Distributed Key Management Enhances Central Bank Digital Currency Security
        
        
        
        
          
        
        
      
        
    
        
        This research validates threshold signatures for CBDCs, distributing key control to eliminate single points of failure and bolster financial system resilience.
        
        Batch Processing Eliminates MEV in Automated Market Makers
        
        
        
        
          
        
        
      
        
    
        
        This research introduces a novel batch-processing mechanism for Automated Market Makers, fundamentally mitigating Miner Extractable Value and fostering equitable transaction execution.
        
        Fully Homomorphic Encryption Enables Confidential Computation for Smart Contracts
        
        
        
        
          
        
        
      
        
    
        
        This research introduces a protocol for confidential smart contracts, leveraging Fully Homomorphic Encryption to process encrypted data on-chain, securing sensitive information in decentralized applications.
        
        Eliminating Latency in Blockchain Threshold Cryptosystems for Enhanced Consensus
        
        
        
        
          
        
        
      
        
    
        
        This research eliminates latency overhead for tight threshold cryptosystems, enhancing BFT blockchain efficiency and formalizing unavoidable delays.
        
        Decentralized Accountable Private Threshold Signatures Enhance System Trust
        
        
        
        
          
        
        
      
        
    
        
        DeTAPS introduces decentralized, dynamically accountable, and private threshold signatures, enabling robust, privacy-preserving operations for distributed systems.
        
        BFT-based Verifiable Secret Sharing Secures Distributed Machine Learning
        
        
        
        
          
        
        
      
        
    
        
        A novel Byzantine Fault Tolerant verifiable secret sharing scheme thwarts model poisoning attacks, enhancing privacy and consistency in distributed machine learning.
        
        Distributed Cryptographic Accumulators Revolutionize Certificate Revocation Efficiency
        
        
        
        
          
        
        
      
        
    
        
        AccuRevoke introduces a novel distributed cryptographic accumulator scheme, significantly reducing certificate revocation proof sizes and enhancing PKI scalability and privacy.
        
        Efficient Robust Threshold Signatures for Decentralized Applications
        
        
        
        
          
        
        
      
        
    
        
        This research pioneers a robust, highly efficient threshold ECDSA protocol, dramatically reducing communication and verification costs for securing decentralized systems.
        
        Lattice-Based Non-Interactive Distributed Key Generation for Post-Quantum Security
        
        
        
        
          
        
        
      
        
    
        
        This research introduces a novel lattice-based non-interactive distributed key generation protocol, enabling quantum-resistant, secure key management for future decentralized systems.
        
        Enhanced Threshold RSA Aggregate Signatures Shrink Blockchain Size
        
        
        
        
          
        
        
      
        
    
        
        This research introduces an RSA-based aggregate signature scheme, fundamentally reducing blockchain storage and network traffic by consolidating multiple signatures into one.
        
        Interchain-OS: Modular Framework for Secure Cross-Chain Interoperability
        
        
        
        
          
        
        
      
        
    
        
        A novel modular framework, Interchain-OS, revolutionizes cross-chain interoperability by integrating zero-knowledge proofs and threshold cryptography to enable atomic, secure asset and data exchange across diverse blockchains without sacrificing sovereignty.
        
        Threshold Signatures Secure CBDCs, Distributing Private Key Management
        
        
        
        
          
        
        
      
        
    
        
        This research introduces threshold signature schemes, specifically CGGMP21, to fundamentally enhance Central Bank Digital Currency security by eliminating single points of failure in private key management.
        
        EByFTVeS Fortifies Verifiable Secret Sharing in Privacy-Preserving Machine Learning
        
        
        
        
          
        
        
      
        
    
        
        A novel Byzantine Fault Tolerant verifiable secret-sharing scheme thwarts adaptive model poisoning attacks, ensuring robust consistency in distributed private machine learning.
        
        Batched IBE Enhances Blockchain Privacy and Scalability
        
        
        
        
          
        
        
      
        
    
        
        This research introduces Batched Identity-Based Encryption, a novel primitive enabling selective transaction decryption to advance blockchain mempool privacy and efficiency.
        
        Verifiably Encrypted Threshold Key Derivation Secures On-Chain Privacy
        
        
        
        
          
        
        
      
        
    
        
        vetKD enables dapps to securely derive and transport private cryptographic keys on public blockchains, ensuring data confidentiality without centralized trust.
        
        Efficient Threshold Signatures Enhance Decentralized Application Security
        
        
        
        
          
        
        
      
        
    
        
        This research optimizes threshold ECDSA by leveraging homomorphic encryption, enabling robust, efficient distributed signing with reduced communication overhead for decentralized applications.
        
        Exponent VRFs Streamline Ethereum Validator Key Management Securely
        
        
        
        
          
        
        
      
        
    
        
        A novel DDH-based Exponent VRF transforms Ethereum validator key management from linear to constant complexity, enhancing scalability and privacy.
        
        Decentralized Randomness Beacons Enhance Blockchain Security and Fairness
        
        
        
        
          
        
        
      
        
    
        
        This work introduces an efficient distributed randomness beacon using threshold cryptography, enabling verifiable, unbiased randomness for decentralized systems.
        
        Blockchain-Native Distributed Key Generation Enables On-Chain Verification
        
        
        
        
          
        
        
      
        
    
        
        A novel Distributed Key Generation protocol leverages blockchain consensus to make public keys verifiable on-chain, enhancing decentralized security and trust minimization.
        
        Distributed Verifiable Randomness Secures Consensus and On-Chain Fairness
        
        
        
        
          
        
        
      
        
    
        
        A Distributed Verifiable Random Function, built with threshold cryptography and zk-SNARKs, creates a publicly-verifiable, un-biasable randomness primitive essential for secure leader election and MEV mitigation.
        
        Threshold Encryption Enables Provably Fair Transaction Ordering Minimizing MEV
        
        
        
        
          
        
        
      
        
    
        
        Integrating threshold encryption into the mempool decouples transaction submission from ordering, structurally eliminating frontrunning and centralizing MEV.
        
        Delivery-Fairness Secures Decentralized Randomness Beacons against Time-Advantage Attacks
        
        
        
        
          
        
        
      
        
    
        
        Introducing delivery-fairness, a new formal property, rigorously quantifies and mitigates the time-advantage vulnerability in randomness beacons, ensuring protocol-level fairness.
        
        Lightweight Asynchronous Secret Sharing Achieves Optimal Resilience and Efficiency
        
        
        
        
          
        
        
      
        
    
        
        New protocols for Asynchronous Verifiable Secret Sharing (AVSS) leverage lightweight primitives to achieve optimal resilience and amortized linear communication, fundamentally accelerating BFT consensus.
        
        Adaptive Threshold Schnorr Signatures Achieve Tight Security Proofs
        
        
        
        
          
        
        
      
        
    
        
        New three-round Schnorr threshold scheme, Sparkle+, achieves the first tight, fully adaptive security proof, fundamentally strengthening decentralized key management.
        
        Cryptographic Whistleblowing Secures Protocols against Smart Collusion Incentives
        
        
        
        
          
        
        
      
        
    
        
        This research introduces Cryptographic Whistleblowing, a mechanism design primitive that uses provable on-chain penalties to enforce honesty against financially rational colluders.
        
        Threshold Cryptography Secures Byzantine Consensus with Strong Order-Fairness
        
        
        
        
          
        
        
      
        
    
        
        Themis introduces a threshold-encrypted commit-and-reveal scheme to enforce transaction order based on submission time, mitigating front-running with optimal linear complexity.
        
        Distributed Service Architecture Unifies and Benchmarks Threshold Cryptography Schemes
        
        
        
        
          
        
        
      
        
    
        
        Thetacrypt proposes a unified, distributed service for threshold cryptography, enabling rigorous performance evaluation of diverse schemes under real-world network conditions.
        
        New Asynchronous Key Generation Protocol Boosts Decentralized Security Efficiency
        
        
        
        
          
        
        
      
        
    
        
        A novel Asynchronous Distributed Key Generation protocol drastically lowers the computational cost of threshold cryptosystems, enabling robust, fast decentralized key management.
        
        Federated Distributed Key Generation Secures Threshold Cryptography in Dynamic Decentralized Networks
        
        
        
        
          
        
        
      
        
    
        
        FDKG introduces participant-defined guardian sets, generalizing DKG to dynamic networks and enhancing the resilience of all threshold-based protocols.
