Category: Cryptographic Primitives

Threshold Cryptography

Threshold cryptography is a method of securing sensitive information or operations by splitting a secret into multiple parts. A minimum number of these parts, known as the threshold, must be combined to reconstruct the original secret or perform a secure action. This approach protects against loss or compromise by ensuring that no single person or…

Decentralised Key Management

Decentralised key management is a way to handle digital keys, such as those for encryption or signing, without relying on a single central authority. Instead, the responsibility for creating, storing, and sharing keys is spread across multiple people or systems, making it harder for any one person or group to compromise the entire system. This…

Bulletproofs

Bulletproofs are a type of cryptographic proof that lets someone show a statement is true without revealing any extra information. They are mainly used to keep transaction amounts private in cryptocurrencies, while still allowing others to verify that the transactions are valid. Bulletproofs are valued for being much shorter and faster than older privacy techniques,…

Schnorr Signatures

Schnorr signatures are a type of digital signature scheme used to prove the authenticity of digital messages or transactions. They are valued for their simplicity, efficiency, and strong security properties compared to other signature methods. Schnorr signatures allow multiple signatures to be combined into one, reducing the amount of data needed and improving privacy.

Multi-Party Computation

Multi-Party Computation, or MPC, is a method that allows several people or organisations to work together on a calculation using their own private data, without revealing that data to each other. Each participant only learns the result of the computation, not the other parties’ inputs. This makes it possible to collaborate securely, even if there…