Expander Signatures Enable Efficient Verification on Resource-Limited Devices
This new cryptographic primitive decouples intensive signature generation from constant-size verification, securing resource-constrained blockchain participation.
New Asynchronous Key Generation Protocol Boosts Decentralized Security Efficiency
A novel Asynchronous Distributed Key Generation protocol drastically lowers the computational cost of threshold cryptosystems, enabling robust, fast decentralized key management.
Expander Signatures Enable Efficient Constant-Size Verification on Resource-Limited Devices
Expander Signature decouples heavy key generation from verification, enabling resource-limited devices to achieve constant-size, efficient, and forward-secure authentication.
SEC Staff Permits State Trust Companies as Qualified Crypto Asset Custodians
The SEC staff’s custody no-action relief expands the qualified custodian universe, strategically de-risking institutional crypto adoption.
SEC Clarifies State Trust Companies Can Custody Digital Assets for Institutions
RIAs must now update compliance frameworks to leverage state-trust custody, ensuring strict asset segregation and private key controls.
Threshold Signatures Enhance Blockchain Security, Decentralization, and Fault Tolerance
A novel cryptographic primitive distributes signing authority across multiple parties, fundamentally mitigating single points of failure and bolstering decentralized system resilience.
SEC Staff Permits State Trust Companies as Qualified Crypto Custodians
This no-action relief provides essential clarity, expanding the qualified custodian universe for institutional digital asset strategies.
Blockchain Secures Private Cloud Deduplication and Auditing, Eliminating Trusted Third Parties
This research introduces a blockchain-smart contract system using identity-based broadcast encryption to enable private, verifiable cloud data deduplication and auditing, removing central trust.
Thetacrypt: Streamlining Threshold Cryptography for Distributed Systems
This research introduces Thetacrypt, a versatile library simplifying the integration of threshold cryptography, enhancing security and distributed trust in blockchain environments.
Moby Protocol Suffers $1.1 Million Private Key Compromise
A compromised private key enabled unauthorized contract upgrades, allowing an attacker to drain assets and exposing critical vulnerabilities in key management systems.
Multi-Party Computation Evolves for Scalable Blockchain Security
A foundational cryptographic breakthrough enables distributed computation and key management without revealing private inputs, unlocking new frontiers for on-chain privacy and robust security.
BtcTurk Hot Wallets Drained by Private Key Compromise
A critical private key compromise enabled attackers to exfiltrate $48 million from BtcTurk's hot wallets across seven distinct blockchains.
Threshold Signatures Secure CBDCs, Distributing Private Key Management
This research introduces threshold signature schemes, specifically CGGMP21, to fundamentally enhance Central Bank Digital Currency security by eliminating single points of failure in private key management.
Shibarium Bridge Validators Compromised, Millions Drained in Exploit
A critical vulnerability in Shibarium's validator key management enabled attackers to manipulate the bridge, leading to significant asset exfiltration.
Shibarium Bridge Compromised by Validator Key Control and Flash Loan Exploit
A critical governance flaw in the Shibarium bridge allowed an attacker to manipulate validator control via a flash loan, enabling unauthorized asset exfiltration.
Unifying Threshold Cryptography for Robust Distributed Systems
Thetacrypt simplifies integrating diverse threshold cryptographic schemes, securing distributed trust and blockchain operations against critical vulnerabilities.
Fully Homomorphic Encryption Enables Confidential Computation for Smart Contracts
This research introduces a protocol for confidential smart contracts, leveraging Fully Homomorphic Encryption to process encrypted data on-chain, securing sensitive information in decentralized applications.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
Truflation Wallets Compromised in $5 Million Malware Attack
Malware compromised Truflation's operational security, enabling unauthorized access to treasury and personal funds, highlighting critical risks in key management.
Distributed Key Management Enhances Central Bank Digital Currency Security
This research validates threshold signatures for CBDCs, distributing key control to eliminate single points of failure and bolster financial system resilience.
BtcTurk Exchange Suffers $48 Million Private Key Compromise
A compromised private key allowed attackers to drain hot wallets across seven blockchains, exposing critical operational security failures.
Adaptive BLS Threshold Signatures Bolster Distributed System Security
This research introduces a novel BLS threshold signature scheme that maintains security against dynamic, adaptive adversaries, critical for robust decentralized systems.
BtcTurk Suffers $48 Million Private Key Compromise across Seven Blockchains
A critical private key compromise enabled attackers to drain $48 million from BtcTurk hot wallets, exposing systemic risks in centralized exchange key management.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
