Adaptively Secure BLS Threshold Signatures from Standard Cryptographic Assumptions
        
        
        
        
          
        
        
      
        
    
        
        A new threshold signature scheme achieves adaptive security with standard assumptions, fundamentally hardening distributed trust primitives for decentralized systems.
        
        Distributed Threshold Encryption Mitigates MEV for Provably Fair Transaction Ordering
        
        
        
        
          
        
        
      
        
    
        
        Distributed threshold encryption conceals transaction content from block producers, enforcing fair ordering and eliminating front-running opportunities.
        
        Threshold Encryption Eliminates MEV at Consensus Layer
        
        
        
        
          
        
        
      
        
    
        
        Blockchain Integrated Threshold Encryption cryptographically conceals transaction data until finality, making front-running impossible and securing decentralized finance.
        
        Federated Distributed Key Generation Enables Robust Threshold Cryptography for Open Networks
        
        
        
        
          
        
        
      
        
    
        
        FDKG introduces optional participation and heterogeneous trust to DKG, resolving the impracticality of key generation in large, dynamic validator sets.
        
        Accountable Sharding Secures State with Proactive Key Rotation and Global Economic Deterrents
        
        
        
        
          
        
        
      
        
    
        
        A new sharding model leverages proactive secret sharing and global slashing to eliminate the 1/N security vulnerability, enabling scalable and robust decentralized architectures.
        
        Optimal Polynomial Commitment Batching Unlocks Scalable Decentralized Cryptography
        
        
        
        
          
        
        
      
        
    
        
        New KZG batching algorithm achieves optimal O(N log N) prover time and constant proof size, dramatically accelerating Verifiable Secret Sharing.
        
        Weighted VRFs Achieve Constant Communication for Stake-Weighted Randomness
        
        
        
        
          
        
        
      
        
    
        
        A new weighted VRF primitive and DKG protocol decouple randomness generation from stake size, solving the efficiency problem for PoS security.
        
        Decentralized Functional Encryption Secures Multi-Party Private Computation without Trust
        
        
        
        
          
        
        
      
        
    
        
        This new cryptographic primitive enables multiple independent parties to compute joint functions on encrypted data, eliminating the central authority trust bottleneck.
        
        Federated Distributed Key Generation Enables Threshold Cryptography in Open Networks
        
        
        
        
          
        
        
      
        
    
        
        FDKG introduces heterogeneous trust to DKG, enabling robust threshold cryptosystems in open, asynchronous, and large-scale decentralized systems.
        
        Decentralized Key Generation Eliminates Single-Point-of-Failure in Threshold Cryptography
        
        
        
        
          
        
        
      
        
    
        
        A new Distributed Key Generation framework implements Pedersen's protocol over a BFT channel, solving the centralized dealer problem for robust threshold signature schemes.
        
        Threshold Encryption Secures Transaction Ordering Fairness and Mitigates Extractable Value
        
        
        
        
          
        
        
      
        
    
        
        Threshold encryption decouples transaction submission from execution, forcing validator collusion to extract MEV, thereby enforcing order fairness.
        
        Lattice-Based Publicly Verifiable Secret Sharing Achieves Post-Quantum Standard Model Security
        
        
        
        
          
        
        
      
        
    
        
        Researchers constructed the first lattice-based Publicly Verifiable Secret Sharing scheme, achieving post-quantum security in the rigorous standard model, securing decentralized key management against future threats.
        
        Federated Distributed Key Generation Secures Threshold Cryptography in Dynamic Decentralized Networks
        
        
        
        
          
        
        
      
        
    
        
        FDKG introduces participant-defined guardian sets, generalizing DKG to dynamic networks and enhancing the resilience of all threshold-based protocols.
        
        New Asynchronous Key Generation Protocol Boosts Decentralized Security Efficiency
        
        
        
        
          
        
        
      
        
    
        
        A novel Asynchronous Distributed Key Generation protocol drastically lowers the computational cost of threshold cryptosystems, enabling robust, fast decentralized key management.
        
        Rondo Protocol Achieves Optimal Linear Complexity for Decentralized Randomness Beacon Sharing
        
        
        
        
          
        
        
      
        
    
        
        Rondo introduces batched asynchronous verifiable secret sharing with partial output, cutting message complexity to linear for scalable, reconfigurable randomness beacons.
        
        Threshold Cryptography Enforces Fair Transaction Ordering Mitigating MEV
        
        
        
        
          
        
        
      
        
    
        
        A distributed threshold cryptosystem decouples transaction ordering from content knowledge, mathematically eliminating frontrunning risk and centralizing MEV incentives.
        
        Adaptive Threshold Schnorr Signatures Achieve Tight Security Proofs
        
        
        
        
          
        
        
      
        
    
        
        New three-round Schnorr threshold scheme, Sparkle+, achieves the first tight, fully adaptive security proof, fundamentally strengthening decentralized key management.
        
        Lightweight Asynchronous Secret Sharing Achieves Optimal Resilience and Efficiency
        
        
        
        
          
        
        
      
        
    
        
        New protocols for Asynchronous Verifiable Secret Sharing (AVSS) leverage lightweight primitives to achieve optimal resilience and amortized linear communication, fundamentally accelerating BFT consensus.
        
        Distributed Verifiable Randomness Secures Consensus and On-Chain Fairness
        
        
        
        
          
        
        
      
        
    
        
        A Distributed Verifiable Random Function, built with threshold cryptography and zk-SNARKs, creates a publicly-verifiable, un-biasable randomness primitive essential for secure leader election and MEV mitigation.
        
        Blockchain-Native Distributed Key Generation Enables On-Chain Verification
        
        
        
        
          
        
        
      
        
    
        
        A novel Distributed Key Generation protocol leverages blockchain consensus to make public keys verifiable on-chain, enhancing decentralized security and trust minimization.
        
        Threshold Signatures Enhance Blockchain Security, Decentralization, and Fault Tolerance
        
        
        
        
          
        
        
      
        
    
        
        A novel cryptographic primitive distributes signing authority across multiple parties, fundamentally mitigating single points of failure and bolstering decentralized system resilience.
        
        Lattice-Based Non-Interactive Distributed Key Generation for Post-Quantum Security
        
        
        
        
          
        
        
      
        
    
        
        This research introduces a novel lattice-based non-interactive distributed key generation protocol, enabling quantum-resistant, secure key management for future decentralized systems.
        
        Efficient Robust Threshold Signatures for Decentralized Applications
        
        
        
        
          
        
        
      
        
    
        
        This research pioneers a robust, highly efficient threshold ECDSA protocol, dramatically reducing communication and verification costs for securing decentralized systems.
        
        Novel Protocols Advance Decentralized Cross-Chain Communication and Security
        
        
        
        
          
        
        
      
        
    
        
        This research introduces new cryptographic protocols for seamless blockchain interoperability, enabling secure asset transfers and smart contract calls across disparate networks.
