Research Papers

Sentient AI: Bridging Realities with the Fusion of DePINs and AI Agents

This light paper highlights the benefits and potential use cases when connecting DePINs to AI agents and presents QUICKSILVER, a connectivity layer to realize this vision and fuel growth and technological breakthroughs across a wide range of industry sectors.

The integration of Decentralized Physical Infrastructure Networks (DePINs) with AI agents is a transformative shift in technology. This combination enables smarter, more efficient systems by processing data in real-time and adapting to changing conditions. The QUICKSILVER connectivity layer helps make this integration possible, driving innovation across various industries.

Sentient AI: Bridging Realities with the Fusion of DePINs and AI Agents

This light paper highlights the benefits and potential use cases when connecting DePINs to AI agents and presents QUICKSILVER, a connectivity layer to realize this vision and fuel growth and technological breakthroughs across a wide range of industry sectors.

The integration of Decentralized Physical Infrastructure Networks (DePINs) with AI agents is a transformative shift in technology. This combination enables smarter, more efficient systems by processing data in real-time and adapting to changing conditions. The QUICKSILVER connectivity layer helps make this integration possible, driving innovation across various industries.

Sentient AI: Bridging Realities with the Fusion of DePINs and AI Agents

This light paper highlights the benefits and potential use cases when connecting DePINs to AI agents and presents QUICKSILVER, a connectivity layer to realize this vision and fuel growth and technological breakthroughs across a wide range of industry sectors.

The integration of Decentralized Physical Infrastructure Networks (DePINs) with AI agents is a transformative shift in technology. This combination enables smarter, more efficient systems by processing data in real-time and adapting to changing conditions. The QUICKSILVER connectivity layer helps make this integration possible, driving innovation across various industries.

TPU as Cryptographic Accelerator

This paper explores the potential of leveraging AI accelerators (e.g., TPUs and NPUs) to optimize polynomial multiplication, a key bottleneck in Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), presenting adaptation techniques and preliminary evaluations to enhance performance while discussing current limitations and future directions for broader adoption of advanced cryptographic tools.

This paper explores using advanced AI hardware to speed up a crucial mathematical operation, helping to make powerful privacy technologies like Fully Homomorphic Encryption and Zero-Knowledge Proofs faster and more practical.

TPU as Cryptographic Accelerator

This paper explores the potential of leveraging AI accelerators (e.g., TPUs and NPUs) to optimize polynomial multiplication, a key bottleneck in Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), presenting adaptation techniques and preliminary evaluations to enhance performance while discussing current limitations and future directions for broader adoption of advanced cryptographic tools.

This paper explores using advanced AI hardware to speed up a crucial mathematical operation, helping to make powerful privacy technologies like Fully Homomorphic Encryption and Zero-Knowledge Proofs faster and more practical.

TPU as Cryptographic Accelerator

This paper explores the potential of leveraging AI accelerators (e.g., TPUs and NPUs) to optimize polynomial multiplication, a key bottleneck in Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), presenting adaptation techniques and preliminary evaluations to enhance performance while discussing current limitations and future directions for broader adoption of advanced cryptographic tools.

This paper explores using advanced AI hardware to speed up a crucial mathematical operation, helping to make powerful privacy technologies like Fully Homomorphic Encryption and Zero-Knowledge Proofs faster and more practical.

Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum

The paper proposes two strategies to transition Ethereum to post-quantum security: introducing a quantum-safe zero-knowledge proof in transactions and enhancing scalability with proof aggregation and zero-knowledge rollups, ensuring backward compatibility with minimal software changes for validators and clients.

The paper proposes two solutions to protect Ethereum from future quantum computer threats: adding secure transaction types and improving efficiency with advanced cryptography, all while keeping changes minimal and compatible with the current system.

Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum

The paper proposes two strategies to transition Ethereum to post-quantum security: introducing a quantum-safe zero-knowledge proof in transactions and enhancing scalability with proof aggregation and zero-knowledge rollups, ensuring backward compatibility with minimal software changes for validators and clients.

The paper proposes two solutions to protect Ethereum from future quantum computer threats: adding secure transaction types and improving efficiency with advanced cryptography, all while keeping changes minimal and compatible with the current system.

Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum

The paper proposes two strategies to transition Ethereum to post-quantum security: introducing a quantum-safe zero-knowledge proof in transactions and enhancing scalability with proof aggregation and zero-knowledge rollups, ensuring backward compatibility with minimal software changes for validators and clients.

The paper proposes two solutions to protect Ethereum from future quantum computer threats: adding secure transaction types and improving efficiency with advanced cryptography, all while keeping changes minimal and compatible with the current system.

New Directions in Decentralized Physical Infrastructure Networks

The modular DePIN infrastructure introduces a community-driven, flexible, and composable framework for building decentralized physical infrastructure networks, enabling tailored applications through interoperable modules while addressing technical and economic challenges through collaboration between academia and industry.

The modular DePIN infra is a community-driven approach to managing physical resources like energy and data. It uses interchangeable building blocks to create customized systems, making it easier and more collaborative, but also requires experts to work together to overcome challenges.

New Directions in Decentralized Physical Infrastructure Networks

The modular DePIN infrastructure introduces a community-driven, flexible, and composable framework for building decentralized physical infrastructure networks, enabling tailored applications through interoperable modules while addressing technical and economic challenges through collaboration between academia and industry.

The modular DePIN infra is a community-driven approach to managing physical resources like energy and data. It uses interchangeable building blocks to create customized systems, making it easier and more collaborative, but also requires experts to work together to overcome challenges.

New Directions in Decentralized Physical Infrastructure Networks

The modular DePIN infrastructure introduces a community-driven, flexible, and composable framework for building decentralized physical infrastructure networks, enabling tailored applications through interoperable modules while addressing technical and economic challenges through collaboration between academia and industry.

The modular DePIN infra is a community-driven approach to managing physical resources like energy and data. It uses interchangeable building blocks to create customized systems, making it easier and more collaborative, but also requires experts to work together to overcome challenges.

White Paper 2.0

The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".

IoTeX 2.0 is a three-year plan to expand its network by creating a flexible platform and improving its token system. This aims to make blockchain technology accessible to everyone, supporting innovative projects and connecting real-world devices with digital systems.

White Paper 2.0

The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".

IoTeX 2.0 is a three-year plan to expand its network by creating a flexible platform and improving its token system. This aims to make blockchain technology accessible to everyone, supporting innovative projects and connecting real-world devices with digital systems.

White Paper 2.0

The IoTeX 2.0 vision we're introducing outlines our three-year plan to expand the IoTeX Network. We aim to incorporate a new modular platform design, update our tokenomics, and more to meet the increasing demands of builders in the DePIN space and beyond. With this updated vision, we can finally realize our ultimate goal of empowering "DePIN for Everyone!".

IoTeX 2.0 is a three-year plan to expand its network by creating a flexible platform and improving its token system. This aims to make blockchain technology accessible to everyone, supporting innovative projects and connecting real-world devices with digital systems.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis

Decentralized Physical Infrastructure Networks - A Modular Infrastructure (DePIN) is evolving into a modular infrastructure model, enabling the development of decentralized applications through community-owned, flexible modules that enhance adaptability, efficiency, and collaboration in Web3 technologies.

DePIN use blockchain to create community-driven networks, promoting shared ownership and efficient management of resources like data storage and connectivity.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis

Decentralized Physical Infrastructure Networks - A Modular Infrastructure (DePIN) is evolving into a modular infrastructure model, enabling the development of decentralized applications through community-owned, flexible modules that enhance adaptability, efficiency, and collaboration in Web3 technologies.

DePIN use blockchain to create community-driven networks, promoting shared ownership and efficient management of resources like data storage and connectivity.

DePIN Report - Decentralized Physical Infrastructure Networks - A Modular Infrastructure Thesis

Decentralized Physical Infrastructure Networks - A Modular Infrastructure (DePIN) is evolving into a modular infrastructure model, enabling the development of decentralized applications through community-owned, flexible modules that enhance adaptability, efficiency, and collaboration in Web3 technologies.

DePIN use blockchain to create community-driven networks, promoting shared ownership and efficient management of resources like data storage and connectivity.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs

We revisit the precomputation-based multi-scalar multiplication (MSM) method introduced by Luo, Fu, and Gong at CHES 2023 and extend their approach. Specifically, we propose a generalized construction of optimal buckets. This enhancement results in notable performance gains, as confirmed through theoretical analysis and experimental validation.

Multi-scalar multiplication, crucial for zero-knowledge proofs, is often slow. Researchers have sped it up using precomputation methods. A recent study improved these methods, making them faster through better organization of precomputed values.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs

We revisit the precomputation-based multi-scalar multiplication (MSM) method introduced by Luo, Fu, and Gong at CHES 2023 and extend their approach. Specifically, we propose a generalized construction of optimal buckets. This enhancement results in notable performance gains, as confirmed through theoretical analysis and experimental validation.

Multi-scalar multiplication, crucial for zero-knowledge proofs, is often slow. Researchers have sped it up using precomputation methods. A recent study improved these methods, making them faster through better organization of precomputed values.

Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs

We revisit the precomputation-based multi-scalar multiplication (MSM) method introduced by Luo, Fu, and Gong at CHES 2023 and extend their approach. Specifically, we propose a generalized construction of optimal buckets. This enhancement results in notable performance gains, as confirmed through theoretical analysis and experimental validation.

Multi-scalar multiplication, crucial for zero-knowledge proofs, is often slow. Researchers have sped it up using precomputation methods. A recent study improved these methods, making them faster through better organization of precomputed values.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

This paper addresses the gap in Self-Sovereign Identity (SSI) applications by focusing on IoT, proposing a taxonomy for Verifiable Credentials, and exploring lifecycle management and optimization techniques. It aims to facilitate widespread adoption of SSI in securing IoT applications.

This paper aims to make digital identity systems safer and more efficient for use with smart devices. It identifies challenges and offers solutions to improve security and ease of use.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

This paper addresses the gap in Self-Sovereign Identity (SSI) applications by focusing on IoT, proposing a taxonomy for Verifiable Credentials, and exploring lifecycle management and optimization techniques. It aims to facilitate widespread adoption of SSI in securing IoT applications.

This paper aims to make digital identity systems safer and more efficient for use with smart devices. It identifies challenges and offers solutions to improve security and ease of use.

SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity

This paper addresses the gap in Self-Sovereign Identity (SSI) applications by focusing on IoT, proposing a taxonomy for Verifiable Credentials, and exploring lifecycle management and optimization techniques. It aims to facilitate widespread adoption of SSI in securing IoT applications.

This paper aims to make digital identity systems safer and more efficient for use with smart devices. It identifies challenges and offers solutions to improve security and ease of use.

Enabling Web2-Based User Authentication for Account Abstraction

In this demo, we describe the process of integrating typical Web2-based user authentication mechanisms into the ERC-4337 account abstraction (AA) and use the passkey-based authentication as an example to illustrate how to manage a smart contract wallet (SCW) using a passkey.

In this demo, we explain how to combine common Web2-style user login methods with a new blockchain feature called ERC-4337 account abstraction (AA). To make it simple, we use passkey-based login as an example to show how you can use it to manage a special type of digital wallet called a smart contract wallet (SCW).

Enabling Web2-Based User Authentication for Account Abstraction

In this demo, we describe the process of integrating typical Web2-based user authentication mechanisms into the ERC-4337 account abstraction (AA) and use the passkey-based authentication as an example to illustrate how to manage a smart contract wallet (SCW) using a passkey.

In this demo, we explain how to combine common Web2-style user login methods with a new blockchain feature called ERC-4337 account abstraction (AA). To make it simple, we use passkey-based login as an example to show how you can use it to manage a special type of digital wallet called a smart contract wallet (SCW).

Enabling Web2-Based User Authentication for Account Abstraction

In this demo, we describe the process of integrating typical Web2-based user authentication mechanisms into the ERC-4337 account abstraction (AA) and use the passkey-based authentication as an example to illustrate how to manage a smart contract wallet (SCW) using a passkey.

In this demo, we explain how to combine common Web2-style user login methods with a new blockchain feature called ERC-4337 account abstraction (AA). To make it simple, we use passkey-based login as an example to show how you can use it to manage a special type of digital wallet called a smart contract wallet (SCW).

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

Random numbers are crucial for dApps like gaming and DeFi, but existing on-chain and off-chain methods face security and complexity challenges. To address this, a hybrid solution using IoT devices with trusted execution environments (TEE) and cryptographic tools is proposed, ensuring unbiased randomness with reduced on-chain computation and cost.

Random numbers are crucial for online applications like games and finance, but current methods have security risks. A new approach uses secure devices to generate truly random numbers, making these applications more reliable and efficient. This method ensures fairness and reduces costs.

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

Random numbers are crucial for dApps like gaming and DeFi, but existing on-chain and off-chain methods face security and complexity challenges. To address this, a hybrid solution using IoT devices with trusted execution environments (TEE) and cryptographic tools is proposed, ensuring unbiased randomness with reduced on-chain computation and cost.

Random numbers are crucial for online applications like games and finance, but current methods have security risks. A new approach uses secure devices to generate truly random numbers, making these applications more reliable and efficient. This method ensures fairness and reduces costs.

Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

Random numbers are crucial for dApps like gaming and DeFi, but existing on-chain and off-chain methods face security and complexity challenges. To address this, a hybrid solution using IoT devices with trusted execution environments (TEE) and cryptographic tools is proposed, ensuring unbiased randomness with reduced on-chain computation and cost.

Random numbers are crucial for online applications like games and finance, but current methods have security risks. A new approach uses secure devices to generate truly random numbers, making these applications more reliable and efficient. This method ensures fairness and reduces costs.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper

Decentralized Physical Infrastructure Networks (DePINs) combine blockchain, IoT, and tokenomics to create decentralized IoT systems. A modular architecture with off-chain computing and zero-knowledge proofs is proposed to address scalability issues in DePINs.

DePINs use blockchain and smart devices to create community-driven networks. A new design helps these networks grow efficiently by processing tasks securely outside the main system.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper

Decentralized Physical Infrastructure Networks (DePINs) combine blockchain, IoT, and tokenomics to create decentralized IoT systems. A modular architecture with off-chain computing and zero-knowledge proofs is proposed to address scalability issues in DePINs.

DePINs use blockchain and smart devices to create community-driven networks. A new design helps these networks grow efficiently by processing tasks securely outside the main system.

Towards a Rollup-Centric Scalable Architecture for Decentralized Physical Infrastructure Networks: A Position Paper

Decentralized Physical Infrastructure Networks (DePINs) combine blockchain, IoT, and tokenomics to create decentralized IoT systems. A modular architecture with off-chain computing and zero-knowledge proofs is proposed to address scalability issues in DePINs.

DePINs use blockchain and smart devices to create community-driven networks. A new design helps these networks grow efficiently by processing tasks securely outside the main system.

Private Delegated Computations Using Strong Isolation

Confidential Computing secures data during processing using Trusted Execution Environments (TEEs). Veracruz simplifies deploying secure computations across diverse TEE types, supporting both hardware and software solutions for modern and legacy devices.

Confidential Computing protects sensitive data while it’s being processed, even from powerful attackers. Veracruz is a tool that makes it easier for different groups to work together securely by supporting various technologies, including older and newer devices.

Private Delegated Computations Using Strong Isolation

Confidential Computing secures data during processing using Trusted Execution Environments (TEEs). Veracruz simplifies deploying secure computations across diverse TEE types, supporting both hardware and software solutions for modern and legacy devices.

Confidential Computing protects sensitive data while it’s being processed, even from powerful attackers. Veracruz is a tool that makes it easier for different groups to work together securely by supporting various technologies, including older and newer devices.

Private Delegated Computations Using Strong Isolation

Confidential Computing secures data during processing using Trusted Execution Environments (TEEs). Veracruz simplifies deploying secure computations across diverse TEE types, supporting both hardware and software solutions for modern and legacy devices.

Confidential Computing protects sensitive data while it’s being processed, even from powerful attackers. Veracruz is a tool that makes it easier for different groups to work together securely by supporting various technologies, including older and newer devices.

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection

Trusted Execution Environment (TEE) technology is crucial for securing critical infrastructure, but its heterogeneity poses challenges. DHTee uses blockchain to enable secure interactions and attestation among diverse TEEs, ensuring compatibility and flexibility.

TEE technology helps protect important systems from cyber threats efficiently. However, different devices often use incompatible TEE types, making it hard for them to work together securely. DHTee solves this by using blockchain to help these devices verify and trust each other, ensuring smooth and secure collaboration.

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection

Trusted Execution Environment (TEE) technology is crucial for securing critical infrastructure, but its heterogeneity poses challenges. DHTee uses blockchain to enable secure interactions and attestation among diverse TEEs, ensuring compatibility and flexibility.

TEE technology helps protect important systems from cyber threats efficiently. However, different devices often use incompatible TEE types, making it hard for them to work together securely. DHTee solves this by using blockchain to help these devices verify and trust each other, ensuring smooth and secure collaboration.

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection

Trusted Execution Environment (TEE) technology is crucial for securing critical infrastructure, but its heterogeneity poses challenges. DHTee uses blockchain to enable secure interactions and attestation among diverse TEEs, ensuring compatibility and flexibility.

TEE technology helps protect important systems from cyber threats efficiently. However, different devices often use incompatible TEE types, making it hard for them to work together securely. DHTee solves this by using blockchain to help these devices verify and trust each other, ensuring smooth and secure collaboration.

DIoTA: Decentralized Ledger Based Framework for Data Authenticity Protection in IoT Systems

By 2020, over 20 billion IoT devices were predicted to be deployed globally. To address authentication challenges, DIoTA proposes a decentralized ledger-based framework with lightweight authentication for secure IoT management.

By 2020, over 20 billion smart devices were expected to be used worldwide in systems like smart cities and industries. To keep these devices and their data secure, a new system called DIoTA was created to ensure safety and efficiency.

DIoTA: Decentralized Ledger Based Framework for Data Authenticity Protection in IoT Systems

By 2020, over 20 billion IoT devices were predicted to be deployed globally. To address authentication challenges, DIoTA proposes a decentralized ledger-based framework with lightweight authentication for secure IoT management.

By 2020, over 20 billion smart devices were expected to be used worldwide in systems like smart cities and industries. To keep these devices and their data secure, a new system called DIoTA was created to ensure safety and efficiency.

DIoTA: Decentralized Ledger Based Framework for Data Authenticity Protection in IoT Systems

By 2020, over 20 billion IoT devices were predicted to be deployed globally. To address authentication challenges, DIoTA proposes a decentralized ledger-based framework with lightweight authentication for secure IoT management.

By 2020, over 20 billion smart devices were expected to be used worldwide in systems like smart cities and industries. To keep these devices and their data secure, a new system called DIoTA was created to ensure safety and efficiency.

Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes

The PBFT algorithm in blockchain systems faces high computational overhead due to extensive digital signature verification. A proposed PBFT variant uses short-lived keys and optimized BLS signatures to significantly improve scalability and efficiency.

The PBFT system, used in blockchains, can be slow because it requires a lot of checks to ensure messages are authentic. To make it faster, a new method is introduced that uses temporary keys and smarter ways to verify messages, making the process much more efficient.

Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes

The PBFT algorithm in blockchain systems faces high computational overhead due to extensive digital signature verification. A proposed PBFT variant uses short-lived keys and optimized BLS signatures to significantly improve scalability and efficiency.

The PBFT system, used in blockchains, can be slow because it requires a lot of checks to ensure messages are authentic. To make it faster, a new method is introduced that uses temporary keys and smarter ways to verify messages, making the process much more efficient.

Scalable Practical Byzantine Fault Tolerance with Short-lived Signature Schemes

The PBFT algorithm in blockchain systems faces high computational overhead due to extensive digital signature verification. A proposed PBFT variant uses short-lived keys and optimized BLS signatures to significantly improve scalability and efficiency.

The PBFT system, used in blockchains, can be slow because it requires a lot of checks to ensure messages are authentic. To make it faster, a new method is introduced that uses temporary keys and smarter ways to verify messages, making the process much more efficient.

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

Ucam is a blockchain-based home IP camera system that enhances security and privacy through end-to-end encryption and blockchain management. It replaces traditional logins with blockchain keys and supports secure video sharing. This approach ensures robust privacy with minimal performance impact.

Ucam is a smart home camera designed to protect your privacy and security. Instead of using passwords, it uses a more secure method based on unique digital keys. Ucam ensures your videos are private, safe from hackers, and easy to share securely with others.

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

Ucam is a blockchain-based home IP camera system that enhances security and privacy through end-to-end encryption and blockchain management. It replaces traditional logins with blockchain keys and supports secure video sharing. This approach ensures robust privacy with minimal performance impact.

Ucam is a smart home camera designed to protect your privacy and security. Instead of using passwords, it uses a more secure method based on unique digital keys. Ucam ensures your videos are private, safe from hackers, and easy to share securely with others.

Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System

Ucam is a blockchain-based home IP camera system that enhances security and privacy through end-to-end encryption and blockchain management. It replaces traditional logins with blockchain keys and supports secure video sharing. This approach ensures robust privacy with minimal performance impact.

Ucam is a smart home camera designed to protect your privacy and security. Instead of using passwords, it uses a more secure method based on unique digital keys. Ucam ensures your videos are private, safe from hackers, and easy to share securely with others.

Decentralized IoT Data Authorization with Pebble Tracker

DIDs and verifiable credentials (VCs) enable self-sovereign digital identities for people, organizations, and IoT devices. A demo utilizing a Pebble tracker showcases a decentralized IoT data authorization framework, offering flexibility and scalability for global IoT applications, marking the first real-world implementation of DIDs and VCs in this context.

Decentralized identifiers and verifiable credentials help create secure digital identities for people and devices. A demo with a GPS tracker shows how these technologies can securely share data, making it easier to build global systems for connected devices. It’s the first real-world example of using these tools for secure data sharing.

Decentralized IoT Data Authorization with Pebble Tracker

DIDs and verifiable credentials (VCs) enable self-sovereign digital identities for people, organizations, and IoT devices. A demo utilizing a Pebble tracker showcases a decentralized IoT data authorization framework, offering flexibility and scalability for global IoT applications, marking the first real-world implementation of DIDs and VCs in this context.

Decentralized identifiers and verifiable credentials help create secure digital identities for people and devices. A demo with a GPS tracker shows how these technologies can securely share data, making it easier to build global systems for connected devices. It’s the first real-world example of using these tools for secure data sharing.

Decentralized IoT Data Authorization with Pebble Tracker

DIDs and verifiable credentials (VCs) enable self-sovereign digital identities for people, organizations, and IoT devices. A demo utilizing a Pebble tracker showcases a decentralized IoT data authorization framework, offering flexibility and scalability for global IoT applications, marking the first real-world implementation of DIDs and VCs in this context.

Decentralized identifiers and verifiable credentials help create secure digital identities for people and devices. A demo with a GPS tracker shows how these technologies can securely share data, making it easier to build global systems for connected devices. It’s the first real-world example of using these tools for secure data sharing.

Towards Credential-Based Device Registration in DApps for DePINs With ZKPs

In this paper, we propose a credentialbased device registration (CDR) mechanism that verifies device credentials on the blockchain and leverages zero-knowledge proofs (ZKP) to protect confidential device attributes from being disclosed.

Decentralized networks use blockchain to manage devices, but they struggle with trust and privacy. A new system checks device credentials using zero-knowledge proofs, ensuring trust without revealing sensitive information. This approach is tested for practical effectiveness.

Towards Credential-Based Device Registration in DApps for DePINs With ZKPs

In this paper, we propose a credentialbased device registration (CDR) mechanism that verifies device credentials on the blockchain and leverages zero-knowledge proofs (ZKP) to protect confidential device attributes from being disclosed.

Decentralized networks use blockchain to manage devices, but they struggle with trust and privacy. A new system checks device credentials using zero-knowledge proofs, ensuring trust without revealing sensitive information. This approach is tested for practical effectiveness.

Towards Credential-Based Device Registration in DApps for DePINs With ZKPs

In this paper, we propose a credentialbased device registration (CDR) mechanism that verifies device credentials on the blockchain and leverages zero-knowledge proofs (ZKP) to protect confidential device attributes from being disclosed.

Decentralized networks use blockchain to manage devices, but they struggle with trust and privacy. A new system checks device credentials using zero-knowledge proofs, ensuring trust without revealing sensitive information. This approach is tested for practical effectiveness.

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP

The Metaverse aims to provide an immersive, interconnected experience enabled by various technologies. It relies on DCS, such as blockchain, to ensure secure interoperability between platforms. Integrating DCS with protocols like BGP is proposed to enhance security and performance in this ecosystem.

The Metaverse is a virtual world where people can connect and interact using technologies like VR headsets, smartphones, and computers. To make different virtual worlds work together smoothly and securely, it will rely on systems similar to blockchain, which help manage digital assets and ensure trust. By improving how these systems connect, the Metaverse can become a more open, secure, and seamless experience for everyone.

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP

The Metaverse aims to provide an immersive, interconnected experience enabled by various technologies. It relies on DCS, such as blockchain, to ensure secure interoperability between platforms. Integrating DCS with protocols like BGP is proposed to enhance security and performance in this ecosystem.

The Metaverse is a virtual world where people can connect and interact using technologies like VR headsets, smartphones, and computers. To make different virtual worlds work together smoothly and securely, it will rely on systems similar to blockchain, which help manage digital assets and ensure trust. By improving how these systems connect, the Metaverse can become a more open, secure, and seamless experience for everyone.

BGP Blockchain for Metaverse - A Distributed Consensus System for BGP

The Metaverse aims to provide an immersive, interconnected experience enabled by various technologies. It relies on DCS, such as blockchain, to ensure secure interoperability between platforms. Integrating DCS with protocols like BGP is proposed to enhance security and performance in this ecosystem.

The Metaverse is a virtual world where people can connect and interact using technologies like VR headsets, smartphones, and computers. To make different virtual worlds work together smoothly and securely, it will rely on systems similar to blockchain, which help manage digital assets and ensure trust. By improving how these systems connect, the Metaverse can become a more open, secure, and seamless experience for everyone.

Privacy-Preserving Object Detection with Veracruz

Ucam is a blockchain-based, end-to-end secure home IP camera system by IoTeX, ensuring user-controlled data privacy through encryption and blockchain-managed ownership. A proof-of-concept using Arm’s Veracruz framework demonstrates privacy-preserving object detection without compromising sensitive user information.

Ucam is a smart home security camera designed to protect your privacy by keeping your videos safe and fully under your control. A new feature has been tested that allows the camera to detect objects, like people or pets, without exposing any of your personal data.

Privacy-Preserving Object Detection with Veracruz

Ucam is a blockchain-based, end-to-end secure home IP camera system by IoTeX, ensuring user-controlled data privacy through encryption and blockchain-managed ownership. A proof-of-concept using Arm’s Veracruz framework demonstrates privacy-preserving object detection without compromising sensitive user information.

Ucam is a smart home security camera designed to protect your privacy by keeping your videos safe and fully under your control. A new feature has been tested that allows the camera to detect objects, like people or pets, without exposing any of your personal data.

Privacy-Preserving Object Detection with Veracruz

Ucam is a blockchain-based, end-to-end secure home IP camera system by IoTeX, ensuring user-controlled data privacy through encryption and blockchain-managed ownership. A proof-of-concept using Arm’s Veracruz framework demonstrates privacy-preserving object detection without compromising sensitive user information.

Ucam is a smart home security camera designed to protect your privacy by keeping your videos safe and fully under your control. A new feature has been tested that allows the camera to detect objects, like people or pets, without exposing any of your personal data.

DHTee: Decentralized Infrastructure for Heterogeneous TEEs

Trusted Execution Environment (TEE) technology faces adoption challenges due to vendor incompatibility and trust issues. DHTee, a blockchain-based mechanism, addresses these by supporting secure interactions among heterogeneous TEEs.

Trusted Execution Environment (TEE) technology helps protect sensitive data but is hard to use widely because different systems don’t work well together, and it’s difficult to build trust between devices owned by different people. DHTee solves this by using blockchain to help devices securely verify and work with each other, even if they use different systems.

DHTee: Decentralized Infrastructure for Heterogeneous TEEs

Trusted Execution Environment (TEE) technology faces adoption challenges due to vendor incompatibility and trust issues. DHTee, a blockchain-based mechanism, addresses these by supporting secure interactions among heterogeneous TEEs.

Trusted Execution Environment (TEE) technology helps protect sensitive data but is hard to use widely because different systems don’t work well together, and it’s difficult to build trust between devices owned by different people. DHTee solves this by using blockchain to help devices securely verify and work with each other, even if they use different systems.

DHTee: Decentralized Infrastructure for Heterogeneous TEEs

Trusted Execution Environment (TEE) technology faces adoption challenges due to vendor incompatibility and trust issues. DHTee, a blockchain-based mechanism, addresses these by supporting secure interactions among heterogeneous TEEs.

Trusted Execution Environment (TEE) technology helps protect sensitive data but is hard to use widely because different systems don’t work well together, and it’s difficult to build trust between devices owned by different people. DHTee solves this by using blockchain to help devices securely verify and work with each other, even if they use different systems.

Connecting Smart Devices to Smart Contracts with W3bstream

In this demo, we illustrate the process of creating a machine economy utilizing W3bstream - an emerging open-source framework designed for connecting smart devices to smart contracts. We will emphasize the flexibility and user-friendliness of W3bstream in empowering decentralized IoT applications.

This demo shows how smart devices can work together in a new type of digital economy using W3bstream, a tool that connects devices to secure online agreements. The focus is on how easy and flexible W3bstream is for creating innovative, decentralized applications.

Connecting Smart Devices to Smart Contracts with W3bstream

In this demo, we illustrate the process of creating a machine economy utilizing W3bstream - an emerging open-source framework designed for connecting smart devices to smart contracts. We will emphasize the flexibility and user-friendliness of W3bstream in empowering decentralized IoT applications.

This demo shows how smart devices can work together in a new type of digital economy using W3bstream, a tool that connects devices to secure online agreements. The focus is on how easy and flexible W3bstream is for creating innovative, decentralized applications.

Connecting Smart Devices to Smart Contracts with W3bstream

In this demo, we illustrate the process of creating a machine economy utilizing W3bstream - an emerging open-source framework designed for connecting smart devices to smart contracts. We will emphasize the flexibility and user-friendliness of W3bstream in empowering decentralized IoT applications.

This demo shows how smart devices can work together in a new type of digital economy using W3bstream, a tool that connects devices to secure online agreements. The focus is on how easy and flexible W3bstream is for creating innovative, decentralized applications.

Insights on Impact of Distributed Ledgers on Provider Networks

This paper explores how randomized algorithms enhance distributed consensus, evaluating communication overhead against metrics like latency. It invites further research into mitigating inefficiencies in DLT and network systems through innovative approaches.

This paper looks at how randomization can help systems reach agreement in a decentralized way, making them more reliable and resilient, even though it can be costly to communicate. It also examines how communication impacts speed and efficiency. While it doesn’t propose specific solutions, the study encourages further exploration of new ideas to improve communication in blockchain and similar technologies.

Insights on Impact of Distributed Ledgers on Provider Networks

This paper explores how randomized algorithms enhance distributed consensus, evaluating communication overhead against metrics like latency. It invites further research into mitigating inefficiencies in DLT and network systems through innovative approaches.

This paper looks at how randomization can help systems reach agreement in a decentralized way, making them more reliable and resilient, even though it can be costly to communicate. It also examines how communication impacts speed and efficiency. While it doesn’t propose specific solutions, the study encourages further exploration of new ideas to improve communication in blockchain and similar technologies.

Insights on Impact of Distributed Ledgers on Provider Networks

This paper explores how randomized algorithms enhance distributed consensus, evaluating communication overhead against metrics like latency. It invites further research into mitigating inefficiencies in DLT and network systems through innovative approaches.

This paper looks at how randomization can help systems reach agreement in a decentralized way, making them more reliable and resilient, even though it can be costly to communicate. It also examines how communication impacts speed and efficiency. While it doesn’t propose specific solutions, the study encourages further exploration of new ideas to improve communication in blockchain and similar technologies.

New Gold Mine: Harvesting IoT Data through DeFi in a Secure Manner

As IoT devices generate massive amounts of data, a decentralized marketplace like DTIDM is proposed to enable secure and effective data trading. Leveraging blockchain technology, DTIDM addresses challenges such as trustworthiness and supports diverse trading mechanisms, while being adaptable to various blockchain environments.

With the growing use of IoT devices collecting massive amounts of data, there’s a need for a secure and fair marketplace where people can buy and sell this data. DTIDM is a new system designed to make this possible by using blockchain technology to ensure trust and fairness in transactions. It’s flexible, supports different ways to trade data, and can work with various blockchain platforms.

New Gold Mine: Harvesting IoT Data through DeFi in a Secure Manner

As IoT devices generate massive amounts of data, a decentralized marketplace like DTIDM is proposed to enable secure and effective data trading. Leveraging blockchain technology, DTIDM addresses challenges such as trustworthiness and supports diverse trading mechanisms, while being adaptable to various blockchain environments.

With the growing use of IoT devices collecting massive amounts of data, there’s a need for a secure and fair marketplace where people can buy and sell this data. DTIDM is a new system designed to make this possible by using blockchain technology to ensure trust and fairness in transactions. It’s flexible, supports different ways to trade data, and can work with various blockchain platforms.

New Gold Mine: Harvesting IoT Data through DeFi in a Secure Manner

As IoT devices generate massive amounts of data, a decentralized marketplace like DTIDM is proposed to enable secure and effective data trading. Leveraging blockchain technology, DTIDM addresses challenges such as trustworthiness and supports diverse trading mechanisms, while being adaptable to various blockchain environments.

With the growing use of IoT devices collecting massive amounts of data, there’s a need for a secure and fair marketplace where people can buy and sell this data. DTIDM is a new system designed to make this possible by using blockchain technology to ensure trust and fairness in transactions. It’s flexible, supports different ways to trade data, and can work with various blockchain platforms.

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement

IoT devices provide valuable data for DNN applications, but distributed training faces trust issues. A blockchain-based system is proposed to ensure integrity and authenticity in edge computing environments by integrating cryptographic techniques with distributed DNNs.

IoT devices collect a lot of useful data, but sharing and processing this data can be challenging due to trust issues between different parties. To solve this, a blockchain-based system is introduced to ensure the data and AI models remain secure and reliable when used in IoT networks.

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement

IoT devices provide valuable data for DNN applications, but distributed training faces trust issues. A blockchain-based system is proposed to ensure integrity and authenticity in edge computing environments by integrating cryptographic techniques with distributed DNNs.

IoT devices collect a lot of useful data, but sharing and processing this data can be challenging due to trust issues between different parties. To solve this, a blockchain-based system is introduced to ensure the data and AI models remain secure and reliable when used in IoT networks.

Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement

IoT devices provide valuable data for DNN applications, but distributed training faces trust issues. A blockchain-based system is proposed to ensure integrity and authenticity in edge computing environments by integrating cryptographic techniques with distributed DNNs.

IoT devices collect a lot of useful data, but sharing and processing this data can be challenging due to trust issues between different parties. To solve this, a blockchain-based system is introduced to ensure the data and AI models remain secure and reliable when used in IoT networks.

EMS: An Extensible and Modular Staking Architecture for Proof of Stake Systems

EMS is a modular and extensible staking architecture for PoS systems, designed to accommodate diverse blockchain requirements by using a novel bucket-based data structure for flexibility and scalability. Its implementation on the IoTeX blockchain demonstrates its practical effectiveness in meeting the needs of PoS systems.

EMS is a flexible and adaptable system designed to manage staking, a key process in many blockchain networks that use PoS. By organizing data in an innovative way, EMS can easily adjust to meet the unique needs of different blockchains, as shown by its successful use in the IoTeX blockchain.

EMS: An Extensible and Modular Staking Architecture for Proof of Stake Systems

EMS is a modular and extensible staking architecture for PoS systems, designed to accommodate diverse blockchain requirements by using a novel bucket-based data structure for flexibility and scalability. Its implementation on the IoTeX blockchain demonstrates its practical effectiveness in meeting the needs of PoS systems.

EMS is a flexible and adaptable system designed to manage staking, a key process in many blockchain networks that use PoS. By organizing data in an innovative way, EMS can easily adjust to meet the unique needs of different blockchains, as shown by its successful use in the IoTeX blockchain.

EMS: An Extensible and Modular Staking Architecture for Proof of Stake Systems

EMS is a modular and extensible staking architecture for PoS systems, designed to accommodate diverse blockchain requirements by using a novel bucket-based data structure for flexibility and scalability. Its implementation on the IoTeX blockchain demonstrates its practical effectiveness in meeting the needs of PoS systems.

EMS is a flexible and adaptable system designed to manage staking, a key process in many blockchain networks that use PoS. By organizing data in an innovative way, EMS can easily adjust to meet the unique needs of different blockchains, as shown by its successful use in the IoTeX blockchain.

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The Industrial Internet of Things (IIoT) boosts efficiency and automation, but its complexity challenges traditional security. DL-DP addresses this by introducing a decentralized ledger framework for secure resource management, offering features like access control and denial-of-service mitigation. This approach is validated through a prototype evaluation.

The Industrial Internet of Things (IIoT) makes industries work smarter and faster, but it’s hard to manage and protect. DL-DP solves this by creating a secure system that controls access and prevents disruptions, as shown in a working prototype.

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The Industrial Internet of Things (IIoT) boosts efficiency and automation, but its complexity challenges traditional security. DL-DP addresses this by introducing a decentralized ledger framework for secure resource management, offering features like access control and denial-of-service mitigation. This approach is validated through a prototype evaluation.

The Industrial Internet of Things (IIoT) makes industries work smarter and faster, but it’s hard to manage and protect. DL-DP solves this by creating a secure system that controls access and prevents disruptions, as shown in a working prototype.

DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter

The Industrial Internet of Things (IIoT) boosts efficiency and automation, but its complexity challenges traditional security. DL-DP addresses this by introducing a decentralized ledger framework for secure resource management, offering features like access control and denial-of-service mitigation. This approach is validated through a prototype evaluation.

The Industrial Internet of Things (IIoT) makes industries work smarter and faster, but it’s hard to manage and protect. DL-DP solves this by creating a secure system that controls access and prevents disruptions, as shown in a working prototype.

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

The DIAM-IoT framework uses blockchain, DIDs, and VCs to create a secure, interoperable identity registry for IoT devices, enhancing user control and global scalability. This approach breaks IoT silos and enables decentralized data authorization.

The DIAM-IoT framework creates a secure system for managing the identities of Internet-connected devices using blockchain technology. By improving how devices are identified and verified, it ensures better security, gives users more control, and allows devices to work together seamlessly on a global scale.

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

The DIAM-IoT framework uses blockchain, DIDs, and VCs to create a secure, interoperable identity registry for IoT devices, enhancing user control and global scalability. This approach breaks IoT silos and enables decentralized data authorization.

The DIAM-IoT framework creates a secure system for managing the identities of Internet-connected devices using blockchain technology. By improving how devices are identified and verified, it ensures better security, gives users more control, and allows devices to work together seamlessly on a global scale.

DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

The DIAM-IoT framework uses blockchain, DIDs, and VCs to create a secure, interoperable identity registry for IoT devices, enhancing user control and global scalability. This approach breaks IoT silos and enables decentralized data authorization.

The DIAM-IoT framework creates a secure system for managing the identities of Internet-connected devices using blockchain technology. By improving how devices are identified and verified, it ensures better security, gives users more control, and allows devices to work together seamlessly on a global scale.

MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance

While effective for established cryptocurrencies, on-chain governance poses security risks for newer projects with smaller market caps. To address this, the MULTAV framework introduces multi-chain token-backed voting, enhancing security by enabling votes across multiple established blockchains, as demonstrated in its application on the IoTeX network.

On-chain governance lets cryptocurrency communities vote on system changes using tokens. However, this can be risky for smaller projects. The MULTAV framework enhances security by allowing votes across multiple established systems.

MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance

While effective for established cryptocurrencies, on-chain governance poses security risks for newer projects with smaller market caps. To address this, the MULTAV framework introduces multi-chain token-backed voting, enhancing security by enabling votes across multiple established blockchains, as demonstrated in its application on the IoTeX network.

On-chain governance lets cryptocurrency communities vote on system changes using tokens. However, this can be risky for smaller projects. The MULTAV framework enhances security by allowing votes across multiple established systems.

MULTAV: A Multi-Chain Token Backed Voting Framework for Decentralized Blockchain Governance

While effective for established cryptocurrencies, on-chain governance poses security risks for newer projects with smaller market caps. To address this, the MULTAV framework introduces multi-chain token-backed voting, enhancing security by enabling votes across multiple established blockchains, as demonstrated in its application on the IoTeX network.

On-chain governance lets cryptocurrency communities vote on system changes using tokens. However, this can be risky for smaller projects. The MULTAV framework enhances security by allowing votes across multiple established systems.

EcoBoost: Efficient Bootstrapping for Confidential Transactions

Confidential transactions in blockchains improve privacy by hiding transaction amounts but have high storage overhead (10–20x), making it costly and inefficient for resource-limited devices. EcoBoost addresses this by using random sampling to verify transactions with sublinear overhead, reducing storage and verification time by over 86% while detecting fraudulent transactions with 99% accuracy.

Cryptocurrencies lack privacy, but making transactions private requires a lot of extra storage. Our solution, EcoBoost, uses random checks to verify transactions efficiently, reducing storage and time by over 86% while catching fake transactions 99% of the time.

EcoBoost: Efficient Bootstrapping for Confidential Transactions

Confidential transactions in blockchains improve privacy by hiding transaction amounts but have high storage overhead (10–20x), making it costly and inefficient for resource-limited devices. EcoBoost addresses this by using random sampling to verify transactions with sublinear overhead, reducing storage and verification time by over 86% while detecting fraudulent transactions with 99% accuracy.

Cryptocurrencies lack privacy, but making transactions private requires a lot of extra storage. Our solution, EcoBoost, uses random checks to verify transactions efficiently, reducing storage and time by over 86% while catching fake transactions 99% of the time.

EcoBoost: Efficient Bootstrapping for Confidential Transactions

Confidential transactions in blockchains improve privacy by hiding transaction amounts but have high storage overhead (10–20x), making it costly and inefficient for resource-limited devices. EcoBoost addresses this by using random sampling to verify transactions with sublinear overhead, reducing storage and verification time by over 86% while detecting fraudulent transactions with 99% accuracy.

Cryptocurrencies lack privacy, but making transactions private requires a lot of extra storage. Our solution, EcoBoost, uses random checks to verify transactions efficiently, reducing storage and time by over 86% while catching fake transactions 99% of the time.

Supporting Blockchain based Cryptocurrency Mobile Payment with Smart Devices

With smart devices and cryptocurrency on the rise, there’s a growing demand for mobile cryptocurrency payments, especially in developing regions. We propose two schemes: one centralized and another decentralized, addressing challenges like storage costs and latency.

As smartphones and cryptocurrency grow in popularity, there’s a need for easy mobile cryptocurrency payments, especially in developing countries. We propose two solutions: one with banks and one without, to solve issues like high costs and slow transactions.

Supporting Blockchain based Cryptocurrency Mobile Payment with Smart Devices

With smart devices and cryptocurrency on the rise, there’s a growing demand for mobile cryptocurrency payments, especially in developing regions. We propose two schemes: one centralized and another decentralized, addressing challenges like storage costs and latency.

As smartphones and cryptocurrency grow in popularity, there’s a need for easy mobile cryptocurrency payments, especially in developing countries. We propose two solutions: one with banks and one without, to solve issues like high costs and slow transactions.

Supporting Blockchain based Cryptocurrency Mobile Payment with Smart Devices

With smart devices and cryptocurrency on the rise, there’s a growing demand for mobile cryptocurrency payments, especially in developing regions. We propose two schemes: one centralized and another decentralized, addressing challenges like storage costs and latency.

As smartphones and cryptocurrency grow in popularity, there’s a need for easy mobile cryptocurrency payments, especially in developing countries. We propose two solutions: one with banks and one without, to solve issues like high costs and slow transactions.

KCRS: A Blockchain-Based Key Compromise Resilient Signature System

In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys.

As smartphones and cryptocurrency grow in popularity, there’s a need for easy mobile cryptocurrency payments, especially in developing countries. We propose two solutions: one with banks and one without, to solve issues like high costs and slow transactions.

KCRS: A Blockchain-Based Key Compromise Resilient Signature System

In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys.

As smartphones and cryptocurrency grow in popularity, there’s a need for easy mobile cryptocurrency payments, especially in developing countries. We propose two solutions: one with banks and one without, to solve issues like high costs and slow transactions.

KCRS: A Blockchain-Based Key Compromise Resilient Signature System

In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys.

As smartphones and cryptocurrency grow in popularity, there’s a need for easy mobile cryptocurrency payments, especially in developing countries. We propose two solutions: one with banks and one without, to solve issues like high costs and slow transactions.

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth addresses enhance blockchain privacy by hiding transaction destinations but require significant computational resources, limiting their use in IoT environments. DKSAP-IoT, a proposed dual-key stealth address protocol, improves efficiency by reducing computational overhead by at least 50%, making it more suitable for blockchain-based IoT systems.

Stealth addresses protect blockchain privacy by hiding recipient addresses, but they need a lot of computing power. DKSAP-IoT is a new method that works faster and uses less power, making blockchain more suitable for small IoT devices.

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth addresses enhance blockchain privacy by hiding transaction destinations but require significant computational resources, limiting their use in IoT environments. DKSAP-IoT, a proposed dual-key stealth address protocol, improves efficiency by reducing computational overhead by at least 50%, making it more suitable for blockchain-based IoT systems.

Stealth addresses protect blockchain privacy by hiding recipient addresses, but they need a lot of computing power. DKSAP-IoT is a new method that works faster and uses less power, making blockchain more suitable for small IoT devices.

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth addresses enhance blockchain privacy by hiding transaction destinations but require significant computational resources, limiting their use in IoT environments. DKSAP-IoT, a proposed dual-key stealth address protocol, improves efficiency by reducing computational overhead by at least 50%, making it more suitable for blockchain-based IoT systems.

Stealth addresses protect blockchain privacy by hiding recipient addresses, but they need a lot of computing power. DKSAP-IoT is a new method that works faster and uses less power, making blockchain more suitable for small IoT devices.

DePIN + AI for Everyone

IoTeX is the only modular infrastructure in the DePIN sector that offers a comprehensive suite of tools to create fully decentralized, composable, and interoperable DePIN projects.

©2025

IoTeX, All rights reserved.

DePIN + AI for Everyone

IoTeX is the only modular infrastructure in the DePIN sector that offers a comprehensive suite of tools to create fully decentralized, composable, and interoperable DePIN projects.

©2025

IoTeX, All rights reserved.

DePIN + AI for Everyone

IoTeX is the only modular infrastructure in the DePIN sector that offers a comprehensive suite of tools to create fully decentralized, composable, and interoperable DePIN projects.

©2025

IoTeX, All rights reserved.