IC3: Advancing the science and applications of blockchains

Latest on Blog

by Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, and Ari Juels on September 22, 2021
Have you been offered the chance to earn unlimited passive income in cryptocurrency for life with no risks using a new technology called a smart contract? Congradulations! You may have just encountered a smart contract pyramid scheme.
by Yunqi Li, Sylvain Bellemare, Mikerah Quintyne-Collins, and Andrew Miller on April 21, 2021
In this post, we show how to provide pivacy for smart contracts in a general purpose way by using "Multiparty Computation (MPC) as a Sidechain". In this model, smart contract developers can label any of their member fields as "secret".
by Ari Juels, Ittay Eyal, and Mahimna Kelkar on March 07, 2021
There's a simple word for projects that seek to advantage miners while systematically exploiting blockchain users, say three researchers.
by Jun-You Liu, Surya Bakshi, Shreyas Gandlur, Ankush Das, and Andrew Miller on February 15, 2021
Payment channels are one of the fundamental approaches for scaling cryptocurrency networks. In the academic cryptography literature on payment channels, it has been effective to use universal composability (UC) framework as a way of rigorously modeling and giving security definitions. However, there's been a big gap between the UC model and the actual software implementations of payment channels that have been designed and maintained by cryptocurrency developers, not getting as much benefit from the UC as we could. SaUCy is a project that aims to bridge the world of cryptocurrency developers with the UC framework.
by Deepak Maram and Harjasleen Malvai on January 12, 2021
Decentralized identity systems allow users to gather and amnage their own credentials under the banner of self-created decentralized identifiers (DIDs). The key focus of DIDs is on shifting the control of a credential into users' hands. Existing decentralized identity proposals, however, suffer from several problems. First and foremost, how do you bootstrap an ecosystem of credential issuers? It is unlikely that most existing legacy providers suddenly switch and issue such credentials. Second, like with cryptocurrencies, DID systems burden users with managing their own keys creating a significant risk of key loss. They also omit essential functionality, like resistance to Sybil attacks and the ability to detect misbehaving or sanctioned users. We address these problems by introducing CanDID in our new paper.
by Patrick McCorry on December 08, 2020
We have focused on building a non-custodial relayer, Infura Transaction Service (ITX), that takes a pre-signed message (e.g. meta-transaction), packs it into an Ethereum transaction and then gradually bumps the fee until it is mined in the blockchain.
Older blogs...


January 24-26, 2022
This conference focuses on technical innovations in the blockchain ecosystem, and brings together researchers and practioners working in the space. We are interested in the application of cryptography, decentralized protocols, formal methods, and empirical analysis, to improving the security and scalability of blockchain deployments. We aim to foster collaboration among practitioners and researchers working on blockchain protocol development, cryptography, distributed systems, secure computing, crypto-economics, and economic risk analysis.
October 6-7, 2021
The goal of this event is to introduce Protocol Labs Research's newly formed ConsensusLab to its future partners and to establish a workshop-style venue to bottstrap scientific exchange across a wider community of shared interests. We invite contributions from current and prospective collaborators, as well as from all researchers in the field.
July 25-31, 2021
Thank you to all of those that attended the 6th annual Blockchain Camp!
Tuesday June 1, 2021
Join us for Tyler Kell's presentation of "DeFi State of the Union", this webinar will be on June 1, 2021.
Thursday April 29, 2021
Join us to hear from Ariah Klages-Mundt presenting his work on Stablecoins.
More events


Featured Projects

MAD-HTCL - Because HTCL is Crazy-Cheap to Attack

MAD-HTCL employs a novel approach of utilizing the existing blockchain operators, called miners, as part of the design. If a user misbehaves, MAD-HTCL incentivizes the miners to confiscate all their funds. For further details, please check out the Projects Page.

Hased Time-Locked Contract
Bribery Attacks
Payment Channels

More projects:

  • HoneyBadgerMPC: A Flexible Paradigm for Computing on Confidential Data
  • Avalanche: A New Consensus Protocol
  • Ironwood: A Verification Framework for Byzantine-fault Tolerant Consensus Protocols
  • BDoS: Blockchin Denial of Service
  • AIRS: Automated Incentives for Reforestation Stewardship
Even more projects...