18 April 2024
α:Advanced Technology
AI
Cryptography
β:Web3 Segment
Hardware layer
Protocol layer
The Year of Crypto's Modular Expansion (read more here)
Modular Blockchains are already shaping up to be the biggest zero-to-one innovation in crypto since Ethereum. We recently put out a modular ecosystem map showcasing 100+ teams leading the modular expansion. In today’s piece, you’ll learn what a modular blockchain is, the ins and outs of the modular stack, and my vision for the modular endgame.
Data-Driven Performance Tuning for Blockchains (read more here)
In recent years, we’ve witnessed a surge of new blockchains coming up, each with its unique set of features. More often than not, these chains are built atop something bigger, something more… open source – be it the Substrate based chains, the OP Stack, or the ZK Stack. This open-source foundation helps the general populace in utilizing the same technology these chains are built upon, to customize the functionality as one seems fit, and in turn benefit from the underlying security guarantees that come with Battle-Tested Open Source Code™.
Beyond Spot Transactions: Modeling Dynamic Preconfirmation Auctions (read more here)
We investigate a model for an auction for preconfirmations of Ethereum transactions, its relations to existing models modern and classical, and its implications for bidder and provider, in particular block builder, behaviour.
Middleware layer
Application layer
“I Can’t Believe It’s Not Custodial!” Usable Trustless Decentralized Key Management (read more here)
Key management is a persistent challenge in usable security. Password-based key derivation functions (PBKDFs), common in centralized applications, struggle with low entropy and lack recovery mechanisms, making them unsuitable for decentralized environments. The multi-factor key derivation function (MFKDF) enhances this by integrating common authentication factors. A study implementing an MFKDF-based Ethereum wallet showed it surpassed traditional methods in usability, evidenced by significantly higher System Usability Scale (SUS) scores and faster task completion times.
Second (Third, Fourth, …) User Airdrop - Making Starknet Happen (read more here)
When I started building on Starknet in May, about a year ago, I took a bet on the impressive technology and I believed the airdrop would be the catalyst for more users to try Starknet. However after seeing the design of the user airdrop, I think the chances for Starknet to reach product market fit have diminished: many real users were neglected by this airdrop, and the successful sybils were heavily rewarded. I also shared this opinion 55 before it went live.
Introduction to FHE (read more here)
In this article, we briefly explain what FHE is and how it works, consider its use cases in and outside of blockchain, and cover open issues and constraints. Finally, we also mention some blockchain FHE projects and provide a list for further reading.
User Gateway
γ:Web3 Macro
Challenges & Solutions of Onchain FHE: Unlocking the Holy Grail (read more here)
FHE promises to be the “Holy Grail of Cryptography,” however there are many performance, developer experience and security concerns that limit its current adoption. As FHE and its surrounding ecosystem matures, we expect to see “verifiable FHE” become the standard. FHE applications may opt to outsource computation and verification to FHE coprocessors.
Follow us Bixin Ventures for more insights into the world of #web3 #blockchain #cryptocurrency #AI and more
✔️ Twitter: https://twitter.com/BixinVentures
✔️ 推特: https://twitter.com/BixinVC
✔️ Medium: https://bixinventures.medium.com/
✔️ Website: https://bixinvc.com/
✔️ YouTube: https://www.youtube.com/c/BixinVenturesDaily