DISCRYPT brings extensive expertise in distributed cryptography and privacy technologies. DISCRYPT addresses critical challenges in blockchain systems, collaborative learning and data privacy, with a strong focus on real-world impact. DISCRYPT combiness theoretical research with practical implementations to develop scalable, trustworthy, and innovative security solutions. DISCRYPT contributes to Europe's strategic priorities in digital sovereignty and cybersecurity.

About Us

DISCRYPT (DIStributed CRYptography and Privacy Technologies) is a research group from Universitat Autònoma de Barcelona dedicated to the study of decentralized systems, privacy-enhancing technologies, and applied cryptography. Its work focuses on developing secure and privacy-preserving solutions in areas such as blockchain, peer-to-peer networks, anonymous communication, and federated learning. We combine theoretical foundations with practical implementations to advance security and privacy in distributed technologies.


Our expertise

Quotes

This (CBDB) has to be applied at a global level because, if there is an escape, that escape will be used

Christine Lagarde
ECB President

Bitcoin is like anything else in the world: it's worth what people are willing to pay for it.

Stanley Druckenmiller
Researcher

Like the Internet, Bitcoin will change the way people interact and do business around the world.

Erik Voorhees
Researcher

Bitcoin is very ideologically fulfilling, it's my form of political activism, but it's also a huge business opportunity.

Erik Voorhees
Researcher

Latest News

(17-21 Mar 2026) Discrypt at RECSI 2026

A delegation from Discrypt participated in Reunión Española sobre Criptología y Seguridad de la Información 2026 (RECSI 2026), held in Tenerife. RECSI is the leading scientific conference in Spain in the fields of cryptology and information security. This biennial meeting has played a central role in fostering the development of research and collaboration within the Spanish cryptographic community.

This year, Discrypt was strongly represented, with several members attending and presenting their latest research results across a wide range of topics, from privacy in machine learning to blockchain security.

Privacy Risks in Federated Learning

The conference opened with a presentation by Gorka Pineda (together with Antonina Serebriakova from UOC), who explored the impact of aggregation algorithms on property inference attacks in federated learning. Federated learning allows multiple participants to collaboratively train a shared model without directly exchanging their raw data, thereby reducing data exposure and improving privacy. However, privacy is not fully guaranteed: adversaries may still exploit the shared model updates to infer sensitive properties about participants’ local datasets.

This work focuses on how the choice of aggregation algorithm, one of the core components of federated learning, affects both the performance of the global model and its vulnerability to inference attacks. In particular, the study shows that aggregation strategies play a decisive role in shaping privacy risks. Notably, incorporating a proximal term, as done in the FedProx algorithm, can improve resistance to such attacks without sacrificing classification accuracy. That said, Gorka warned that the conclusions are drawn from experiments on a single dataset and exhibit some variability, highlighting the need for further validation.

Incentivizing the Discovery of Quantum Capabilities

In another talk, Roger Sala presented a novel approach to detecting the existence of a Cryptographically Relevant Quantum Computer (CRQC). Quantum computing poses a major threat to widely used cryptographic schemes such as RSA and elliptic-curve cryptography, which would become vulnerable in the presence of sufficiently powerful quantum adversaries. Despite significant progress in the field, it remains unclear when such capabilities will be achieved.

To address this uncertainty, Roger's work proposes leveraging economic incentives through Bitcoin. The idea is to deploy cryptographic honeypots (or canaries) on the Bitcoin network: specially crafted challenges whose solutions would only be feasible with quantum capabilities capable of breaking the Elliptic Curve Discrete Logarithm Problem. Successfully solving such challenges would publicly signal the existence of a CRQC, providing a transparent and economically motivated monitoring mechanism.

Towards Useful Proof-of-Work Mechanisms

Ghazaleh Keshavarzkalhori and Biel Castellarnau introduced a new perspective on proof-of-work (PoW) systems, a fundamental building block of blockchain technologies. Traditional PoW schemes rely on hash-based puzzles that, while effective for achieving distributed consensus, produce no intrinsic value beyond maintaining the network. This work revisits the essential properties required of PoW mechanisms and proposes an alternative approach based on the Elliptic Curve Discrete Logarithm Problem (ECDLP), a well-established hard problem in cryptography.

Ghazaleh and Biel analyze the computational complexity of their proposal and compare it with conventional hash-based approaches. Their results demonstrate that it is feasible to design secure PoW schemes grounded in meaningful mathematical problems, opening the door to "more useful" work in blockchain systems while preserving security and consensus guarantees.

Fingerprinting Hardware Wallets

In his presentation, Domènec Madrid examined whether hardware wallets can be fingerprinted through their signature generation processes.

Hardware wallets are widely used to securely store cryptographic keys and sign transactions. This work dissects the internal steps involved in generating digital signatures and identifies which components are handled by the hardware device itself. The talk further explores whether subtle variations in the resulting signatures could act as identifiable signals, potentially enabling user fingerprinting. This line of research raises important questions about privacy and anonymity in cryptocurrency usage.

Modeling the Lightning Network

Finally, Yasser Hayali presented a comparative study of random graph models for the Lightning Network. The Lightning Network is a second-layer protocol built on top of Bitcoin that enables fast and scalable payments. Its behavior critically depends on the structure of its underlying payment-channel graph, making accurate modeling essential for evaluating routing strategies, protocol upgrades, and potential attacks.

Yasser's work compares several well-known random graph models (including Erdős-Rényi, Barabási-Albert, Watts-Strogatz, and a dynamic disassortative variant) against real-world data from the Lightning Network. The analysis considers metrics such as path lengths, clustering, assortativity, and network centrality. The results show that no single model fully captures the observed properties of the network. As a result, Yasser advocates for a hybrid model that combines multiple mechanisms, such as preferential attachment, disassortativity, and triadic closure, to better approximate the real topology.

Overall, RECSI 2026 provided an excellent platform for sharing ideas and networking with other researchers in cryptology and information security.

Discrypt group members presented their research at the 7th International Conference on Blockchain Computing and Applications (BCCA 2025), held in Dubrovnik, Croatia, from October 14-17, 2025. The presentations focused on enhancing Bitcoin Core performance through machine learning-based UTXO set management and analyzing security risks in Ethereum's non-custodial staking mechanisms.

We presented our research paper, “A Risk Analysis of Non-custodial Staking in Ethereum" at the 2025 Blockchain and Cryptocurrency Conference (BCCA). The paper examines the security and economic risks faced by Ethereum validators in non-custodial staking settings and quantifies the potential impact of validator key compromises. It also introduces two lightweight Python tools that enable users to generate and validate voluntary exit messages without running a full Ethereum node, improving transparency and safety for everyday stakers.

Our team successfully organized the 9th International Workshop on Cryptocurrencies and Blockchain Technology (CBT) in Toulouse, France. The workshop served as a forum for researchers and practitioners to exchange insights on recent advances in blockchain systems and privacy-enhancing technologies.
 
This year’s edition featured an invited keynote by Bart Preneel (held jointly with the DPM workshop), a renowned expert in cryptography and privacy. His talk surveyed the current landscape of privacy technologies, examined the policy debates surrounding their deployment, and explored the potential of blockchain to strengthen privacy-enhancing technologies. He also addressed the persistent tension between privacy protection and governmental demands for exceptional access, drawing on both historical precedents and recent controversies.
 
The event was highly interactive, fostering lively discussions among speakers and participants on a broad range of topics. These included alternative approaches to building privacy-preserving second-layer solutions, cryptographic designs for lotteries and electronic voting, the practical limits of selfish-mining attacks, the state of the art in self-sovereign identity (SSI) wallet deployment, and novel techniques for Ethereum Virtual Machine (EVM) decompilation.

Our team organized the 20th International Workshop on Data Privacy Management (DPM) in Toulouse, France. The event provided an essential forum for leading experts to exchange ideas and present the latest research and strategies addressing data privacy challenges.
 
This year’s edition featured an invited keynote by Bart Preneel (held jointly with the CBT workshop), a renowned expert in cryptography and privacy. His talk surveyed the current landscape of privacy technologies, examined the policy debates surrounding their deployment, and explored the potential of blockchain to strengthen privacy-enhancing technologies. He also addressed the persistent tension between privacy protection and governmental demands for exceptional access, drawing on both historical precedents and recent controversies.

Discrypt group members gave various talks at the Cibersec+ workshop held at the University of Lleida. The topics presented included wallet fingerprinting, Bitcoin auctions, hardware wallet attacks, Lightning Network testbeds, and secure solutions for fair federated learning.