Empirical Analysis of Secret Leader Election Security in Ethereum PoS
This research empirically evaluates secret leader election mechanisms in Ethereum Proof-of-Stake, revealing vulnerabilities to coordinated attacks despite individual protections.
Ika Dwallet: Revolutionizing Cross-Chain Asset Control with Advanced MPC Cryptography
Ika introduces dWallets and 2PC-MPC cryptography, enabling zero-trust, programmable cross-chain asset control without bridging, fundamentally advancing Web3 interoperability.
Verifiable One-Time Programs Enable Open Secure Computation
This research introduces verifiable one-time programs, foundational for a novel single-round secure computation model, unlocking practical quantum-assisted cryptography with minimal resources.
Fully Homomorphic Encryption Enables Confidential DeFi Lending
A new primitive using Fully Homomorphic Encryption allows public blockchains to facilitate private, institutional-grade DeFi lending, addressing a critical confidentiality gap.
Succinct Zero-Knowledge Arguments for Unknown Order Homomorphic Encryption
This research introduces novel ZK arguments for the CL cryptosystem, enabling private, verifiable computations in unknown order groups for enhanced privacy.
Practical Verifiable Computation over Homomorphically Encrypted Data
A novel transformation for Interactive Oracle Proofs enables efficient verification of computations on encrypted data in the plaintext space.
Delegatable Updatable Private Set Intersection Enhances Dynamic Privacy
A novel framework enables third-party computation and efficient set updates for private set intersection, expanding its utility in dynamic, privacy-preserving distributed systems.
Efficient Threshold Signatures Enhance Decentralized Application Security
This research optimizes threshold ECDSA by leveraging homomorphic encryption, enabling robust, efficient distributed signing with reduced communication overhead for decentralized applications.
Fully Homomorphic Encryption Unlocks Ubiquitous Confidential Smart Contracts On-Chain
The Zama Protocol introduces a novel cross-chain confidentiality layer, leveraging Fully Homomorphic Encryption to enable smart contracts to process encrypted data without decryption, fostering ubiquitous on-chain privacy.
