ZenGo X is a research group composed of researchers from academia and industry.
Our goal is to take threshold cryptography all the way from theory to your mobile device (or any consumer software/hardware). We combine deep knowledge in applied cryptography and distributed systems security to push forward the usage and limits of Multiparty Computation (MPC). Join us!

Lead Researchers, Former and Current

Omer Shlomovits

Omer Shlomovits

Cryptography

Claudio

Claudio Orlandi

Cryptography (Past member)

Itty

Ittay Eyal

Distributed Systems

headshot

Oded Leiba

Blockchain Research

Tal Be'ery

Tal Be'ery

Blockchain Research

Alex Manuskin

Alex Manuskin

Distributed Systems

1USiJFDJ_400x400

Seres István András

Privacy & Security

ari

Ariel Nof

Cryptography

researcher

Pratyush Ranjan Tiwari

Cryptography

Doron

Doron Zarchy

Cryptography

image (23)

Suyash Bagad

Cryptography

Denis Varlakov

Cryptography

image (16)

Varun Rajeev

Cryptography

Haoyu Lin

Haoyu Lin

Distributed Systems

2021-03-10 10.27.17

Nitin Mahendru

Cryptography

Matan

Matan Hamilis

Cryptography

Elichai

Elichai Turkel

Cryptography

Research Grants

Cryptography, security and research is at the heart of what we do. ZenGo X has received research grants from some of the leading projects in the crypto world. In addition, we received an R&D grant from the Israel Innovation Authority. We are committed to working hand-in-hand with all the builders of digital assets in order to provide the best native support and experience.

“ZenGo’s approach to cryptocurrency wallets is forward-looking and will greatly benefit the Tezos ecosystem.”
 Tezos

There is a real need for more secure storage options for cryptographic assets. We at Zilliqa are excited to support ZenGo in the building of their innovative wallet .”
– Zilliqa

Zilliqa

Tezos

Ethereum Foundation

Zcash

Israel Innovation Authority

Monero

Our Projects

security risks prevent entities with high liquidity from using the Lightning Network.
We propose an MPC-based  solution.

Paper  | Story

We have uncovered and exploited 3 families of vulnerabilities in multiple open-source TSS libraries

Paper  | Slides | Story (on Wired)

We are exploring methods for recovering funds from threshold-based wallets. 

Video  |   Slides

We are developing protocols to allow for atomic cross-chain swaps based on the gradual release of secrets.

Paper | Github

We are identifying security vulnerabilities in threshold wallets, as well as developing solutions to overcome those vulnerabilities.

Slides  |  Video

We are researching how to create an efficient protocol for using threshold signatures with shielded Zcash transactions.

GitHub  |  Paper  |  ZIP  |  Blog

This project focuses on researching how to use distributed networks for secure computation protocols.

GitHub  |  Paper 

We are working on a practical, privacy-enhancing tool for cryptocurrencies which is deployable on today’s cryptocurrency networks. 

Paper  |  Video

We are researching a UC model for software and threshold wallets.

Documentation per request

We are exploring how Scriptless Scripts can be used with ECDSA

Video  |   Slides

Want to Contribute?

We are looking for interns, visitors, and fellow researchers to help turn great ideas into reality.