Lattice-Based Non-Interactive Distributed Key Generation for Post-Quantum Security
This research introduces a novel lattice-based non-interactive distributed key generation protocol, enabling quantum-resistant, secure key management for future decentralized systems.
Optimal Latency Consensus Achieves $2delta$ Communication by Eliminating Inter-Replica Messaging
A new consensus notion, Pod, eliminates inter-replica communication to achieve physically optimal $2delta$ latency, unlocking ultra-fast, censorship-resistant distributed applications.
Expander Signatures Enable Efficient Constant-Size Verification on Resource-Limited Devices
Expander Signature decouples heavy key generation from verification, enabling resource-limited devices to achieve constant-size, efficient, and forward-secure authentication.
Adaptive Byzantine Agreement Achieves Optimal Communication Parameterized by Actual Faults
This protocol introduces adaptive communication complexity to Byzantine Agreement, establishing tight theoretical bounds and optimizing consensus efficiency for real-world fault conditions.
Expander Signatures Enable Efficient Verification on Resource-Limited Devices
This new cryptographic primitive decouples intensive signature generation from constant-size verification, securing resource-constrained blockchain participation.
Post-Quantum Signatures Eliminate Trapdoors Using Zero-Knowledge Proofs
Lattice-based non-interactive zero-knowledge proofs secure digital signatures against quantum adversaries by removing exploitable trapdoor functions.
Expander Signatures Enable Constant-Size Verification for Resource-Constrained Devices
Expander Signatures, a novel cryptographic primitive, decouple heavy key generation from constant-size, lightweight verification, solving the key management burden for IoT devices on-chain.
Certificateless Proxy Re-Encryption Enables Private Decentralized Data Access Control
Certificateless Proxy Re-Encryption (CL-PRE) securely delegates data access on-chain by eliminating PKI overhead and private key exposure, enabling privacy-preserving data markets.
Constant-Size Accumulators Unlock Truly Stateless Blockchain Architecture
This research introduces constant-size batching techniques for cryptographic accumulators, fundamentally enabling blockchain nodes to achieve constant-time state verification with minimal storage.
