Distributed Verifiable Randomness Secures Consensus and On-Chain Fairness
A Distributed Verifiable Random Function, built with threshold cryptography and zk-SNARKs, creates a publicly-verifiable, un-biasable randomness primitive essential for secure leader election and MEV mitigation.
Rondo Protocol Achieves Scalable, Dynamic Distributed Randomness Beacon
The Rondo protocol introduces Batched Asynchronous Verifiable Secret Sharing with Partial Output, enabling dynamic node membership and optimal $O(n)$ message complexity for scalable, unpredictable randomness.
Rondo Protocol Achieves Optimal Linear Complexity for Decentralized Randomness Beacon Sharing
Rondo introduces batched asynchronous verifiable secret sharing with partial output, cutting message complexity to linear for scalable, reconfigurable randomness beacons.
Lattice-Based Publicly Verifiable Secret Sharing Achieves Post-Quantum Standard Model Security
Researchers constructed the first lattice-based Publicly Verifiable Secret Sharing scheme, achieving post-quantum security in the rigorous standard model, securing decentralized key management against future threats.
Federated Distributed Key Generation Enables Threshold Cryptography in Open Networks
FDKG introduces heterogeneous trust to DKG, enabling robust threshold cryptosystems in open, asynchronous, and large-scale decentralized systems.
Weighted VRFs Achieve Constant Communication for Stake-Weighted Randomness
A new weighted VRF primitive and DKG protocol decouple randomness generation from stake size, solving the efficiency problem for PoS security.
Optimal Polynomial Commitment Batching Unlocks Scalable Decentralized Cryptography
New KZG batching algorithm achieves optimal $O(N log N)$ prover time and constant proof size, dramatically accelerating Verifiable Secret Sharing.
Constant-Size Polynomial Commitments Unlock Scalable Zero-Knowledge Proof Systems
This cryptographic primitive allows a constant-size commitment to any polynomial, fundamentally decoupling proof size from computation complexity.
Lattice-Based DKG Secures Asynchronous Systems against Quantum Threats
Research introduces LADKG, a post-quantum DKG protocol integrating AV3S and AACS to enable scalable, publicly verifiable threshold cryptography in asynchronous BFT networks.
