Zero-Knowledge Proofs Extend Bitcoin Capabilities for Privacy and Succinct Verification
Applying zk-STARKs to Bitcoin enables private Proof-of-Reserves and trust-minimized light clients, fundamentally expanding the protocol's utility.
Efficient Byzantine Verifiable Secret Sharing Secures Decentralized AI
New VSS scheme EByFTVeS counters adaptive share delay attacks, significantly improving the security and efficiency of decentralized privacy-preserving computation.
Web Users Targeted by Malware Using Blockchain for Payload Delivery
The EtherHiding campaign leverages smart contracts for resilient, decentralized malware C2, transforming the blockchain into a novel supply chain attack vector.
Asynchronous Dynamic VSS Achieves Optimal Resilience in Byzantine Networks
A new Verifiable Asynchronous Echo primitive enables dynamic secret sharing to tolerate $t < n/2$ faults, securing decentralized services under worst-case network conditions.
Verifiable Delay Functions Secure Decentralized Randomness and Consensus Integrity
The Verifiable Delay Function is a cryptographic time-lock, enforcing a mandatory sequential computation to generate unbiasable randomness, thereby securing consensus leader election.
Equifficient Polynomial Commitments Achieve Smallest SNARK Proof Size
Introducing Equifficient Polynomial Commitments, this work minimizes proof size to 160 bytes and enables free linear gates, dramatically lowering on-chain costs.
Mechanism Design Secures Decentralized Zero-Knowledge Prover Networks
Research translates ZK proving from a centralized bottleneck into a competitive, permissionless market, ensuring modular stack liveness and cost efficiency.
Dynamic Quorum Consensus Decouples BFT Security and Liveness Overhead
Adaptive Threshold Consensus dynamically adjusts finality quorums, radically minimizing communication complexity for highly decentralized BFT networks.
New Delegation Flaw Exploited by Wallet Drainers to Steal User Assets
EIP-7702-style delegation is weaponized to bypass traditional `approve` checks, granting malicious contracts persistent, batch execution authority over user assets.
