Transparent Polynomial Commitment Achieves Constant Proof Size and Verifier Time
Behemoth is a new transparent Polynomial Commitment Scheme that eliminates trusted setup while delivering constant-time verification, fundamentally changing zero-knowledge proof architecture.
Efficient Verifiable Secret Sharing Secures Byzantine Fault Tolerant Systems
EByFTVeS integrates BFT with VSS to guarantee consistency and efficiency, fundamentally securing decentralized services operating on private state.
Encrypted Mempools Integrate Maximal Extractable Value Defense with High-Performance BFT Consensus
By integrating batched threshold encryption into BFT protocols, TrX creates confidential transaction ordering, practically eliminating frontrunning MEV.
Vector-Code Commitments Unlock Transparent Logarithmic-Time Zero-Knowledge Proof Verification
A new Vector-Code Commitment scheme uses algebraic codes to create transparent, logarithmic-time verifiable proofs, radically improving ZKP scalability.
Simplified Verifiable Secret Sharing Achieves Optimal Fault Tolerance and Efficiency
New VSS protocols fundamentally simplify the cryptographic primitive, enabling optimally fault-tolerant, publicly verifiable distributed systems with 90% less bandwidth.
Shunning Secret Sharing Enables Optimal Asynchronous Agreement against General Adversaries
A novel Shunning Secret Sharing primitive enables the first almost-surely terminating Byzantine Agreement protocol secure against general, computationally-unbounded adversaries.
Optimal Resilience Asynchronous Secret Sharing with Linear Communication
Researchers introduce a new Asynchronous Verifiable Secret Sharing protocol, achieving linear communication complexity with optimal Byzantine resilience, foundational for scalable, trust-minimized computation.
Secure BFT Consensus for Dynamically Available Networks Using PVSS
A novel BFT protocol integrates PVSS with pre-commits to secure fast consensus in dynamic networks, achieving $4Delta$ latency and 50% resilience.
Efficient Byzantine Verifiable Secret Sharing Secures Decentralized Systems Foundationally
EByFTVeS introduces an Adaptive Share Delay Provision strategy to resolve consistency and efficiency burdens in BFT-based Verifiable Secret Sharing, strengthening core cryptographic primitives.
