Efficient Verifiable Secret Sharing Secures Distributed BFT Systems
A new BFT-integrated Verifiable Secret Sharing scheme radically lowers cryptographic overhead and eliminates adaptive share delay attacks, securing decentralized computation.
Threshold Cryptography Decentralizes Block Building and Eliminates Centralized MEV Extraction
The Threshold-Secret-Shared Block Construction mechanism uses distributed cryptography to transform centralized MEV extraction into a fair, cooperative process.
Statement Hiders Enable Privacy Preserving Folding Schemes for Verifiable Computation
The Statement Hider primitive blinds zero-knowledge statements before folding, resolving privacy leakage during selective verification for multi-client computation.
Distributed Verifiable Computation Secures Input Privacy and Fault Tolerance
A new distributed verifiable computation primitive guarantees input privacy and result recovery against colluding workers using cryptographic encoding.
Random Linear Coding Decouples Data Availability Sampling and Commitment
The RLNC-DAS paradigm commits to uncoded data, enabling on-demand, highly efficient sample generation that drastically improves data availability certainty.
WARP: Linear Accumulation Unlocks Post-Quantum Scalable Verifiable Computation
Introducing WARP, a hash-based accumulation scheme achieving linear prover time and logarithmic verification, radically accelerating recursive proof systems.
Efficient Post-Quantum Polynomial Commitments Unlock Scalable Zero-Knowledge Cryptography
Greyhound, a lattice-based polynomial commitment scheme, delivers post-quantum security and vastly smaller proof sizes, enabling practical, future-proof zk-SNARKs.
Zero-Knowledge Proof of Time Enables Private Verifiable Temporal Commitments
Proof of Time introduces a ZKP-based primitive that allows proving a time-elapsed commitment without revealing the original event's timestamp, securing time-sensitive decentralized applications.
Distributed Threshold Cryptography Eliminates Single Point of Failure Key Management
This framework introduces a Distributed Threshold Key Management System, using DKG to shard master keys, fundamentally securing decentralized applications.
