IoTeX 2.0

IoTeX 2.0

IoTeX 2.0

IoTeX 2.0

DePIN For Everyone

Awards, Certifications
& Research

Industry Awards

Co-chair

IIC Blockchain Working Group

Co-chair

IIC Blockchain Working Group

Co-chair

IIC Blockchain Working Group

Co-chair

IIC Blockchain Working Group

Vice Chair

IEEE P2418.1 Standard

Vice Chair

IEEE P2418.1 Standard

Vice Chair

IEEE P2418.1 Standard

Vice Chair

IEEE P2418.1 Standard

Member

Confidential Computing Consortium

Member

Confidential Computing Consortium

Member

Confidential Computing Consortium

Member

Confidential Computing Consortium

CES Innovation Award

for Ucam

CES Innovation Award

for Ucam

CES Innovation Award

for Ucam

CES Innovation Award

for Ucam

Industry Certifications

PSA Certified Crypto API

PSA Certified Crypto API

PSA Certified Crypto API

PSA Certified Crypto API

Research Paper

White Paper 2.0

The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".

White Paper 2.0

The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".

White Paper 2.0

The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".

White Paper 2.0

The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis

Decentralized physical infrastructure network (DePIN) is currently one of the hottest narratives in Web3. In this report, we present a new thesis of DePIN, namely the modular DePIN infrastructure. By retrospecting the evolution of software development platforms for building physical infrastructure networks, we describe the new technology trend of building DePIN applications on top of a community-owned modular DePIN infrastructure and highlight the characteristics of this new DePIN thesis from both technical and economic perspectives.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis

Decentralized physical infrastructure network (DePIN) is currently one of the hottest narratives in Web3. In this report, we present a new thesis of DePIN, namely the modular DePIN infrastructure. By retrospecting the evolution of software development platforms for building physical infrastructure networks, we describe the new technology trend of building DePIN applications on top of a community-owned modular DePIN infrastructure and highlight the characteristics of this new DePIN thesis from both technical and economic perspectives.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis

Decentralized physical infrastructure network (DePIN) is currently one of the hottest narratives in Web3. In this report, we present a new thesis of DePIN, namely the modular DePIN infrastructure. By retrospecting the evolution of software development platforms for building physical infrastructure networks, we describe the new technology trend of building DePIN applications on top of a community-owned modular DePIN infrastructure and highlight the characteristics of this new DePIN thesis from both technical and economic perspectives.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis

Decentralized physical infrastructure network (DePIN) is currently one of the hottest narratives in Web3. In this report, we present a new thesis of DePIN, namely the modular DePIN infrastructure. By retrospecting the evolution of software development platforms for building physical infrastructure networks, we describe the new technology trend of building DePIN applications on top of a community-owned modular DePIN infrastructure and highlight the characteristics of this new DePIN thesis from both technical and economic perspectives.

White Paper 1.0

IoTeX is the auto-scalable and privacy-centric blockchain infrastructure for the Internet of Things (IoT), which brings autonomous device coordination to the masses by “connecting the physical world, block by block”. This paper introduces its several in-house innovations to push the frontier of blockchain 3.0, including a blockchains-in-blockchain architecture for heterogeneous computing, lightning fast Roll-DPoS consensus mechanism, and lightweight privacy-preserving techniques.

White Paper 1.0

IoTeX is the auto-scalable and privacy-centric blockchain infrastructure for the Internet of Things (IoT), which brings autonomous device coordination to the masses by “connecting the physical world, block by block”. This paper introduces its several in-house innovations to push the frontier of blockchain 3.0, including a blockchains-in-blockchain architecture for heterogeneous computing, lightning fast Roll-DPoS consensus mechanism, and lightweight privacy-preserving techniques.

White Paper 1.0

IoTeX is the auto-scalable and privacy-centric blockchain infrastructure for the Internet of Things (IoT), which brings autonomous device coordination to the masses by “connecting the physical world, block by block”. This paper introduces its several in-house innovations to push the frontier of blockchain 3.0, including a blockchains-in-blockchain architecture for heterogeneous computing, lightning fast Roll-DPoS consensus mechanism, and lightweight privacy-preserving techniques.

White Paper 1.0

IoTeX is the auto-scalable and privacy-centric blockchain infrastructure for the Internet of Things (IoT), which brings autonomous device coordination to the masses by “connecting the physical world, block by block”. This paper introduces its several in-house innovations to push the frontier of blockchain 3.0, including a blockchains-in-blockchain architecture for heterogeneous computing, lightning fast Roll-DPoS consensus mechanism, and lightweight privacy-preserving techniques.

Yellow Paper – Roll-DPoS

Roll-DPoS inherits all the advantages of the original DPoS consensus framework and further enhances its capability in terms of decentralization as well as extensibility to complex blockchain architectures. A number of modern cryptographic techniques have been utilized to optimize the consensus process with respect to the computational and communication overhead.

Yellow Paper – Roll-DPoS

Roll-DPoS inherits all the advantages of the original DPoS consensus framework and further enhances its capability in terms of decentralization as well as extensibility to complex blockchain architectures. A number of modern cryptographic techniques have been utilized to optimize the consensus process with respect to the computational and communication overhead.

Yellow Paper – Roll-DPoS

Roll-DPoS inherits all the advantages of the original DPoS consensus framework and further enhances its capability in terms of decentralization as well as extensibility to complex blockchain architectures. A number of modern cryptographic techniques have been utilized to optimize the consensus process with respect to the computational and communication overhead.

Yellow Paper – Roll-DPoS

Roll-DPoS inherits all the advantages of the original DPoS consensus framework and further enhances its capability in terms of decentralization as well as extensibility to complex blockchain architectures. A number of modern cryptographic techniques have been utilized to optimize the consensus process with respect to the computational and communication overhead.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

The existing applications of SSI mainly focus on creating person-to-person and person-to-service relationships, whereas person-to-device and device-to-device interactions have been largely overlooked. In this paper, we close this gap by identifying a number of key challenges of applying SSI to the Internet of Things (IoT) and providing a comprehensive taxonomy and usage of VCs in the IoT context with respect to their validity period, trust and interoperability level, and scope of usage. The life-cycle management of VCs as well as various optimization techniques for realizing SSI in IoT environments are also addressed in great detail. This work is a noteworthy step towards massive adoption of SSI for securing existing and future IoT applications in practice.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

The existing applications of SSI mainly focus on creating person-to-person and person-to-service relationships, whereas person-to-device and device-to-device interactions have been largely overlooked. In this paper, we close this gap by identifying a number of key challenges of applying SSI to the Internet of Things (IoT) and providing a comprehensive taxonomy and usage of VCs in the IoT context with respect to their validity period, trust and interoperability level, and scope of usage. The life-cycle management of VCs as well as various optimization techniques for realizing SSI in IoT environments are also addressed in great detail. This work is a noteworthy step towards massive adoption of SSI for securing existing and future IoT applications in practice.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

The existing applications of SSI mainly focus on creating person-to-person and person-to-service relationships, whereas person-to-device and device-to-device interactions have been largely overlooked. In this paper, we close this gap by identifying a number of key challenges of applying SSI to the Internet of Things (IoT) and providing a comprehensive taxonomy and usage of VCs in the IoT context with respect to their validity period, trust and interoperability level, and scope of usage. The life-cycle management of VCs as well as various optimization techniques for realizing SSI in IoT environments are also addressed in great detail. This work is a noteworthy step towards massive adoption of SSI for securing existing and future IoT applications in practice.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

The existing applications of SSI mainly focus on creating person-to-person and person-to-service relationships, whereas person-to-device and device-to-device interactions have been largely overlooked. In this paper, we close this gap by identifying a number of key challenges of applying SSI to the Internet of Things (IoT) and providing a comprehensive taxonomy and usage of VCs in the IoT context with respect to their validity period, trust and interoperability level, and scope of usage. The life-cycle management of VCs as well as various optimization techniques for realizing SSI in IoT environments are also addressed in great detail. This work is a noteworthy step towards massive adoption of SSI for securing existing and future IoT applications in practice.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs

Multi-scalar multiplication (MSM) is one of the core components of many zero-knowledge proof systems, and a primary performance bottleneck for proof generation in these schemes. One major strategy to accelerate MSM is utilizing precomputation. Several algorithms (e.g., Pippenger and BGMW) and their variants have been proposed in this direction. In this paper, we revisit the recent precomputation-based MSM calculation method proposed by Luo, Fu and Gong at CHES 2023 and generalize their approach. In particular, we presented a general construction of optimal buckets. This improvement leads to significant performance improvements, which are verified by both theoretical analysis and experiments.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs

Multi-scalar multiplication (MSM) is one of the core components of many zero-knowledge proof systems, and a primary performance bottleneck for proof generation in these schemes. One major strategy to accelerate MSM is utilizing precomputation. Several algorithms (e.g., Pippenger and BGMW) and their variants have been proposed in this direction. In this paper, we revisit the recent precomputation-based MSM calculation method proposed by Luo, Fu and Gong at CHES 2023 and generalize their approach. In particular, we presented a general construction of optimal buckets. This improvement leads to significant performance improvements, which are verified by both theoretical analysis and experiments.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs

Multi-scalar multiplication (MSM) is one of the core components of many zero-knowledge proof systems, and a primary performance bottleneck for proof generation in these schemes. One major strategy to accelerate MSM is utilizing precomputation. Several algorithms (e.g., Pippenger and BGMW) and their variants have been proposed in this direction. In this paper, we revisit the recent precomputation-based MSM calculation method proposed by Luo, Fu and Gong at CHES 2023 and generalize their approach. In particular, we presented a general construction of optimal buckets. This improvement leads to significant performance improvements, which are verified by both theoretical analysis and experiments.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs

Multi-scalar multiplication (MSM) is one of the core components of many zero-knowledge proof systems, and a primary performance bottleneck for proof generation in these schemes. One major strategy to accelerate MSM is utilizing precomputation. Several algorithms (e.g., Pippenger and BGMW) and their variants have been proposed in this direction. In this paper, we revisit the recent precomputation-based MSM calculation method proposed by Luo, Fu and Gong at CHES 2023 and generalize their approach. In particular, we presented a general construction of optimal buckets. This improvement leads to significant performance improvements, which are verified by both theoretical analysis and experiments.

Private Delegated Computations Using Strong Isolation

Veracruz supports multiple isolation technologies and provides a common programming model and attestation protocol across all of them, smoothing deployment of delegated computations over supported technologies. We demonstrate Veracruz in operation, on private in-cloud object detection on encrypted video streaming from a video camera. In addition to supporting hardware-backed TEEs—like AWS Nitro Enclaves and Arm Confidential Computing Architecture Realms—Veracruz also provides pragmatic “software TEEs” on Armv8-A devices without hardware Confidential Computing capability, using the high-assurance seL4 microkernel and our IceCap framework.

Private Delegated Computations Using Strong Isolation

Veracruz supports multiple isolation technologies and provides a common programming model and attestation protocol across all of them, smoothing deployment of delegated computations over supported technologies. We demonstrate Veracruz in operation, on private in-cloud object detection on encrypted video streaming from a video camera. In addition to supporting hardware-backed TEEs—like AWS Nitro Enclaves and Arm Confidential Computing Architecture Realms—Veracruz also provides pragmatic “software TEEs” on Armv8-A devices without hardware Confidential Computing capability, using the high-assurance seL4 microkernel and our IceCap framework.

Private Delegated Computations Using Strong Isolation

Veracruz supports multiple isolation technologies and provides a common programming model and attestation protocol across all of them, smoothing deployment of delegated computations over supported technologies. We demonstrate Veracruz in operation, on private in-cloud object detection on encrypted video streaming from a video camera. In addition to supporting hardware-backed TEEs—like AWS Nitro Enclaves and Arm Confidential Computing Architecture Realms—Veracruz also provides pragmatic “software TEEs” on Armv8-A devices without hardware Confidential Computing capability, using the high-assurance seL4 microkernel and our IceCap framework.

Private Delegated Computations Using Strong Isolation

Veracruz supports multiple isolation technologies and provides a common programming model and attestation protocol across all of them, smoothing deployment of delegated computations over supported technologies. We demonstrate Veracruz in operation, on private in-cloud object detection on encrypted video streaming from a video camera. In addition to supporting hardware-backed TEEs—like AWS Nitro Enclaves and Arm Confidential Computing Architecture Realms—Veracruz also provides pragmatic “software TEEs” on Armv8-A devices without hardware Confidential Computing capability, using the high-assurance seL4 microkernel and our IceCap framework.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper

Decentralized physical infrastructure network (DePIN) is an emerging research topic in Web3 and blockchain. In this position paper, we outline the core ideas and components for building a rollup-centric scalable architecture for DePINs. The proposed architecture takes a modular design approach and leverages off-chain computing and zero-knowledge proofs to address the scalability challenge. This work is expected to highlight the importance of this new research direction and shed some light on potential solutions.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper

Decentralized physical infrastructure network (DePIN) is an emerging research topic in Web3 and blockchain. In this position paper, we outline the core ideas and components for building a rollup-centric scalable architecture for DePINs. The proposed architecture takes a modular design approach and leverages off-chain computing and zero-knowledge proofs to address the scalability challenge. This work is expected to highlight the importance of this new research direction and shed some light on potential solutions.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper

Decentralized physical infrastructure network (DePIN) is an emerging research topic in Web3 and blockchain. In this position paper, we outline the core ideas and components for building a rollup-centric scalable architecture for DePINs. The proposed architecture takes a modular design approach and leverages off-chain computing and zero-knowledge proofs to address the scalability challenge. This work is expected to highlight the importance of this new research direction and shed some light on potential solutions.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper

Decentralized physical infrastructure network (DePIN) is an emerging research topic in Web3 and blockchain. In this position paper, we outline the core ideas and components for building a rollup-centric scalable architecture for DePINs. The proposed architecture takes a modular design approach and leverages off-chain computing and zero-knowledge proofs to address the scalability challenge. This work is expected to highlight the importance of this new research direction and shed some light on potential solutions.

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection

Trusted execution environment (TEE) technology has found many applications in mitigating various security risks in an efficient manner, which is attractive for critical infrastructure protection. We propose DHTee, a decentralized coordination mechanism. DHTee uses blockchain technology to support key TEE functions in a heterogeneous TEE environment, especially the attestation service. A Device equipped with one TEE can interact securely with the blockchain to verify whether another potential collaborating device claiming to have a different TEE meets the security requirements. DHTee is also flexible and can support new TEE schemes without affecting devices using existing TEEs that have been supported by the system.

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection

Trusted execution environment (TEE) technology has found many applications in mitigating various security risks in an efficient manner, which is attractive for critical infrastructure protection. We propose DHTee, a decentralized coordination mechanism. DHTee uses blockchain technology to support key TEE functions in a heterogeneous TEE environment, especially the attestation service. A Device equipped with one TEE can interact securely with the blockchain to verify whether another potential collaborating device claiming to have a different TEE meets the security requirements. DHTee is also flexible and can support new TEE schemes without affecting devices using existing TEEs that have been supported by the system.

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection

Trusted execution environment (TEE) technology has found many applications in mitigating various security risks in an efficient manner, which is attractive for critical infrastructure protection. We propose DHTee, a decentralized coordination mechanism. DHTee uses blockchain technology to support key TEE functions in a heterogeneous TEE environment, especially the attestation service. A Device equipped with one TEE can interact securely with the blockchain to verify whether another potential collaborating device claiming to have a different TEE meets the security requirements. DHTee is also flexible and can support new TEE schemes without affecting devices using existing TEEs that have been supported by the system.

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection

Trusted execution environment (TEE) technology has found many applications in mitigating various security risks in an efficient manner, which is attractive for critical infrastructure protection. We propose DHTee, a decentralized coordination mechanism. DHTee uses blockchain technology to support key TEE functions in a heterogeneous TEE environment, especially the attestation service. A Device equipped with one TEE can interact securely with the blockchain to verify whether another potential collaborating device claiming to have a different TEE meets the security requirements. DHTee is also flexible and can support new TEE schemes without affecting devices using existing TEEs that have been supported by the system.

DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems

This paper proposes DIoTA, a novel decentralized ledger-based authentication framework for IoT devices. DIoTA uses a two-layer decentralized ledger architecture together with a lightweight data authentication mechanism to facilitate IoT devices and data management. We also analyze the performance and security of DIoTA, and explicitly give the major parameters an administrator can choose to achieve a desirable balance between different metrics.

DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems

This paper proposes DIoTA, a novel decentralized ledger-based authentication framework for IoT devices. DIoTA uses a two-layer decentralized ledger architecture together with a lightweight data authentication mechanism to facilitate IoT devices and data management. We also analyze the performance and security of DIoTA, and explicitly give the major parameters an administrator can choose to achieve a desirable balance between different metrics.

DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems

This paper proposes DIoTA, a novel decentralized ledger-based authentication framework for IoT devices. DIoTA uses a two-layer decentralized ledger architecture together with a lightweight data authentication mechanism to facilitate IoT devices and data management. We also analyze the performance and security of DIoTA, and explicitly give the major parameters an administrator can choose to achieve a desirable balance between different metrics.

DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems

This paper proposes DIoTA, a novel decentralized ledger-based authentication framework for IoT devices. DIoTA uses a two-layer decentralized ledger architecture together with a lightweight data authentication mechanism to facilitate IoT devices and data management. We also analyze the performance and security of DIoTA, and explicitly give the major parameters an administrator can choose to achieve a desirable balance between different metrics.

Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes

“Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes” has been accepted by CASCON 2018. CASCON is a premier industrial and academic conference for advanced studies in computer science and software engineering sponsored by the IBM Canada Laboratory. This paper presents IoTeX’s extensive experiments with three elliptic curves and two signature schemes which demonstrate the efficacy of using short-lived signature schemes for improving the scalability of PBFT significantly

Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes

“Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes” has been accepted by CASCON 2018. CASCON is a premier industrial and academic conference for advanced studies in computer science and software engineering sponsored by the IBM Canada Laboratory. This paper presents IoTeX’s extensive experiments with three elliptic curves and two signature schemes which demonstrate the efficacy of using short-lived signature schemes for improving the scalability of PBFT significantly

Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes

“Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes” has been accepted by CASCON 2018. CASCON is a premier industrial and academic conference for advanced studies in computer science and software engineering sponsored by the IBM Canada Laboratory. This paper presents IoTeX’s extensive experiments with three elliptic curves and two signature schemes which demonstrate the efficacy of using short-lived signature schemes for improving the scalability of PBFT significantly

Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes

“Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes” has been accepted by CASCON 2018. CASCON is a premier industrial and academic conference for advanced studies in computer science and software engineering sponsored by the IBM Canada Laboratory. This paper presents IoTeX’s extensive experiments with three elliptic curves and two signature schemes which demonstrate the efficacy of using short-lived signature schemes for improving the scalability of PBFT significantly

DKSAP-IoT

“Faster Dual-key Stealth Address for Blockchain-based Internet of Things Systems (icbc2018–9009)” has been accepted and published by one of the world’s most reputable academic blockchain conferences, the 2018 International Conference on Blockchain (ICBC 2018). IoTeX’s new protocol (named “DKSAP-IoT”) is an IoT-friendly adaptation of DKSAP, which reduces computational overhead by 50% compared to DKSAP, thereby paving the way for its application to blockchain-based IoT systems.

DKSAP-IoT

“Faster Dual-key Stealth Address for Blockchain-based Internet of Things Systems (icbc2018–9009)” has been accepted and published by one of the world’s most reputable academic blockchain conferences, the 2018 International Conference on Blockchain (ICBC 2018). IoTeX’s new protocol (named “DKSAP-IoT”) is an IoT-friendly adaptation of DKSAP, which reduces computational overhead by 50% compared to DKSAP, thereby paving the way for its application to blockchain-based IoT systems.

DKSAP-IoT

“Faster Dual-key Stealth Address for Blockchain-based Internet of Things Systems (icbc2018–9009)” has been accepted and published by one of the world’s most reputable academic blockchain conferences, the 2018 International Conference on Blockchain (ICBC 2018). IoTeX’s new protocol (named “DKSAP-IoT”) is an IoT-friendly adaptation of DKSAP, which reduces computational overhead by 50% compared to DKSAP, thereby paving the way for its application to blockchain-based IoT systems.

DKSAP-IoT

“Faster Dual-key Stealth Address for Blockchain-based Internet of Things Systems (icbc2018–9009)” has been accepted and published by one of the world’s most reputable academic blockchain conferences, the 2018 International Conference on Blockchain (ICBC 2018). IoTeX’s new protocol (named “DKSAP-IoT”) is an IoT-friendly adaptation of DKSAP, which reduces computational overhead by 50% compared to DKSAP, thereby paving the way for its application to blockchain-based IoT systems.

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

Home IP cameras are consistently among the most popular smart home devices thanks to their key security and safety related features. However, recent news stories about home IP cameras getting hacked frequently have posed serious security and privacy concerns for consumers. Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system. Ucam leverages advanced technologies such as blockchain, end-to-end encryption and trusted computing to address a number of vulnerabilities in the existing solutions.

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

Home IP cameras are consistently among the most popular smart home devices thanks to their key security and safety related features. However, recent news stories about home IP cameras getting hacked frequently have posed serious security and privacy concerns for consumers. Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system. Ucam leverages advanced technologies such as blockchain, end-to-end encryption and trusted computing to address a number of vulnerabilities in the existing solutions.

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

Home IP cameras are consistently among the most popular smart home devices thanks to their key security and safety related features. However, recent news stories about home IP cameras getting hacked frequently have posed serious security and privacy concerns for consumers. Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system. Ucam leverages advanced technologies such as blockchain, end-to-end encryption and trusted computing to address a number of vulnerabilities in the existing solutions.

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

Home IP cameras are consistently among the most popular smart home devices thanks to their key security and safety related features. However, recent news stories about home IP cameras getting hacked frequently have posed serious security and privacy concerns for consumers. Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system. Ucam leverages advanced technologies such as blockchain, end-to-end encryption and trusted computing to address a number of vulnerabilities in the existing solutions.

Decentralized IoT Data Authorization with Pebble Tracker

Decentralized identifiers (DIDs) and verifiable cre- dentials (VCs) are emerging concepts for creating verifiable self- sovereign digital identities for people, organizations and Internet of things (IoT). In this demo, we share the implementation details and experiences for realizing a decentralized IoT data authorization framework with a Pebble tracker, an in-house built trusted GPS tracking device with 4G connectivity and sensor technologies. Our implementation demonstrates great flexibility and tremendous advantages towards building decentralized and global-scale IoT applications. To the best of our knowledge, this is the first real-world demo for enabling decentralized IoT data authorization with DIDs and VCs.

Decentralized IoT Data Authorization with Pebble Tracker

Decentralized identifiers (DIDs) and verifiable cre- dentials (VCs) are emerging concepts for creating verifiable self- sovereign digital identities for people, organizations and Internet of things (IoT). In this demo, we share the implementation details and experiences for realizing a decentralized IoT data authorization framework with a Pebble tracker, an in-house built trusted GPS tracking device with 4G connectivity and sensor technologies. Our implementation demonstrates great flexibility and tremendous advantages towards building decentralized and global-scale IoT applications. To the best of our knowledge, this is the first real-world demo for enabling decentralized IoT data authorization with DIDs and VCs.

Decentralized IoT Data Authorization with Pebble Tracker

Decentralized identifiers (DIDs) and verifiable cre- dentials (VCs) are emerging concepts for creating verifiable self- sovereign digital identities for people, organizations and Internet of things (IoT). In this demo, we share the implementation details and experiences for realizing a decentralized IoT data authorization framework with a Pebble tracker, an in-house built trusted GPS tracking device with 4G connectivity and sensor technologies. Our implementation demonstrates great flexibility and tremendous advantages towards building decentralized and global-scale IoT applications. To the best of our knowledge, this is the first real-world demo for enabling decentralized IoT data authorization with DIDs and VCs.

Decentralized IoT Data Authorization with Pebble Tracker

Decentralized identifiers (DIDs) and verifiable cre- dentials (VCs) are emerging concepts for creating verifiable self- sovereign digital identities for people, organizations and Internet of things (IoT). In this demo, we share the implementation details and experiences for realizing a decentralized IoT data authorization framework with a Pebble tracker, an in-house built trusted GPS tracking device with 4G connectivity and sensor technologies. Our implementation demonstrates great flexibility and tremendous advantages towards building decentralized and global-scale IoT applications. To the best of our knowledge, this is the first real-world demo for enabling decentralized IoT data authorization with DIDs and VCs.

Towards Credential-Based Device Registration in DApps for DePINs With ZKPs

In this paper, we propose a credentialbased device registration (CDR) mechanism that verifies device credentials on the blockchain and leverages zero-knowledge proofs (ZKP) to protect confidential device attributes from being disclosed.

Towards Credential-Based Device Registration in DApps for DePINs With ZKPs

In this paper, we propose a credentialbased device registration (CDR) mechanism that verifies device credentials on the blockchain and leverages zero-knowledge proofs (ZKP) to protect confidential device attributes from being disclosed.

Towards Credential-Based Device Registration in DApps for DePINs With ZKPs

In this paper, we propose a credentialbased device registration (CDR) mechanism that verifies device credentials on the blockchain and leverages zero-knowledge proofs (ZKP) to protect confidential device attributes from being disclosed.

Towards Credential-Based Device Registration in DApps for DePINs With ZKPs

In this paper, we propose a credentialbased device registration (CDR) mechanism that verifies device credentials on the blockchain and leverages zero-knowledge proofs (ZKP) to protect confidential device attributes from being disclosed.

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP

A Metaverse provides an immersive and linked experience for individuals similar to what is depicted in the book "Ready Player One". Experiences will be enabled by VR headsets, gaming systems, desktop computers, smartphones, etc., while there will likely emerge several metaverses which in turn will need interconnection.

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP

A Metaverse provides an immersive and linked experience for individuals similar to what is depicted in the book "Ready Player One". Experiences will be enabled by VR headsets, gaming systems, desktop computers, smartphones, etc., while there will likely emerge several metaverses which in turn will need interconnection.

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP

A Metaverse provides an immersive and linked experience for individuals similar to what is depicted in the book "Ready Player One". Experiences will be enabled by VR headsets, gaming systems, desktop computers, smartphones, etc., while there will likely emerge several metaverses which in turn will need interconnection.

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP

A Metaverse provides an immersive and linked experience for individuals similar to what is depicted in the book "Ready Player One". Experiences will be enabled by VR headsets, gaming systems, desktop computers, smartphones, etc., while there will likely emerge several metaverses which in turn will need interconnection.

Privacy-Preserving Object Detection with Veracruz

Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system designed by IoTeX. In a Ucam system, all the video clips captured by the camera are encrypted using a user-controlled symmetric key before storing them in the cloud.

Privacy-Preserving Object Detection with Veracruz

Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system designed by IoTeX. In a Ucam system, all the video clips captured by the camera are encrypted using a user-controlled symmetric key before storing them in the cloud.

Privacy-Preserving Object Detection with Veracruz

Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system designed by IoTeX. In a Ucam system, all the video clips captured by the camera are encrypted using a user-controlled symmetric key before storing them in the cloud.

Privacy-Preserving Object Detection with Veracruz

Ucam is a user-centric, blockchain-based and end-to-end secure home IP camera system designed by IoTeX. In a Ucam system, all the video clips captured by the camera are encrypted using a user-controlled symmetric key before storing them in the cloud.

DHTee: Decentralized Infrastructure for Heterogeneous TEEs

Trusted execution environment (TEE) technology has many uses, such as protecting data in the cloud and improving security for industrial IoT. However, there are technical challenges that limit its widespread adoption. These challenges include the fact that different TEE vendors have incompatible solutions, and devices equipped with the same TEE technology may belong to different owners, making it difficult to establish trust between them.

DHTee: Decentralized Infrastructure for Heterogeneous TEEs

Trusted execution environment (TEE) technology has many uses, such as protecting data in the cloud and improving security for industrial IoT. However, there are technical challenges that limit its widespread adoption. These challenges include the fact that different TEE vendors have incompatible solutions, and devices equipped with the same TEE technology may belong to different owners, making it difficult to establish trust between them.

DHTee: Decentralized Infrastructure for Heterogeneous TEEs

Trusted execution environment (TEE) technology has many uses, such as protecting data in the cloud and improving security for industrial IoT. However, there are technical challenges that limit its widespread adoption. These challenges include the fact that different TEE vendors have incompatible solutions, and devices equipped with the same TEE technology may belong to different owners, making it difficult to establish trust between them.

DHTee: Decentralized Infrastructure for Heterogeneous TEEs

Trusted execution environment (TEE) technology has many uses, such as protecting data in the cloud and improving security for industrial IoT. However, there are technical challenges that limit its widespread adoption. These challenges include the fact that different TEE vendors have incompatible solutions, and devices equipped with the same TEE technology may belong to different owners, making it difficult to establish trust between them.

Connecting Smart Devices to Smart Contracts with W3bstream

In this demo, we illustrate the process of creating a machine economy utilizing W3bstream - an emerging open-source framework designed for connecting smart devices to smart contracts. We will emphasize the flexibility and user-friendliness of W3bstream in empowering decentralized IoT applications.

Connecting Smart Devices to Smart Contracts with W3bstream

In this demo, we illustrate the process of creating a machine economy utilizing W3bstream - an emerging open-source framework designed for connecting smart devices to smart contracts. We will emphasize the flexibility and user-friendliness of W3bstream in empowering decentralized IoT applications.

Connecting Smart Devices to Smart Contracts with W3bstream

In this demo, we illustrate the process of creating a machine economy utilizing W3bstream - an emerging open-source framework designed for connecting smart devices to smart contracts. We will emphasize the flexibility and user-friendliness of W3bstream in empowering decentralized IoT applications.

Connecting Smart Devices to Smart Contracts with W3bstream

In this demo, we illustrate the process of creating a machine economy utilizing W3bstream - an emerging open-source framework designed for connecting smart devices to smart contracts. We will emphasize the flexibility and user-friendliness of W3bstream in empowering decentralized IoT applications.

Insights on Impact of Distributed Ledgers on Provider Networks

Internet scale distributed consensus takes advantage of randomized algorithms to cope with functional resilience, reliability and access while accomplishing decentralized agreement at expenses of costly unicast communication.

Insights on Impact of Distributed Ledgers on Provider Networks

Internet scale distributed consensus takes advantage of randomized algorithms to cope with functional resilience, reliability and access while accomplishing decentralized agreement at expenses of costly unicast communication.

Insights on Impact of Distributed Ledgers on Provider Networks

Internet scale distributed consensus takes advantage of randomized algorithms to cope with functional resilience, reliability and access while accomplishing decentralized agreement at expenses of costly unicast communication.

Insights on Impact of Distributed Ledgers on Provider Networks

Internet scale distributed consensus takes advantage of randomized algorithms to cope with functional resilience, reliability and access while accomplishing decentralized agreement at expenses of costly unicast communication.

New Gold Mine: Harvesting IoT Data through DeFi in a Secure Manner

As a massive amount of Internet of things (IoT) devices are being deployed for data collection, it is desirable to have a marketplace where both IoT device owners and data consumers can trade collected data freely and effectively.

New Gold Mine: Harvesting IoT Data through DeFi in a Secure Manner

As a massive amount of Internet of things (IoT) devices are being deployed for data collection, it is desirable to have a marketplace where both IoT device owners and data consumers can trade collected data freely and effectively.

New Gold Mine: Harvesting IoT Data through DeFi in a Secure Manner

As a massive amount of Internet of things (IoT) devices are being deployed for data collection, it is desirable to have a marketplace where both IoT device owners and data consumers can trade collected data freely and effectively.

New Gold Mine: Harvesting IoT Data through DeFi in a Secure Manner

As a massive amount of Internet of things (IoT) devices are being deployed for data collection, it is desirable to have a marketplace where both IoT device owners and data consumers can trade collected data freely and effectively.

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement

IoT devices provide a rich data source that is not available in the past, which is valuable for a wide range of intelligence applications, especially deep neural network (DNN) applications that are data-thirsty. An established DNN model provides useful analysis results that can improve the operation of IoT systems in turn.

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement

IoT devices provide a rich data source that is not available in the past, which is valuable for a wide range of intelligence applications, especially deep neural network (DNN) applications that are data-thirsty. An established DNN model provides useful analysis results that can improve the operation of IoT systems in turn.

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement

IoT devices provide a rich data source that is not available in the past, which is valuable for a wide range of intelligence applications, especially deep neural network (DNN) applications that are data-thirsty. An established DNN model provides useful analysis results that can improve the operation of IoT systems in turn.

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement

IoT devices provide a rich data source that is not available in the past, which is valuable for a wide range of intelligence applications, especially deep neural network (DNN) applications that are data-thirsty. An established DNN model provides useful analysis results that can improve the operation of IoT systems in turn.

EMS: An Extensible and Modular Staking Architecture for Proof of Stake Systems

Staking is an essential component in Proof-of-Stake (PoS) based blockchain systems. While a host of PoS blockchains have staking schemes in place, the implementations of those mechanisms are highly customized to meet the needs of specific blockchains and vary in terms of the offered functionalities.

EMS: An Extensible and Modular Staking Architecture for Proof of Stake Systems

Staking is an essential component in Proof-of-Stake (PoS) based blockchain systems. While a host of PoS blockchains have staking schemes in place, the implementations of those mechanisms are highly customized to meet the needs of specific blockchains and vary in terms of the offered functionalities.

EMS: An Extensible and Modular Staking Architecture for Proof of Stake Systems

Staking is an essential component in Proof-of-Stake (PoS) based blockchain systems. While a host of PoS blockchains have staking schemes in place, the implementations of those mechanisms are highly customized to meet the needs of specific blockchains and vary in terms of the offered functionalities.

EMS: An Extensible and Modular Staking Architecture for Proof of Stake Systems

Staking is an essential component in Proof-of-Stake (PoS) based blockchain systems. While a host of PoS blockchains have staking schemes in place, the implementations of those mechanisms are highly customized to meet the needs of specific blockchains and vary in terms of the offered functionalities.

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The adoption of industrial internet of things (IIoT) greatly improves the efficiency of industrial facilities by providing more accurate and rich information and increasing automation. The benefits are further amplified when IIoT is integrated with cloud for collaboration and data analytic capability.

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The adoption of industrial internet of things (IIoT) greatly improves the efficiency of industrial facilities by providing more accurate and rich information and increasing automation. The benefits are further amplified when IIoT is integrated with cloud for collaboration and data analytic capability.

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The adoption of industrial internet of things (IIoT) greatly improves the efficiency of industrial facilities by providing more accurate and rich information and increasing automation. The benefits are further amplified when IIoT is integrated with cloud for collaboration and data analytic capability.

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The adoption of industrial internet of things (IIoT) greatly improves the efficiency of industrial facilities by providing more accurate and rich information and increasing automation. The benefits are further amplified when IIoT is integrated with cloud for collaboration and data analytic capability.

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

With the exorbitant growth in the number of connected devices, the lack of proper identity and access management (IAM) mechanisms has become a major concern. The traditional IAM systems, which focus solely on managing people's digital identities, fail to accommodate billions of Internet of Things (IoT) devices.

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

With the exorbitant growth in the number of connected devices, the lack of proper identity and access management (IAM) mechanisms has become a major concern. The traditional IAM systems, which focus solely on managing people's digital identities, fail to accommodate billions of Internet of Things (IoT) devices.

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

With the exorbitant growth in the number of connected devices, the lack of proper identity and access management (IAM) mechanisms has become a major concern. The traditional IAM systems, which focus solely on managing people's digital identities, fail to accommodate billions of Internet of Things (IoT) devices.

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

With the exorbitant growth in the number of connected devices, the lack of proper identity and access management (IAM) mechanisms has become a major concern. The traditional IAM systems, which focus solely on managing people's digital identities, fail to accommodate billions of Internet of Things (IoT) devices.

MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance

Governance is a critical component in cryptocurrency systems for their sustainable development and evolution. In particular, on-chain governance has attracted a lot of attention in cryptocurrency communities after the hard forks of Bitcoin and Ethereum.

MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance

Governance is a critical component in cryptocurrency systems for their sustainable development and evolution. In particular, on-chain governance has attracted a lot of attention in cryptocurrency communities after the hard forks of Bitcoin and Ethereum.

MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance

Governance is a critical component in cryptocurrency systems for their sustainable development and evolution. In particular, on-chain governance has attracted a lot of attention in cryptocurrency communities after the hard forks of Bitcoin and Ethereum.

MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance

Governance is a critical component in cryptocurrency systems for their sustainable development and evolution. In particular, on-chain governance has attracted a lot of attention in cryptocurrency communities after the hard forks of Bitcoin and Ethereum.

EcoBoost: Efficient Bootstrapping for Confidential Transactions

One of the major challenges of cryptocurrendes is the lack of confidentiality, Without confidentiality, the amount of each transaction on a blockchain is not private. While confidential transactions can hide transaction amounts, its storage overhead is extremely high (e.g., 10~20X).

EcoBoost: Efficient Bootstrapping for Confidential Transactions

One of the major challenges of cryptocurrendes is the lack of confidentiality, Without confidentiality, the amount of each transaction on a blockchain is not private. While confidential transactions can hide transaction amounts, its storage overhead is extremely high (e.g., 10~20X).

EcoBoost: Efficient Bootstrapping for Confidential Transactions

One of the major challenges of cryptocurrendes is the lack of confidentiality, Without confidentiality, the amount of each transaction on a blockchain is not private. While confidential transactions can hide transaction amounts, its storage overhead is extremely high (e.g., 10~20X).

EcoBoost: Efficient Bootstrapping for Confidential Transactions

One of the major challenges of cryptocurrendes is the lack of confidentiality, Without confidentiality, the amount of each transaction on a blockchain is not private. While confidential transactions can hide transaction amounts, its storage overhead is extremely high (e.g., 10~20X).

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices

There is a natural demand to support cryptocurrency payments on smart devices.

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices

There is a natural demand to support cryptocurrency payments on smart devices.

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices

There is a natural demand to support cryptocurrency payments on smart devices.

Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices

There is a natural demand to support cryptocurrency payments on smart devices.

KCRS: A Blockchain-Based Key Compromise Resilient Signature System

In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys.

KCRS: A Blockchain-Based Key Compromise Resilient Signature System

In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys.

KCRS: A Blockchain-Based Key Compromise Resilient Signature System

In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys.

KCRS: A Blockchain-Based Key Compromise Resilient Signature System

In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys.

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth address prevents public association of a blockchain transaction’s output with a recipient’s wallet address and hides the actual destination address of a transaction.

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth address prevents public association of a blockchain transaction’s output with a recipient’s wallet address and hides the actual destination address of a transaction.

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth address prevents public association of a blockchain transaction’s output with a recipient’s wallet address and hides the actual destination address of a transaction.

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth address prevents public association of a blockchain transaction’s output with a recipient’s wallet address and hides the actual destination address of a transaction.

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

Enabling Web2-Based User Authentication for Account Abstraction

Enabling Web2-Based User Authentication for Account Abstraction

Enabling Web2-Based User Authentication for Account Abstraction

Enabling Web2-Based User Authentication for Account Abstraction