Optimal Byzantine Agreement Protocol Minimizes Communication Complexity Adaptively
New authenticated Byzantine agreement protocol achieves optimal $O(ft+t)$ communication complexity by adapting to the actual number of failures, significantly boosting SMR efficiency.
Zero-Knowledge Authenticator Secures Complex Policy Privacy for On-Chain Transactions
Introducing the Zero-Knowledge Authenticator, a new primitive that enables private, complex authentication policies, securing user privacy on public ledgers.
Asynchronous Atomic Broadcast Ensures Optimal Fair Transaction Ordering
The new AOAB protocol uses absolute timestamps in an asynchronous setting to achieve communication-optimal, MEV-resistant transaction finality.
Federated Distributed Key Generation Enables Threshold Cryptography in Open Networks
FDKG introduces heterogeneous trust to DKG, enabling robust threshold cryptosystems in open, asynchronous, and large-scale decentralized systems.
Federated Distributed Key Generation Secures Threshold Cryptography in Dynamic Decentralized Networks
FDKG introduces participant-defined guardian sets, generalizing DKG to dynamic networks and enhancing the resilience of all threshold-based protocols.
Adaptive Sharding Hybrid Consensus Secures Cross-Shard Transactions Efficiently
DynaShard's hybrid consensus, combining global and intra-shard agreement with MPC, resolves sharding's security-scalability trade-off, enabling massive throughput.
Ika Dwallet: Revolutionizing Cross-Chain Asset Control with Advanced MPC Cryptography
Ika introduces dWallets and 2PC-MPC cryptography, enabling zero-trust, programmable cross-chain asset control without bridging, fundamentally advancing Web3 interoperability.
Threshold Signatures Enhance Blockchain Security, Decentralization, and Fault Tolerance
A novel cryptographic primitive distributes signing authority across multiple parties, fundamentally mitigating single points of failure and bolstering decentralized system resilience.
Multi-Party Computation Evolves for Scalable Blockchain Security
A foundational cryptographic breakthrough enables distributed computation and key management without revealing private inputs, unlocking new frontiers for on-chain privacy and robust security.
