Distributed Verifiable Random Function Secures Decentralized Unpredictable Public Randomness
A Distributed Verifiable Random Function combines threshold cryptography and zk-SNARKs to generate public, unpredictable, and bias-resistant randomness.
Federated Distributed Key Generation Secures Open Decentralized Networks
Federated Distributed Key Generation enables optional participation in threshold cryptography, securing large, dynamic decentralized systems.
Federated Distributed Key Generation Enables Threshold Cryptography in Open Networks
FDKG introduces heterogeneous trust to DKG, enabling robust threshold cryptosystems in open, asynchronous, and large-scale decentralized systems.
Distributed Service Architecture Unifies Threshold Cryptography Schemes for Reliable Deployment
A new distributed service architecture provides a unified, language-agnostic framework to integrate and accurately benchmark threshold cryptography, accelerating distributed trust applications.
High-Throughput Threshold FHE Decryption Unlocks Practical Universally Composable MPC
A new Universally Composable Threshold FHE decryption protocol achieves high throughput via an offline-online structure, enabling real-time confidential computation.
Decentralized Key Generation Eliminates Single-Point-of-Failure in Threshold Cryptography
A new Distributed Key Generation framework implements Pedersen's protocol over a BFT channel, solving the centralized dealer problem for robust threshold signature schemes.
Threshold Encryption Secures Transaction Ordering Fairness and Mitigates Extractable Value
Threshold encryption decouples transaction submission from execution, forcing validator collusion to extract MEV, thereby enforcing order fairness.
Epochless Batched Threshold Encryption Secures Practical Private Transaction Ordering
BEAT-MEV introduces a novel, epochless Batched Threshold Encryption scheme, eliminating costly MPC setup to enable practical, front-running-resistant private mempools.
Lattice-Based Publicly Verifiable Secret Sharing Achieves Post-Quantum Standard Model Security
Researchers constructed the first lattice-based Publicly Verifiable Secret Sharing scheme, achieving post-quantum security in the rigorous standard model, securing decentralized key management against future threats.
