Garry FCR
@GarryFCR_
Followers
21
Following
59
Media
0
Statuses
13
Cooking @StoffelMPC π¦‘.
Shillong, India
Joined April 2021
Happy New Year Besides the occasional retweets, I've been toiling away in my burrow. Not giving a fuck about the changes to the algo Focused on working with real companies on bringing privacy-first tools to market Over the past 10 months, I've
4
4
21
Spend your entire balance held across chains, without bridging, in under 10 seconds π€― Here's a first glimpse of Arcana's Chain Abstraction demo on Aave! No forks. No integration. No lockup of assets. No smart contract wallets with absurd gas fees Arcana is the first Chain
54
75
303
New Date Announced π Pumped to finally go live with the $XAR Reg-D token offering on @joinrepublic The 48 hours Allowlist Sale will now commence on 29th Nov at 8 am EST. We're almost there πͺ
152
153
214
π SendIT is now 50,000 users strong π SendIT has gone past 50,000 users in just 6 days! Next stop β 100kΒ Join the movement & make crypto transactions simple Experience flawless transactions & collect rewards while doing it. Just #SendIT Thank you for your support β₯οΈ
20
16
54
Nowadays the increasing popularity of threshold signatures and MPC schemes make DKG a powerful staple when working with decentralized protocols. Follow to know more about cryptography & other schemes in web3
0
0
2
High threshold reconstruction i.e. any reconstruction threshold β β₯ t where t is the number of malicious parties, are costlier protocols . A more recent paper https://t.co/Be8Kw7BpqJ provides an efficient way to reconstruct this.
1
0
2
But in recent times you also have asynchronous DKGs, whose demands have increased due to dApps. Some examples of ADKG networks are https://t.co/yXaCKPF3JG
https://t.co/8VbP0n3Agi
https://t.co/zBBfqIGTgw
https://t.co/tVTNMDTi9q
1
0
2
Letβs dive in π DKG has nodes or servers that generate part of the keys & a single node never has access to the key. Most of the DKGs assume a synchronous setting. The first paper to look at them outside of this setting was
1
0
2
To make sure everything is secure in a distributed system, the key generation has to move away from a single dealer to a DKG, i.e. Distributed Key Generation model. DKG removes single entity trust and replaces it with a threshold number of servers or nodes.
1
0
2
What is DKG? & why is it so important in web3? Cryptographic keys are the foundation of web3. The security of web3 protocols depends on how these keys are generated & protected. Ignoring this can hamper the user experience and make them lose their digital assets.
1
4
15
Schemes like MPCs, Distributed Key Generation, Threshold Signature, and Threshold Encryption are common examples. The aim of Threshold Cryptography is similar to that of Decentralization, as it strives to eliminate the need for trust in centralized entities.
0
1
3
In the realm of decentralized applications, some protocols are more secure when performed by a group of actors rather than a single individual. This is where the subfield of Cryptography known as Threshold cryptography comes in play.
1
2
10