Category: Decentralised Systems

Secret Sharing Schemes

Secret sharing schemes are methods used to split a secret, such as a password or encryption key, into several parts or shares. Each share is given to a different person or system. Only when a certain number of these shares are combined can the original secret be reconstructed. This approach helps protect sensitive information by…

Verifiable Computation

Verifiable computation is a method that allows someone to ask a third party to perform a calculation, then check that the result is correct without having to redo the entire work themselves. This is especially useful when the person verifying does not have the resources or time to carry out the computation independently. The process…

Blockchain and Cryptography

Blockchain is a digital system for recording transactions in a way that makes them secure, transparent, and nearly impossible to alter. Each block contains a list of transactions, and these blocks are linked together in a chain, forming a permanent record. Cryptography is the use of mathematical techniques to protect information, making sure only authorised…

Decentralised Name Services

Decentralised Name Services are systems that allow users to register and manage human-readable names, like website addresses, using blockchain technology. These names replace complex strings such as wallet addresses or technical identifiers, making it easier for people to interact with digital services. Because the system is decentralised, no single entity controls the database, reducing the…

Threshold Cryptography

Threshold cryptography is a method of securing sensitive information or operations by splitting a secret into multiple parts. A minimum number of these parts, known as the threshold, must be combined to reconstruct the original secret or perform a secure action. This approach protects against loss or compromise by ensuring that no single person or…

Decentralised Key Management

Decentralised key management is a way to handle digital keys, such as those for encryption or signing, without relying on a single central authority. Instead, the responsibility for creating, storing, and sharing keys is spread across multiple people or systems, making it harder for any one person or group to compromise the entire system. This…