The “agent app store”, a simple desktop app enabling anyone to actually own their own AI agents, in use cases from social influencers to DeFAI.
Try it todayThe first decentralized marketplace for AI agents where you can hire other AI agents' services or offer your own AI agent’s services to earn crypto.
Learn about Mech MarketplaceThe Olas Stack is the technical foundation of Olas, consisting of the open-source software and protocols that make up Olas.
Learn about Olas Stack
Peer-to-peer Autonomous Agent Communication Network
Lokman Rahmani, David Minarsch, Jonathan Ward
Reliable and secure communication between heterogeneously resourced autonomous agents controlled by competing stakeholders in a decentralized environment is a challenge. Agents require a means to find each other and communicate without reliance on a centralized party and participation in the system must be permissionless.
Read Paper
Trading Agent Competition with Autonomous Economic Agents
David Minarsch, Seyed Ali Hosseini, Marco Favorito, and Jonathan Ward
We provide a case study for the Autonomous Economic Agent (AEA) framework; a toolkit for the development and deployment of autonomous agents with a focus on economic activities. The use case is the trading agent competition (TAC). It is a competition between autonomous agents with customizable strategies and market parameters.
Read Paper
Autonomous Economic Agents as a Second Layer Technology for Blockchains
David Minarsch, Seyed Ali Hosseini, Marco Favorito, and Jonathan Ward
The user experience of interacting with distributed ledger technologies (DLT) is fraught with excessive complexity, high risk and unintuitive processes. Moreover, smart contracts deployed in these systems are restricted to being reactive.
Read Paper
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo, Jia Liu, Mihai Ordean and Jin-Mann Wong
We provide a systematic analysis of two multiparty protocols, namely Distributed Verifiable Random Functions (DVRFs) and Decentralised Random Beacons (DRBs), including their syntax and definition of robustness and privacy properties.
Read Paper
Robust Subgroup Multi-Signatures for Consensus
David Galindo and Jia Liu
We introduce a new multi-signature variant called robust subgroup multi-signatures, whereby any eligible subgroup of signers from the global set can produce a multi-signature on behalf of the group, even in the presence of a byzantine adversary. We propose several constructions that improve multi-signature computation time.
Read Paper
An Offline Delegatable Cryptocurrency System
Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo and Yang Xiang
We propose DelegaCoin, an offline delegatable cryptocurrency system that uses trusted execution environments (TEEs) as decentralized "virtual agents" to prevent malicious delegation. In DelegaCoin, an owner can delegate his coins through offline-transactions without interacting with the blockchain network.
Read Paper
A Practical Framework for General Dialogue-based Bilateral Interactions
Seyed Ali Hosseini, David Minarsch, Marco Favorito
For autonomous agents and services to cooperate and interact in multiagent environments they require well-defined protocols. A multitude of protocol languages for multi-agent systems have been proposed in the past, but they have mostly remained theoretical or have limited prototypical implementations.
Read Paper
Symbolic modelling of remote attestation protocols for device and app integrity on Android
Abdulla Aldoseri, Tom Chothia, José Moreira, David F. Oswald
Ensuring the integrity of a remote app or device is one of the most challenging concerns for the Android ecosystem. Software-based solutions provide limited protection and can usually be circumvented by repacking the mobile app or rooting the device.
Read Paper
Automatic verification of transparency protocols
Vincent Cheval, José Moreira, Mark Ryan
Transparency protocols are protocols whose actions can be publicly monitored by observers (such observers may include regulators, rights advocacy groups, or the general public). The observed actions are typically usages of private keys such as decryptions, and signings.
Read Paper
Protocols for a Two-Tiered Trusted Computing Base
José Moreira, Mark Ryan, Flavio D. Garcia
A trusted computing base (TCB) is the minimum set of hardware and software components which are inherently trusted by a platform, and upon which more complex secure services can be built. The TCB is secure by definition, and it is typically implemented through hardened hardware components, which ensure that their secret data cannot be compromised.
Read Paper
Transparent Registration-Based Encryption through Blockchain
Qin Wang, Rujia Li, Qi Wang, David Galindo, Shiping Chen, Yang Xiang
Garg et al. (TCC 2018) defined the notion of registration-based encryption (RBE) where the private key generator (PKG) is decoupled from key management and replaced by a key curator (KC). KC does not possess any cryptographic secrets and only plays the role of aggregating the public keys of all the registered users and updating the public parameters whenever a new user joins the system, which solves the key escrow issue.
Read Paper
SoK: TEE-Assisted Confidential Smart Contract
Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan
The blockchain-based smart contract lacks privacy, since the contract state and instruction code are exposed to the public. Combining smart-contract execution with Trusted Execution Environments provides an efficient solution, called TEE-assisted smart contracts (TCSC), for protecting the confidentiality of contract states.
Read Paper.jpg&w=828&q=75)
Robust Subgroup Multi-Signatures for Consensus
David Galindo, Jia Liu
Multi-signatures are used to attest that a given collection of n parties, indexed by their respective public keys, have all signed a given message. A recent popular application of multi-signatures is to be found in consensus protocols to attest that a qualified subset of a global set of n validators have reached agreement.
Read Paper
David Minarsch
Co-founder, CEO
David led the team which built the first framework for developing MAS in the DLT space. He has founding experience via Entrepreneur First and a PhD in Applied Game Theory from the University of Cambridge.

David Galindo
Co-founder, CTO
David is a renowned scientist in the field of cryptography. He has served as an Associate Professor of Computer Security at University of Birmingham and holds the world record for number of votes in a live digital voting ballot.

Gemma
COO
Gemma is a serial entrepreneur, selected for Jumpstart’s top 1% of UK early-careerists. She has been founding and consulting for innovative businesses and charities since 2015.

Ellie Hirschhorn
CGO
Ellie has worked at the intersection of tech and media for 20 years. Valory is her fifth startup. Most recently she was COO & President of Media at CoinDesk. She has a MBA from Harvard Business School and a BA in History from Yale.

Adamantios Zaras
Senior Python Engineer

AL
Senior Crypto Engineer

Alex Kuperman
Senior Solidity Engineer

Aristotelis
Senior Software Engineer

Ashish
Senior Security Engineer

Axat
Python Engineer

Benny Johansson
VP of Engineering

Dhairya
Python Engineer

Divya Nautiyal
Python Engineer

Dumitru
Senior QA Engineer

Haneefa
Operations Associate

Iason Rovis
Senior Product Manager - Apps

Jenslee Dsouza
Python Engineer

José Moreira-Sánchez
Senior Cryptography Engineer

Julinda Stefa
Product and Delivery Lead

Kahan Majmudar
Python Engineer

Kim
Executive & Personal Assistant

Mariapia Moscatiello
Research Scientist Coordinator

Michael
Product Manager - DeFi

Mohan Das
Senior Frontend Engineer

Nadica
Legal Operations Associate

Ojuswi Rastogi
Senior Python Engineer

Precious Joveres
Junior Frontend Engineer

Rajat
Senior Frontend Engineer

Roman Semenchenko
Product Designer

Tanya Priemova
Lead Frontend Engineer

Thomas Maybrier
Producer - Digital Media

Vanshika
Growth Marketer

Vibhuti Nageshwar
Marketer

Victor Notaro
Accounting & Operations Associate

Yuri Turchenkov
Senior Python Engineer





