Quantum Shares Enable Publicly Verifiable Cryptographic Data Deletion
This new quantum-secure primitive introduces publicly verifiable deletion to secret sharing, neutralizing the threat of long-term data breach by cryptographically destroying shares on demand.
Improved Batched Threshold Encryption Secures Private Transaction Ordering
This cryptographic upgrade to Batched Threshold Encryption enables scalable, private mempools, fundamentally eliminating front-running MEV.
Threshold Cryptography Secures Decentralized Location Privacy
A dual-protection framework combines Shamir's secret sharing with a priority-response consensus to achieve provably secure location and query privacy.
BFT Consensus Enables Practical Decentralized Distributed Key Generation
A new framework operationalizes Distributed Key Generation using BFT consensus as a broadcast channel, enabling trustless threshold cryptography for decentralized systems.
Threshold Encryption Secures Transaction Ordering, Eliminating Content-Based MEV
Threshold encryption decouples transaction ordering from content, fundamentally eliminating block producer MEV and ensuring verifiable ordering fairness.
Lattice-Based DKG Secures Asynchronous Systems against Quantum Threats
Research introduces LADKG, a post-quantum DKG protocol integrating AV3S and AACS to enable scalable, publicly verifiable threshold cryptography in asynchronous BFT networks.
Linear-Complexity Secret Sharing Unlocks Scalable Decentralized Randomness Beacons
A novel Publicly Verifiable Secret Sharing scheme reduces complexity to $O(n)$, enabling highly scalable, unbiasable randomness for large-scale consensus.
Accountable Threshold Signatures Achieve Proactive Security with Key Refresh
Accountable Threshold Signatures with Proactive Refresh combine signer traceability with periodic key share updates, mitigating long-term key compromise risk for financial systems.
Fino Protocol Achieves MEV Protection on High-Throughput DAG Consensus
Fino embeds blind order-fairness into DAG-BFT with zero message overhead, securing high-throughput systems against transaction reordering attacks.
