Efficient Byzantine Verifiable Secret Sharing Secures Decentralized Systems Foundationally
EByFTVeS introduces an Adaptive Share Delay Provision strategy to resolve consistency and efficiency burdens in BFT-based Verifiable Secret Sharing, strengthening core cryptographic primitives.
Communication Lower Bounds Redefine Broadcast Efficiency in Dishonest-Majority Systems
New theoretical bounds and a sub-quadratic protocol fundamentally redefine the communication cost for Byzantine broadcast in dishonest-majority networks.
Zero-Knowledge Agreements Resolve Contract Privacy and On-Chain Enforceability Tension
A hybrid protocol uses zero-knowledge proofs and secure computation to enforce confidential legal agreements on-chain without revealing private terms.
Graded Common Subset Enables Linear Asynchronous Byzantine Consensus
Introducing the Graded Common Subset, this breakthrough mechanism achieves linear communication complexity, unlocking highly scalable, fully asynchronous Byzantine consensus for global decentralized systems.
Verifiable Temporal Commitments Secure Time Elapsed without Disclosure
Proof of Time is a novel cryptographic primitive that uses Zero-Knowledge proofs to verify elapsed time while preserving the confidentiality of the initial event's timestamp.
Deterministic Causal Structure Decouples Ledger Correctness from Ordering Policy
This theory introduces a Deterministic Causal Structure (DCS) where the ledger is a policy-agnostic DAG, resolving the entanglement of correctness and ordering.
Formalizing Decentralized Verifiable Computation Mechanism Design Trade-Offs
New framework quantifies how revealing computation results boosts liveness and decentralization over privacy-focused ZK-proof systems.
Data Availability Encoding Yields Zero-Overhead Polynomial Commitments
By unifying data availability encoding with multilinear polynomial commitments, this research eliminates a major proving bottleneck, enabling faster verifiable computation.
Robust Distributed Arrays Secure Data Availability Sampling without Honest Majority
This research introduces Robust Distributed Arrays, a novel distributed data structure that secures the DAS networking layer against malicious actors without relying on an honest majority assumption.
