Walrus Redefines Decentralized Storage Integrity and Efficiency with Erasure Coding
Walrus introduces a novel two-dimensional erasure coding protocol, RedStuff, fundamentally enhancing decentralized storage security and recovery efficiency in asynchronous networks.
Permissionless Verifiable Information Dispersal for Bitcoin Rollup Data Availability
This research introduces a novel verifiable information dispersal system, enabling scalable and secure data availability for Bitcoin rollups through homomorphic fingerprints.
Adaptive BLS Threshold Signatures Bolster Distributed System Security
This research introduces a novel BLS threshold signature scheme that maintains security against dynamic, adaptive adversaries, critical for robust decentralized systems.
Affine One-Wayness: Post-Quantum Temporal Verification for Distributed Systems
Affine One-Wayness (AOW) is a novel post-quantum cryptographic primitive, securing verifiable temporal ordering in distributed systems without trusted clocks.
Verifiable Delay Functions: Cryptographic Sequentiality for Decentralized Systems
A novel cryptographic primitive, Verifiable Delay Functions, introduces guaranteed sequential computation, enabling trustless time-based operations in decentralized networks.
Quantum-Resistant Blockchain Secures Transactions with Novel Consensus and Privacy
A new blockchain framework integrates lattice-based cryptography, sharded Proof-of-Stake, and zero-knowledge proofs to deliver quantum-safe, scalable, and private cryptocurrency transactions.
Thetacrypt Unifies Threshold Cryptography for Robust Distributed Systems and Blockchain
Thetacrypt offers a versatile framework, integrating diverse threshold cryptography schemes to enhance distributed trust and blockchain security.
Mechanism Design Secures Blockchain Consensus against Untruthful Forks
This research introduces revelation mechanisms to ensure truthful blockchain consensus, leveraging economic incentives to prevent malicious forks and enhance network reliability.
Layered Blockchain Security: Classifying Cryptocurrency Attacks
This research systematically categorizes blockchain attack vectors across five infrastructure layers, offering a foundational framework to understand and mitigate evolving cryptocurrency threats.
