Threshold Cryptography Secures Decentralized Location Privacy
A dual-protection framework combines Shamir's secret sharing with a priority-response consensus to achieve provably secure location and query privacy.
Formalizing Restaking Security Reveals Fundamental Sybil Attack Impossibility
Restaking's Sybil vulnerability is formalized, proving no single slashing rule can universally deter all attack types, necessitating mechanism design trade-offs.
Threshold Cryptography Secures Decentralized Location and Query Privacy
New dual-protection framework uses threshold cryptography and token incentives to guarantee provable privacy and timely collaboration in decentralized services.
Secure Sidechain Architecture Boosts Decentralized Resource Market Performance
A novel sidechain architecture introduces mutual-dependence with the mainchain to offload resource market operations, fundamentally enhancing throughput and data efficiency.
