Threshold Cryptography Secures Decentralized Location Privacy
A dual-protection framework combines Shamir's secret sharing with a priority-response consensus to achieve provably secure location and query privacy.
Expander Signatures Enable Constant-Size Verification for Resource-Constrained Devices
Expander Signatures, a novel cryptographic primitive, decouple heavy key generation from constant-size, lightweight verification, solving the key management burden for IoT devices on-chain.
