Threshold Cryptography Secures Decentralized Location and Query Privacy
        
        
        
        
          
        
        
      
        
    
        
        New dual-protection framework uses threshold cryptography and token incentives to guarantee provable privacy and timely collaboration in decentralized services.
        
        Homomorphic Sortition Secures Proof-of-Stake Leader Election Liveness
        
        
        
        
          
        
        
      
        
    
        
        Homomorphic Sortition uses Threshold FHE to create the first asynchronous, non-expiring secret leader election, securing PoS liveness.
        
        Federated Distributed Key Generation Enables Robust Threshold Cryptography for Open Networks
        
        
        
        
          
        
        
      
        
    
        
        FDKG introduces optional participation and heterogeneous trust to DKG, resolving the impracticality of key generation in large, dynamic validator sets.
        
        Weighted VRFs Achieve Constant Communication for Stake-Weighted Randomness
        
        
        
        
          
        
        
      
        
    
        
        A new weighted VRF primitive and DKG protocol decouple randomness generation from stake size, solving the efficiency problem for PoS security.
        
        Selective Batched IBE Enables Constant-Cost Threshold Key Issuance
        
        
        
        
          
        
        
      
        
    
        
        This new cryptographic primitive enables distributed authorities to generate a single, succinct decryption key for an arbitrary batch of identities at a cost independent of the batch size, fundamentally solving key management scalability in threshold systems.
        
        PVSS-BFT Achieves Secure, Low-Latency Consensus with Dynamic Node Participation
        
        
        
        
          
        
        
      
        
    
        
        Integrating PVSS and pre-commits into BFT slashes latency to 4δ while securing consensus against up to 50% Byzantine nodes.
        
        Selective Batched IBE Scales Threshold Cryptography by Decoupling Key Issuance
        
        
        
        
          
        
        
      
        
    
        
        Selective Batched IBE introduces a public identity aggregation technique to make threshold decryption key issuance costs independent of batch size, fundamentally scaling private transactions.
        
        Distributed Verifiable Random Function Secures Decentralized Unpredictable Public Randomness
        
        
        
        
          
        
        
      
        
    
        
        A Distributed Verifiable Random Function combines threshold cryptography and zk-SNARKs to generate public, unpredictable, and bias-resistant randomness.
        
        Federated Distributed Key Generation Secures Open Decentralized Networks
        
        
        
        
          
        
        
      
        
    
        
        Federated Distributed Key Generation enables optional participation in threshold cryptography, securing large, dynamic decentralized systems.
        
        Federated Distributed Key Generation Enables Threshold Cryptography in Open Networks
        
        
        
        
          
        
        
      
        
    
        
        FDKG introduces heterogeneous trust to DKG, enabling robust threshold cryptosystems in open, asynchronous, and large-scale decentralized systems.
        
        Distributed Service Architecture Unifies Threshold Cryptography Schemes for Reliable Deployment
        
        
        
        
          
        
        
      
        
    
        
        A new distributed service architecture provides a unified, language-agnostic framework to integrate and accurately benchmark threshold cryptography, accelerating distributed trust applications.
        
        High-Throughput Threshold FHE Decryption Unlocks Practical Universally Composable MPC
        
        
        
        
          
        
        
      
        
    
        
        A new Universally Composable Threshold FHE decryption protocol achieves high throughput via an offline-online structure, enabling real-time confidential computation.
        
        Decentralized Key Generation Eliminates Single-Point-of-Failure in Threshold Cryptography
        
        
        
        
          
        
        
      
        
    
        
        A new Distributed Key Generation framework implements Pedersen's protocol over a BFT channel, solving the centralized dealer problem for robust threshold signature schemes.
        
        Threshold Encryption Secures Transaction Ordering Fairness and Mitigates Extractable Value
        
        
        
        
          
        
        
      
        
    
        
        Threshold encryption decouples transaction submission from execution, forcing validator collusion to extract MEV, thereby enforcing order fairness.
        
        Epochless Batched Threshold Encryption Secures Practical Private Transaction Ordering
        
        
        
        
          
        
        
      
        
    
        
        BEAT-MEV introduces a novel, epochless Batched Threshold Encryption scheme, eliminating costly MPC setup to enable practical, front-running-resistant private mempools.
        
        Lattice-Based Publicly Verifiable Secret Sharing Achieves Post-Quantum Standard Model Security
        
        
        
        
          
        
        
      
        
    
        
        Researchers constructed the first lattice-based Publicly Verifiable Secret Sharing scheme, achieving post-quantum security in the rigorous standard model, securing decentralized key management against future threats.
