

Research and Innovations
Discover cutting-edge research and innovative solutions on IoTeX platform. Dive into detailed studies, breakthrough findings, and actionable insights to fuel your knowledge and ideas.
Industry Awards & Contributions
University Partners
University Partners
Research Papers
Research Papers

Sentient AI: Bridging Realities with the Fusion of DePINs and AI Agents
This light paper highlights the benefits and potential use cases when connecting DePINs to AI agents and presents QUICKSILVER, a connectivity layer to realize this vision and fuel growth and technological breakthroughs across a wide range of industry sectors.
The integration of Decentralized Physical Infrastructure Networks (DePINs) with AI agents is a transformative shift in technology. This combination enables smarter, more efficient systems by processing data in real-time and adapting to changing conditions. The QUICKSILVER connectivity layer helps make this integration possible, driving innovation across various industries.

Sentient AI: Bridging Realities with the Fusion of DePINs and AI Agents
This light paper highlights the benefits and potential use cases when connecting DePINs to AI agents and presents QUICKSILVER, a connectivity layer to realize this vision and fuel growth and technological breakthroughs across a wide range of industry sectors.
The integration of Decentralized Physical Infrastructure Networks (DePINs) with AI agents is a transformative shift in technology. This combination enables smarter, more efficient systems by processing data in real-time and adapting to changing conditions. The QUICKSILVER connectivity layer helps make this integration possible, driving innovation across various industries.

Sentient AI: Bridging Realities with the Fusion of DePINs and AI Agents
This light paper highlights the benefits and potential use cases when connecting DePINs to AI agents and presents QUICKSILVER, a connectivity layer to realize this vision and fuel growth and technological breakthroughs across a wide range of industry sectors.
The integration of Decentralized Physical Infrastructure Networks (DePINs) with AI agents is a transformative shift in technology. This combination enables smarter, more efficient systems by processing data in real-time and adapting to changing conditions. The QUICKSILVER connectivity layer helps make this integration possible, driving innovation across various industries.

TPU as Cryptographic Accelerator
This paper explores the potential of leveraging AI accelerators (e.g., TPUs and NPUs) to optimize polynomial multiplication, a key bottleneck in Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), presenting adaptation techniques and preliminary evaluations to enhance performance while discussing current limitations and future directions for broader adoption of advanced cryptographic tools.
This paper explores using advanced AI hardware to speed up a crucial mathematical operation, helping to make powerful privacy technologies like Fully Homomorphic Encryption and Zero-Knowledge Proofs faster and more practical.

TPU as Cryptographic Accelerator
This paper explores the potential of leveraging AI accelerators (e.g., TPUs and NPUs) to optimize polynomial multiplication, a key bottleneck in Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), presenting adaptation techniques and preliminary evaluations to enhance performance while discussing current limitations and future directions for broader adoption of advanced cryptographic tools.
This paper explores using advanced AI hardware to speed up a crucial mathematical operation, helping to make powerful privacy technologies like Fully Homomorphic Encryption and Zero-Knowledge Proofs faster and more practical.

TPU as Cryptographic Accelerator
This paper explores the potential of leveraging AI accelerators (e.g., TPUs and NPUs) to optimize polynomial multiplication, a key bottleneck in Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), presenting adaptation techniques and preliminary evaluations to enhance performance while discussing current limitations and future directions for broader adoption of advanced cryptographic tools.
This paper explores using advanced AI hardware to speed up a crucial mathematical operation, helping to make powerful privacy technologies like Fully Homomorphic Encryption and Zero-Knowledge Proofs faster and more practical.

Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum
The paper proposes two strategies to transition Ethereum to post-quantum security: introducing a quantum-safe zero-knowledge proof in transactions and enhancing scalability with proof aggregation and zero-knowledge rollups, ensuring backward compatibility with minimal software changes for validators and clients.
The paper proposes two solutions to protect Ethereum from future quantum computer threats: adding secure transaction types and improving efficiency with advanced cryptography, all while keeping changes minimal and compatible with the current system.

Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum
The paper proposes two strategies to transition Ethereum to post-quantum security: introducing a quantum-safe zero-knowledge proof in transactions and enhancing scalability with proof aggregation and zero-knowledge rollups, ensuring backward compatibility with minimal software changes for validators and clients.
The paper proposes two solutions to protect Ethereum from future quantum computer threats: adding secure transaction types and improving efficiency with advanced cryptography, all while keeping changes minimal and compatible with the current system.

Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum
The paper proposes two strategies to transition Ethereum to post-quantum security: introducing a quantum-safe zero-knowledge proof in transactions and enhancing scalability with proof aggregation and zero-knowledge rollups, ensuring backward compatibility with minimal software changes for validators and clients.
The paper proposes two solutions to protect Ethereum from future quantum computer threats: adding secure transaction types and improving efficiency with advanced cryptography, all while keeping changes minimal and compatible with the current system.

New Directions in Decentralized Physical Infrastructure Networks
The modular DePIN infrastructure introduces a community-driven, flexible, and composable framework for building decentralized physical infrastructure networks, enabling tailored applications through interoperable modules while addressing technical and economic challenges through collaboration between academia and industry.
The modular DePIN infra is a community-driven approach to managing physical resources like energy and data. It uses interchangeable building blocks to create customized systems, making it easier and more collaborative, but also requires experts to work together to overcome challenges.

New Directions in Decentralized Physical Infrastructure Networks
The modular DePIN infrastructure introduces a community-driven, flexible, and composable framework for building decentralized physical infrastructure networks, enabling tailored applications through interoperable modules while addressing technical and economic challenges through collaboration between academia and industry.
The modular DePIN infra is a community-driven approach to managing physical resources like energy and data. It uses interchangeable building blocks to create customized systems, making it easier and more collaborative, but also requires experts to work together to overcome challenges.

New Directions in Decentralized Physical Infrastructure Networks
The modular DePIN infrastructure introduces a community-driven, flexible, and composable framework for building decentralized physical infrastructure networks, enabling tailored applications through interoperable modules while addressing technical and economic challenges through collaboration between academia and industry.
The modular DePIN infra is a community-driven approach to managing physical resources like energy and data. It uses interchangeable building blocks to create customized systems, making it easier and more collaborative, but also requires experts to work together to overcome challenges.

White Paper 2.0
The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".
IoTeX 2.0 is a three-year plan to expand its network by creating a flexible platform and improving its token system. This aims to make blockchain technology accessible to everyone, supporting innovative projects and connecting real-world devices with digital systems.

White Paper 2.0
The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".
IoTeX 2.0 is a three-year plan to expand its network by creating a flexible platform and improving its token system. This aims to make blockchain technology accessible to everyone, supporting innovative projects and connecting real-world devices with digital systems.

White Paper 2.0
The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".
IoTeX 2.0 is a three-year plan to expand its network by creating a flexible platform and improving its token system. This aims to make blockchain technology accessible to everyone, supporting innovative projects and connecting real-world devices with digital systems.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis
Decentralized Physical Infrastructure Networks - A Modular Infrastructure (DePIN) is evolving into a modular infrastructure model, enabling the development of decentralized applications through community-owned, flexible modules that enhance adaptability, efficiency, and collaboration in Web3 technologies.
DePIN use blockchain to create community-driven networks, promoting shared ownership and efficient management of resources like data storage and connectivity.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis
Decentralized Physical Infrastructure Networks - A Modular Infrastructure (DePIN) is evolving into a modular infrastructure model, enabling the development of decentralized applications through community-owned, flexible modules that enhance adaptability, efficiency, and collaboration in Web3 technologies.
DePIN use blockchain to create community-driven networks, promoting shared ownership and efficient management of resources like data storage and connectivity.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis
Decentralized Physical Infrastructure Networks - A Modular Infrastructure (DePIN) is evolving into a modular infrastructure model, enabling the development of decentralized applications through community-owned, flexible modules that enhance adaptability, efficiency, and collaboration in Web3 technologies.
DePIN use blockchain to create community-driven networks, promoting shared ownership and efficient management of resources like data storage and connectivity.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
We revisit the precomputation-based multi-scalar multiplication (MSM) method introduced by Luo, Fu, and Gong at CHES 2023 and extend their approach. Specifically, we propose a generalized construction of optimal buckets. This enhancement results in notable performance gains, as confirmed through theoretical analysis and experimental validation.
Multi-scalar multiplication, crucial for zero-knowledge proofs, is often slow. Researchers have sped it up using precomputation methods. A recent study improved these methods, making them faster through better organization of precomputed values.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
We revisit the precomputation-based multi-scalar multiplication (MSM) method introduced by Luo, Fu, and Gong at CHES 2023 and extend their approach. Specifically, we propose a generalized construction of optimal buckets. This enhancement results in notable performance gains, as confirmed through theoretical analysis and experimental validation.
Multi-scalar multiplication, crucial for zero-knowledge proofs, is often slow. Researchers have sped it up using precomputation methods. A recent study improved these methods, making them faster through better organization of precomputed values.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
We revisit the precomputation-based multi-scalar multiplication (MSM) method introduced by Luo, Fu, and Gong at CHES 2023 and extend their approach. Specifically, we propose a generalized construction of optimal buckets. This enhancement results in notable performance gains, as confirmed through theoretical analysis and experimental validation.
Multi-scalar multiplication, crucial for zero-knowledge proofs, is often slow. Researchers have sped it up using precomputation methods. A recent study improved these methods, making them faster through better organization of precomputed values.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity
This paper addresses the gap in Self-Sovereign Identity (SSI) applications by focusing on IoT, proposing a taxonomy for Verifiable Credentials, and exploring lifecycle management and optimization techniques. It aims to facilitate widespread adoption of SSI in securing IoT applications.
This paper aims to make digital identity systems safer and more efficient for use with smart devices. It identifies challenges and offers solutions to improve security and ease of use.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity
This paper addresses the gap in Self-Sovereign Identity (SSI) applications by focusing on IoT, proposing a taxonomy for Verifiable Credentials, and exploring lifecycle management and optimization techniques. It aims to facilitate widespread adoption of SSI in securing IoT applications.
This paper aims to make digital identity systems safer and more efficient for use with smart devices. It identifies challenges and offers solutions to improve security and ease of use.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity
This paper addresses the gap in Self-Sovereign Identity (SSI) applications by focusing on IoT, proposing a taxonomy for Verifiable Credentials, and exploring lifecycle management and optimization techniques. It aims to facilitate widespread adoption of SSI in securing IoT applications.
This paper aims to make digital identity systems safer and more efficient for use with smart devices. It identifies challenges and offers solutions to improve security and ease of use.

Enabling Web2-Based User Authentication for Account Abstraction
In this demo, we describe the process of integrating typical Web2-based user authentication mechanisms into the ERC-4337 account abstraction (AA) and use the passkey-based authentication as an example to illustrate how to manage a smart contract wallet (SCW) using a passkey.
In this demo, we explain how to combine common Web2-style user login methods with a new blockchain feature called ERC-4337 account abstraction (AA). To make it simple, we use passkey-based login as an example to show how you can use it to manage a special type of digital wallet called a smart contract wallet (SCW).

Enabling Web2-Based User Authentication for Account Abstraction
In this demo, we describe the process of integrating typical Web2-based user authentication mechanisms into the ERC-4337 account abstraction (AA) and use the passkey-based authentication as an example to illustrate how to manage a smart contract wallet (SCW) using a passkey.
In this demo, we explain how to combine common Web2-style user login methods with a new blockchain feature called ERC-4337 account abstraction (AA). To make it simple, we use passkey-based login as an example to show how you can use it to manage a special type of digital wallet called a smart contract wallet (SCW).

Enabling Web2-Based User Authentication for Account Abstraction
In this demo, we describe the process of integrating typical Web2-based user authentication mechanisms into the ERC-4337 account abstraction (AA) and use the passkey-based authentication as an example to illustrate how to manage a smart contract wallet (SCW) using a passkey.
In this demo, we explain how to combine common Web2-style user login methods with a new blockchain feature called ERC-4337 account abstraction (AA). To make it simple, we use passkey-based login as an example to show how you can use it to manage a special type of digital wallet called a smart contract wallet (SCW).

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3
Random numbers are crucial for dApps like gaming and DeFi, but existing on-chain and off-chain methods face security and complexity challenges. To address this, a hybrid solution using IoT devices with trusted execution environments (TEE) and cryptographic tools is proposed, ensuring unbiased randomness with reduced on-chain computation and cost.
Random numbers are crucial for online applications like games and finance, but current methods have security risks. A new approach uses secure devices to generate truly random numbers, making these applications more reliable and efficient. This method ensures fairness and reduces costs.

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3
Random numbers are crucial for dApps like gaming and DeFi, but existing on-chain and off-chain methods face security and complexity challenges. To address this, a hybrid solution using IoT devices with trusted execution environments (TEE) and cryptographic tools is proposed, ensuring unbiased randomness with reduced on-chain computation and cost.
Random numbers are crucial for online applications like games and finance, but current methods have security risks. A new approach uses secure devices to generate truly random numbers, making these applications more reliable and efficient. This method ensures fairness and reduces costs.

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3
Random numbers are crucial for dApps like gaming and DeFi, but existing on-chain and off-chain methods face security and complexity challenges. To address this, a hybrid solution using IoT devices with trusted execution environments (TEE) and cryptographic tools is proposed, ensuring unbiased randomness with reduced on-chain computation and cost.
Random numbers are crucial for online applications like games and finance, but current methods have security risks. A new approach uses secure devices to generate truly random numbers, making these applications more reliable and efficient. This method ensures fairness and reduces costs.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper
Decentralized Physical Infrastructure Networks (DePINs) combine blockchain, IoT, and tokenomics to create decentralized IoT systems. A modular architecture with off-chain computing and zero-knowledge proofs is proposed to address scalability issues in DePINs.
DePINs use blockchain and smart devices to create community-driven networks. A new design helps these networks grow efficiently by processing tasks securely outside the main system.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper
Decentralized Physical Infrastructure Networks (DePINs) combine blockchain, IoT, and tokenomics to create decentralized IoT systems. A modular architecture with off-chain computing and zero-knowledge proofs is proposed to address scalability issues in DePINs.
DePINs use blockchain and smart devices to create community-driven networks. A new design helps these networks grow efficiently by processing tasks securely outside the main system.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper
Decentralized Physical Infrastructure Networks (DePINs) combine blockchain, IoT, and tokenomics to create decentralized IoT systems. A modular architecture with off-chain computing and zero-knowledge proofs is proposed to address scalability issues in DePINs.
DePINs use blockchain and smart devices to create community-driven networks. A new design helps these networks grow efficiently by processing tasks securely outside the main system.

Private Delegated Computations Using Strong Isolation
Confidential Computing secures data during processing using Trusted Execution Environments (TEEs). Veracruz simplifies deploying secure computations across diverse TEE types, supporting both hardware and software solutions for modern and legacy devices.
Confidential Computing protects sensitive data while it’s being processed, even from powerful attackers. Veracruz is a tool that makes it easier for different groups to work together securely by supporting various technologies, including older and newer devices.

Private Delegated Computations Using Strong Isolation
Confidential Computing secures data during processing using Trusted Execution Environments (TEEs). Veracruz simplifies deploying secure computations across diverse TEE types, supporting both hardware and software solutions for modern and legacy devices.
Confidential Computing protects sensitive data while it’s being processed, even from powerful attackers. Veracruz is a tool that makes it easier for different groups to work together securely by supporting various technologies, including older and newer devices.

Private Delegated Computations Using Strong Isolation
Confidential Computing secures data during processing using Trusted Execution Environments (TEEs). Veracruz simplifies deploying secure computations across diverse TEE types, supporting both hardware and software solutions for modern and legacy devices.
Confidential Computing protects sensitive data while it’s being processed, even from powerful attackers. Veracruz is a tool that makes it easier for different groups to work together securely by supporting various technologies, including older and newer devices.



