| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
| Talks on Protocol Labs Research
Henrique presents Janus and Granite, a consensus framework and algorithm to bring fast finality to the Filecoin network.| Protocol Labs Research
Most algorithms solving Byzantine agreement that are implemented and used in practice today rely on some form of synchrony assumptions. Especially when used in blockchain systems, where scalability is of great importance, purely asynchronous solutions suffer from high message complexity or strong assumptions that weaken the adversary. In particular, an adaptive adversary (roughly translating to DoS attacks in practice) is difficult to overcome without any synchrony assumptions while also keep...| Protocol Labs Research
The way in which the development and commercialisation of the metaverse unfold may result in an open architecture for collaborative innovation and participation, or in a series of silos tightly controlled by a small number of commercial entities. But does the outcome even matter? And, if so, how can we shape it? We will briefly go over the implications for users, developers, and regulators, and the role that emerging standards might play.| Protocol Labs Research
We present a practical construction and implementation of timelock encryption, in which a ciphertext is guaranteed to be decryptable only after some specified time has passed. We employ an existing threshold network, the League of Entropy, implementing threshold BLS in the context of Boneh and Franklin's identity-based encryption (IBE) At present this threshold network broadcasts BLS signatures over each round number, equivalent to the current time interval, and as such can be considered a de...| Protocol Labs Research
Juan Benet, CEO of Protocol Labs, outlines the scaling requirements of web3 and the many applications of IPC.| Protocol Labs Research
Vivien Quéma, Research Adviser to ConsensusLab, and Yann Vonlanthen, Summer Fellow at ConsensusLab, explore directions for multi-threaded execution in FVM.| Protocol Labs Research
Matej Pavlovic, Research Scientist at ConsensusLab, introduces the Mir framework and the work being done at ConsensusLab implementing performant BFT consensus.| Protocol Labs Research
Is decentralising OnlyFans the killer application for web3? Sarah Azouvi, Research Scientist at ConsensusLab, explains why it is.| Protocol Labs Research
Alfonso de la Rocha, Research Engineer at ConsensusLab, describes the technical details of interplanetary consensus.| Protocol Labs Research
Guy Goren, Research Scientist at ConsensusLab, presents a simplified subnet model for blockchain scaling.| Protocol Labs Research
Marko Vukolic, ConsensusLab lead at Protocol Labs, reviews the work done by ConsensusLab since its creation and its future directions.| Protocol Labs Research
Sarah Azouvi, Research Scientist at ConsensusLab, discusses the directions being explored for the future of Filecoin mainnet consensus.| Protocol Labs Research
The notion of timelock encryption was first introduced on the Cypherpunks mailing list in 1993 by the founder of the crypto-anarchist movement, Tim May, and to date, while there have been numerous attempts to tackle it, none have been deployed at scale, nor made available to be used in any practical way. We have recently changed this status-quo by releasing a free, open-source tool that can finally achieve the lofty goal of encrypting things that cannot be decrypted until a given time has com...| Protocol Labs Research
Do you worry about responsible disclosure because they could instead exploit the time-to-patch to find you and remove you from the equation? Dead man switches exist for a reason... In this talk we present a new form of vulnerability disclosure relying on timelock encryption of content: where you encrypt a message that cannot be decrypted until a given (future) time. This notion of timelock encryption first surfaced on the Cypherpunks mailing list in 1993 by the crypto-anarchist founder, Tim ...| Protocol Labs Research