit-and-Prove SNARKs
  • Applicants: Akira Takahashi (postdoc), Markulf Kohlweiss (PI)
  • Institution: University of Edinburgh
  • Projected grant completion date: Spring 2023, possible 1 year renewal
  • Project title: Commit-and-prove zk-SNARKs in the Post-quantum World
  • Start date: November 2022

PhD Fellowships

2023, Weijie Wang: Updatable Vector Commitments with Aggregation
  • Applicants: Weijie Wang (advisee), Charalampos (Babis) Papamanthou (advisor)
  • Projected grant completion date: 01/2025
  • Project title: Updatable Vector Commitments with Natural Aggregation Algorithms
2023, Abhiram Kothapalli: Recursive Arguments
  • Applicants: Abhiram Kothapalli
  • Projected grant completion date: 05/2024
  • Project title: Towards Unlimited-Depth Recursive Arguments
2022, Ioanna Karantaidou: Proofs of Storage
  • Applicants: Ioanna Karantaidou
  • Project title: New Directions in Proof of Storage
  • Start date: Fall 2022
2022, Varun Madathil: Privacy for Decentralized Networks
  • Applicants: Varun Madathil (student), Alessandra Scafuro (advisor)
  • Institution: North Carolina State University
  • Project title: Improving privacy guarantees of Decentralized Networks
  • Start date: January, 2022
2021, Arantxa Zapico: Vector Commitments
  • Applicants: Arantxa Zapico (student), Carla Rafols (advisor)
  • Institution: UPF (Pompeu Fabra University)
  • Projected grant completion date: Nov 30, 2022
  • Project title: Vector Commitments - Linear-map VC
  • Start date: December 1, 2021

RFP Program (closed)

Vector Commitments

2023, Charalampos Papamanthou, Weijie Want: Tree-based VC

Grantees: Charalampos (Babis) Papamanthou (IP), Weijie Wang

Institution: Yale University

Description: This project focuses on tree-based vector commitments.What distinguishes tree-based vector commitments from other vector commitments is the fact that all proofs can be updated/maintained in sublinear time, whenever an element of the vector changes. However, due to this convenience, other challenges arise that we plan to investigate as part of this proposal. For example, it is typically hard to provide aggregation in tree-based vector commitments (e.g., Merkle tree proofs cannot be naturally aggregated) and verification of aggregated proofs can be expensive.


(a) tree-based commitments based on multilinear trees;

(b) tree-based commitments based on RSA groups;

(c) tree-based commitments based on lattices.

Paper: BalanceProofs: Maintainable Vector Commitments with Fast Aggregation

2023, Carla Rafols, Alexandros Zacharakis: Discrete-log VC

Grantees: Carla Rafols (IP), Alexandros Zacharakis

Institution: Universitat Pompeu Fabra

Description: This project focuses on vector commitments in the discrete logarithm setting.

While the discrete logarithm setting is limited, because it does not allow to exploit key structure, it remains quite interesting to explore the problem in this setting for the following reasons:

  1. DLog cryptographic assumptions are clean, extensively studied, and well-understood,
  2. The arithmetic in this setting is more efficient, which could lead to more efficient constructions,
  3. techniques in this setting will probably work in other settings that generalize the discrete logarithm setting, most notably bilinear groups.

Directions: In this project the grantees investigate what subsets of the desired properties of vector commitments can be achieved in the discrete logarithm and with what efficiency. They will use both known techniques mainly inspired from the succinct argument literature, as well as explore new techniques to tackle the problem. Furthermore, the project will explore more restricted scenarios such as designated verifier and distributed trust that can be of practical importance for applications where fully public verifiability is not necessary.

Status: done

2023, Russell Lai, Sri Aravinda Krishnan Thyagarajan, Martin Albrecht, Giulio Malavolta: Lattice-based SNARKs

Grantees: Russell Lai, Sri Aravinda Krishnan Thyagarajan, Martin Albrecht, Giulio Malavolta


  • Friedrich-Alexander University Erlangen-Nuremberg,
  • Royal Holloway - University of London,
  • Max Planck Institute for Security and Privacy

Description:  This project focuses on lattice-based vector commitments.

Being “lattice-based” allows for some advanced functionalities and, critically, enables potentially post-quantum secure constructions. In particular, utilising the flexibility offered by lattices, the team aims for the first direct construction of any vector commitment with functional openings for any constant-degree polynomial. Moreover, to the best of our knowledge, this would be the first example of a lattice-based vector commitment beyond positional openings (for which there are “trivial” constructions from Merkle trees).

Directions:  The proposed construction is likely to only be shown secure against a new family of lattice-based assumptions, which are natural extensions of the short integer solution (SIS) assumption. This family is called the k-Ring Inhomogenous Short Integer Solution assumptions. Such assumptions offer additional algebraic structure, which allows to transfer techniques for pairing-based cryptography to the lattice world.

Paper: Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable in Crypto 2022

2023, Dario Fiore, Dimitris Kolonelos, Dominique Schroder, Hien Chu: Functional VC

Grantees: Dario Fiore, Dimitris Kolonelos, Dominique Schroder, Hien Chu


  • IMDEA Software Institute, Madrid, Spain
  • University of Erlangen-Nürnberg, Germany

Description:  This project focuses on building functional commitments for a larger class of functions.

In functional commitments, an opening not only discloses single vector entries but can also be used to open a function of the committed vector, still in a concise manner. While there exist several realizations of vector commitments under different assumptions and with a variety of efficiency measures, less is known about functional commitments of which only a few schemes are known.

Directions:  This project aims at studying the foundations of functional commitments with a particular focus on the computational assumptions and the minimal efficiency measures needed to build schemes for linear functions and more.

Paper: Inner Product Functional Commitments with Constant-Size Public Parameters and Openings in SCN 2022

Proof of Space

2022, Tal Moran: Redesign PoS

Grantees: Tal Moran

Institution: Reichman University

Description:  The goal of this project is to explore a new direction in constructing proofs of storage that are both useful and suitable for a permissonless consensus algorithm.

Directions: The main idea is to look at converting privately verifiable proofs of storage into publicly verifiable proofs.

Privately verifiable proofs of storage are almost trivial to construct (e.g., encrypt some useful data and send it to the storage provider; without the private key, this data is completely incompressible). Even if we want to guarantee utility of the encoded data to the holder of the data, we have constructions that can provide this. For example, the recent works on incompressible encodings (including my paper with Daniel Wichs from the previous Crypto) show how to encode arbitrary data in a way that prevents compression, but still allows it to be decoded (without requiring a secret key).

Status: done

2022, Danilo Francati, Qiang Tang, Giuseppe Ateniese, Dimitris Papadopoulos: Verifiable Capacity Bound Functions

Grantees: Danilo Francati, Qiang Tang (U. Sydney), Giuseppe Ateniese (GMU), Dimitris Papadopoulos (HKUST)

Institutions: University of Sydney, GMU, HKUST

Description:  Verifiable capacity bound function (VCBF) was recently proposed as a space analog of verifiable delay function. In particular, a VCBF imposes a lower bound on the number of bits read from memory during evaluation (referred to as minimum capacity). No adversary, even unbounded, should produce an output without spending this minimum memory capacity. Moreover, a VCBF allows for an efficient public verification process: Given a proof-of-correctness, checking the validity of the output takes significantly fewer memory resources, sublinear in the target minimum capacity. Finally, it achieves soundness, i.e., no computationally bounded adversary can produce a proof that passes verification for a false output. Despite showing potentials for applications due to the strict enforcement of “energy cost” during function evaluation (and analyzed via the tool of Kolmogorov complexity), VCBF is still at its very beginning, several drawbacks remain, here we list two:

(1) Current VCBF construction is secure in a “restricted model” that the adversary reads only constant blocks. This is only a theoretical cornerstone for a construction eventually in the model that allows the adversary to “adaptively” decide which bits to read.

(2) Directly applying VCBF to proofof-space (PoS), by replacing the hash might not work, as VCBF in its current form does not support proportional capacity growth during parallel evaluations

Status: end date Oct 2022