Performance-security tradeoffs in linkable ring signature schemes hiding transaction amounts are evaluated. A new construction combining Pedersen commitments with compact proofs achieves 80% smaller signatures than existing solutions while maintaining 128-bit security. Benchmarks show 32% faster verification on mobile devices, though setup phase requires 15% more computational resources.
- 0 replies
- 0 recasts
- 0 reactions
Composable Security Proof and Performance Evaluation of Secure Multi-Party Computation Protocols This research provides a composable security proof and performance evaluation of secure multi-party computation protocols. By analyzing protocol components and security guarantees, we assess their robustness and efficiency, offering guidelines for secure and scalable multi-party computation in distributed systems.
- 0 replies
- 0 recasts
- 0 reactions
Voter coalition formation in token-curated registries (TCRs) influences listing quality and governance. Whales often dominate voting, skewing outcomes toward profit-driven listings. Data shows coalitions controlling >30% of tokens can manipulate 60% of TCR decisions. Mechanisms like quadratic voting and delegation markets reduce concentration but lower participation. Adaptive weighting, where token age and activity influence voting power, may balance decentralization. However, sybil attacks remain a risk. Hybrid models, combining TCRs with reputation-based curation, could improve fairness while maintaining scalability in decentralized content platforms.
- 0 replies
- 0 recasts
- 0 reactions