Templar Launches Cypher Lending Unlocking Native Bitcoin Decentralized Finance
The Cypher Lending model uses MPC and immutable contracts to bypass custodial risk, establishing a truly permissionless primitive for Bitcoin's $1.3T asset base.
Compiler Proves Security for Distributed Cryptography via Foundational Unification
A formal compiler proof automatically synthesizes secure, distributed cryptographic protocols from simple centralized code, enabling robust, private systems.
Cryptographic Second-Price Auction Achieves Off-Chain Influence-Proof Transaction Fee Mechanism
The Cryptographic Second-Price Auction (C2PA) overcomes TFM impossibility by encrypting user bids, eliminating miner off-chain influence and achieving strategic simplicity.
Scalable Collaborative zk-SNARKs Distribute Proof Generation for Massive Speedup
This collaborative zk-SNARK system distributes complex proof generation across multiple parties, achieving over 30x speedup and unlocking practical verifiable computation delegation.
Collaborative Zero-Knowledge Proofs Secure Distributed Secrets Efficiently
This research introduces Collaborative zk-SNARKs, a cryptographic primitive allowing distributed parties to prove a statement about their collective secret data without centralization, achieving near-single-prover efficiency.
IBM Launches Multi-Chain Platform for Institutional Digital Asset Management and Settlement
The full-stack platform unifies digital asset operations across 40+ chains, accelerating institutional market entry while ensuring enterprise-grade compliance and security.
IBM Launches Digital Asset Haven Platform for Institutional Blockchain Engagement
The platform provides a compliant, multi-chain architectural layer, enabling financial institutions to transform digital asset management into a scalable core business function.
Collaborative zk-SNARKs Enable Private, Decentralized, Scalable Proof Generation
Scalable collaborative zk-SNARKs use MPC to secret-share the witness, simultaneously achieving privacy and $24times$ faster proof outsourcing.
Multi-Party Computation Enables Fairer Incentive-Compatible Transaction Fee Mechanisms
Cryptography, via Multi-Party Computation among block producers, circumvents game-theoretic impossibility results to design non-trivial, incentive-compatible fee mechanisms.
