LABS
Our Portfolio

Defining the standard for
the Future of Web3

Every project represents our commitment to innovation, security, and the relentless pursuit of blockchain excellence that drives the industry forward.

Chainscore © 2025
Tessera Background
Featured Work

Tessera: Polkadot
Full Node Client

Tessera is a Full Node Client implementation for Polkadot 3.0, developed in collaboration with the Web3 Foundation.

Engineered using Rust and Python, delivering 1.4M+ TPS with over 1000+ validator nodes globally.

Custom RISC-V VM

First blockchain client built on RISC-V

01

1024 Nodes

Supports huge global validator set

02

ZK-Consensus

Instant finality with zero-knowledge proofs

03

1,400,000+ TPS

Throughput scaled for Web3 mass adoption

04
Developed in collaboration with
Polkadot
Web3 Foundation
Web3 Foundation
PORTFOLIO
Selected Work

Building the next generation of dApps.

From DeFi protocols to GameFi platforms, delivering cutting-edge solutions across every Web3 vertical.

SOURCE
Open Source

Contributing to the developer community

Giving back to the ecosystem through high-performance utilities and cryptographic libraries.

Live

Bandersnatch

Python

Bandersnatch Elliptic Curve implementation in Python with optimized GLV multiplication.

Elliptic CurvePerformancePython
Live

@tsrkit-types

Python

Formal strict type definitions for Python with compile-time checking and runtime validation for enhanced code safety and performance.

TypesStatic AnalysisPython
Dev

@tsrkit-pvm

Python

Polkadot Virtual Machine (PVM) implemented in Python & Cython with JIT compilation for high-performance smart contract execution.

Error CorrectionData RecoveryFFT
Live

RockStore

Python

High-performance FFI-based Python bindings for RocksDB with optimized memory management and native performance.

DatabaseFFIPerformance
Live

@dotring/ring-vrf

Python

Comprehensive Python implementation of Verifiable Random Functions (VRFs) including IETF, Pedersen and Ring VRF as per RFC9380 and RFC 9381.

CryptographyVRFSecurity
Live

@dotring/curves

Python

20+ Elliptic Curves implemented in Python such as Ed25519, Secp256k1, BLS12-381 [w Bandersnatch], P-256 with algorithms for key generation, signing, and verification.

CryptographyPrivacyZero-Knowledge
RESEARCH
Research & Publications

Pushing the limits of blockchain technology

Our team publishes cutting-edge research to advance the field of decentralized systems.

IEEE Access
2025

Implementation and Analysis of Verifiable Random Functions with Additional Data

K.S.N.M. Rao, Prasad Kumkar

Abstract—Research suggests that verifiable random functions (VRFs) are essential cryptographic primitives for blockchain consensus mechanisms. This study provides a comprehensive implementation and analysis of VRFs with additional data on various elliptic curves, including Bandersnatch, Ed25519, secp256k1, and BLS12-381. Results showed significant improvements in verification efficiency when utilizing curve-specific optimizations. Ring VRF constructions using KZG commitments were compared with traditional approaches, achieving sub-millisecond verification for rings up to 1024 members.

VRFZK ProofsRing Signatures
In Progress
2025

Comparative Study of Modular Data Availability Protocols for Blockchain Systems

Prasad Kumkar, Pranjal Sarode

Abstract—This work explores various modular data availability protocols, analyzing their performance, security, and scalability in blockchain environments. We present a systematic comparison of leading data availability solutions including Celestia, EigenDA, Avail, and proprietary implementations. Our methodology encompasses theoretical analysis of erasure coding schemes, empirical measurement of sampling efficiency, and formal verification of security guarantees.

Data AvailabilityBlockchainErasure Coding
In Progress
2025

Scaling Ring Size for Privacy-Preserving Ring Signatures Using Verkle Trees

Prasad Kumkar

Abstract—In this paper, we explore scaling solutions for ring signatures to enable privacy-preserving authentication at scale. Our approach leverages Verkle tree structures combined with inner product arguments to achieve logarithmic proof sizes while maintaining unconditional anonymity guarantees. We present a novel construction that allows ring sizes exceeding 10^6 members with constant-time verification.

Ring SignaturesVerkle TreesPrivacy
In Progress
2025

Solver Network Design for Intent-Centric DEX Protocols

Prasad Kumkar

Abstract—This paper presents a comprehensive framework for designing solver networks in intent-based decentralized exchange protocols. We analyze the game-theoretic dynamics between solvers competing to fill user intents, proposing novel auction mechanisms that maximize execution quality while preventing collusion. Our model incorporates cross-domain MEV considerations, batch auction timing, and solver reputation systems. Empirical analysis on mainnet transaction data demonstrates that our proposed Dutch-auction settlement mechanism achieves 15% better price improvement compared to existing CoW-style batch auctions, with formal proofs of incentive compatibility under rational solver assumptions.

Intent-Based TradingMEVAuction TheoryDEX
In Progress
2025

Threshold Encryption Schemes for MEV-Resistant Transaction Ordering

Prasad Kumkar

Abstract—We propose a novel threshold encryption framework for mitigating Maximal Extractable Value (MEV) in blockchain transaction ordering. Our construction employs distributed key generation among validators combined with timelock puzzles to ensure transaction content remains encrypted until ordering is finalized. We analyze the economic incentives for validators under various collusion scenarios and prove that our scheme achieves MEV-resistance under honest majority assumptions. Implementation on an EVM-compatible testnet demonstrates sub-100ms additional latency with 32 validator threshold signatures, making the approach practical for production deployment.

MEVThreshold CryptographyTransaction OrderingPBS
In Progress
2025

Optimal Concentrated Liquidity Provision: A Game-Theoretic Analysis of Impermanent Loss

Prasad Kumkar

Abstract—This paper develops a comprehensive game-theoretic model for optimal liquidity provision in concentrated liquidity AMMs such as Uniswap v3. We derive closed-form solutions for optimal tick range selection under various volatility regimes and fee tier structures. Our analysis reveals that rational LPs form a Nash equilibrium at predictable concentration levels, and we quantify the welfare implications of this strategic behavior. Backtesting on 18 months of mainnet data across 50 major trading pairs shows our dynamic rebalancing strategy outperforms static provision by 23% in risk-adjusted returns while reducing impermanent loss exposure by 40%.

AMMConcentrated LiquidityGame TheoryImpermanent Loss

Ready to Start Building?

Let's bring your Web3 vision to life.

From concept to deployment, ChainScore helps you architect, build, and scale secure blockchain solutions.