Homomorphic Sortition Secures Proof-of-Stake Leader Election Liveness
Homomorphic Sortition uses Threshold FHE to create the first asynchronous, non-expiring secret leader election, securing PoS liveness.
Post-Quantum Lattice Commitments Secure Zero-Knowledge Proofs and Future Blockchain Scalability
Greyhound introduces the first concretely efficient lattice-based polynomial commitment, securing verifiable computation against quantum threats.
Verifiable Computation for Approximate FHE Unlocks Private AI Scalability
This new cryptographic framework efficiently integrates Verifiable Computation with approximate Homomorphic Encryption, enabling trustless, private AI computation at scale.
Homomorphic Encryption Secures Decentralized Biometric Identity without Privacy Loss
This breakthrough uses Homomorphic Encryption to perform biometric verification directly on encrypted data, enabling a provably private and secure decentralized identity layer.
Empirical Analysis of Secret Leader Election Security in Ethereum PoS
This research empirically evaluates secret leader election mechanisms in Ethereum Proof-of-Stake, revealing vulnerabilities to coordinated attacks despite individual protections.
Ika Dwallet: Revolutionizing Cross-Chain Asset Control with Advanced MPC Cryptography
Ika introduces dWallets and 2PC-MPC cryptography, enabling zero-trust, programmable cross-chain asset control without bridging, fundamentally advancing Web3 interoperability.
Verifiable One-Time Programs Enable Open Secure Computation
This research introduces verifiable one-time programs, foundational for a novel single-round secure computation model, unlocking practical quantum-assisted cryptography with minimal resources.
Fully Homomorphic Encryption Enables Confidential DeFi Lending
A new primitive using Fully Homomorphic Encryption allows public blockchains to facilitate private, institutional-grade DeFi lending, addressing a critical confidentiality gap.
Succinct Zero-Knowledge Arguments for Unknown Order Homomorphic Encryption
This research introduces novel ZK arguments for the CL cryptosystem, enabling private, verifiable computations in unknown order groups for enhanced privacy.
Practical Verifiable Computation over Homomorphically Encrypted Data
A novel transformation for Interactive Oracle Proofs enables efficient verification of computations on encrypted data in the plaintext space.
Delegatable Updatable Private Set Intersection Enhances Dynamic Privacy
A novel framework enables third-party computation and efficient set updates for private set intersection, expanding its utility in dynamic, privacy-preserving distributed systems.
Efficient Threshold Signatures Enhance Decentralized Application Security
This research optimizes threshold ECDSA by leveraging homomorphic encryption, enabling robust, efficient distributed signing with reduced communication overhead for decentralized applications.
Fully Homomorphic Encryption Unlocks Ubiquitous Confidential Smart Contracts On-Chain
The Zama Protocol introduces a novel cross-chain confidentiality layer, leveraging Fully Homomorphic Encryption to enable smart contracts to process encrypted data without decryption, fostering ubiquitous on-chain privacy.
New MPC Scheme Introduces Dwallets for Secure, Scalable Web3 Coordination
Ika's 2PC-MPC cryptography redefines threshold signatures, enabling decentralized dWallets for secure, high-throughput cross-chain asset coordination.
Zama Protocol Enables Confidential Smart Contracts with Fully Homomorphic Encryption
The Zama Protocol introduces a novel architecture enabling fully homomorphic encryption for confidential smart contracts, overcoming blockchain's inherent transparency limitations.
Mind Network, BytePlus Integrate Privacy-First AI with Cryptographic Guarantees
This collaboration establishes a verifiable, privacy-preserving AI infrastructure, empowering enterprises to deploy intelligent agents with cryptographic trust and auditable integrity at scale.
Fully Homomorphic Encryption: Unlocking Ubiquitous Confidentiality for Blockchain Transactions
This research leverages Fully Homomorphic Encryption to enable on-chain computation over encrypted data, fundamentally transforming blockchain transparency into pervasive confidentiality.
Sub-Millisecond FHE Bootstrapping Unlocks Practical Confidential Blockchain Computation
A breakthrough in Fully Homomorphic Encryption bootstrapping slashes computation latency to microseconds, making on-chain confidential smart contracts viable.
Fully Homomorphic Encryption Enables Confidential Computation for Smart Contracts
This research introduces a protocol for confidential smart contracts, leveraging Fully Homomorphic Encryption to process encrypted data on-chain, securing sensitive information in decentralized applications.
Batch Processing Eliminates MEV in Automated Market Makers
This research introduces a novel batch-processing mechanism for Automated Market Makers, fundamentally mitigating Miner Extractable Value and fostering equitable transaction execution.
Ratio1: Decentralized AI Meta-OS for Trustless MLOps
A novel blockchain-based meta-operating system unifies AI development and deployment across edge devices, leveraging homomorphic encryption for privacy.
Fully Homomorphic Encryption Enables Private Shared State on Blockchains
Fully Homomorphic Encryption, offloaded to coprocessors, enables collaborative computation on encrypted blockchain data, fostering truly private shared state.
Secure Multi-Party Computation Enables Private Collaborative Data Processing
Secure Multi-Party Computation enables joint function computation on private data, fostering privacy and collaboration across decentralized systems and sensitive applications.