Efficient Verifiable Secret Sharing Secures Distributed BFT Systems
A new BFT-integrated Verifiable Secret Sharing scheme radically lowers cryptographic overhead and eliminates adaptive share delay attacks, securing decentralized computation.
Zero-Knowledge Agreements Unify Cryptographic Trust and Legal Enforceability
The zk-agreements protocol integrates zk-SNARKs, MPC, and smart contracts to enforce confidential legal terms, bridging cryptographic and juridical trust.
Optimal Resilience Asynchronous Secret Sharing with Linear Communication
Researchers introduce a new Asynchronous Verifiable Secret Sharing protocol, achieving linear communication complexity with optimal Byzantine resilience, foundational for scalable, trust-minimized computation.
Proofs of Complete Knowledge Restore Unencumbered Secret Ownership in Blockchains
Introducing Proofs of Complete Knowledge (PoCKs), a new primitive that cryptographically enforces unencumbered, single-entity control over private keys, mitigating coercion attacks.
Zero-Knowledge Agreements Resolve Contract Privacy and On-Chain Enforceability Tension
A hybrid protocol uses zero-knowledge proofs and secure computation to enforce confidential legal agreements on-chain without revealing private terms.
Federated Distributed Key Generation Enables Robust Threshold Cryptography for Open Networks
FDKG introduces optional participation and heterogeneous trust to DKG, resolving the impracticality of key generation in large, dynamic validator sets.
Cryptographic Whistleblowing Secures Protocols against Smart Collusion Incentives
This research introduces Cryptographic Whistleblowing, a mechanism design primitive that uses provable on-chain penalties to enforce honesty against financially rational colluders.
