Threshold Signatures Enhance Blockchain Security, Decentralization, and Fault Tolerance
A novel cryptographic primitive distributes signing authority across multiple parties, fundamentally mitigating single points of failure and bolstering decentralized system resilience.
SEC Staff Permits State Trust Companies as Qualified Crypto Custodians
Institutional investors gain critical operational clarity as the SEC affirms State Trust Companies satisfy Qualified Custodian requirements for digital assets.
Blockchain Secures Private Cloud Deduplication and Auditing, Eliminating Trusted Third Parties
This research introduces a blockchain-smart contract system using identity-based broadcast encryption to enable private, verifiable cloud data deduplication and auditing, removing central trust.
Thetacrypt: Streamlining Threshold Cryptography for Distributed Systems
This research introduces Thetacrypt, a versatile library simplifying the integration of threshold cryptography, enhancing security and distributed trust in blockchain environments.
Moby Protocol Suffers $1.1 Million Private Key Compromise
A compromised private key enabled unauthorized contract upgrades, allowing an attacker to drain assets and exposing critical vulnerabilities in key management systems.
Multi-Party Computation Evolves for Scalable Blockchain Security
A foundational cryptographic breakthrough enables distributed computation and key management without revealing private inputs, unlocking new frontiers for on-chain privacy and robust security.
BtcTurk Hot Wallets Drained by Private Key Compromise
A critical private key compromise enabled attackers to exfiltrate $48 million from BtcTurk's hot wallets across seven distinct blockchains.
Threshold Signatures Secure CBDCs, Distributing Private Key Management
This research introduces threshold signature schemes, specifically CGGMP21, to fundamentally enhance Central Bank Digital Currency security by eliminating single points of failure in private key management.
Shibarium Bridge Validators Compromised, Millions Drained in Exploit
A critical vulnerability in Shibarium's validator key management enabled attackers to manipulate the bridge, leading to significant asset exfiltration.
