Summary:
- Fireside chat: Professor Aggelos Kiayias, chief scientist at Input | Output, and Professor Elias Koutsoupias, from the University of Oxford, discussed the scientific journey of Midnight at the Midnight Summit 2025.
- Midnight evolution: Midnight’s evolution from the blackboard to the blockchain originated at Input | Output Research (IOR) and is documented in years of peer-reviewed research.
- Sidechains: the journey began with the original 2016 sidechains paper, which set the scene for how a decentralized ecosystem can grow.
- Concurrency: the fireside chat covered how the Kachina paper outlines the architectural breakthrough that solved concurrency problems in privacy-preserving transaction processing.
- Rational privacy: is essential for the next generation of blockchains, and IOR played a foundational role in ensuring that the goal of Midnight isn’t just to hide data, but to facilitate rational privacy.
- Midnight’s dual-component tokenomics model: predictability is facilitated by the innovative and unique token-resource economic model designed by IOR.
- Post-quantum horizon: IOR is already transitioning toward lattice-based cryptography for a post-quantum landscape.
Midnight Summit 2025, held in London, unveiled bold visions for how the Midnight network would redefine data protection and privacy across Web2 and Web3 ecosystems. This summit celebrated Midnight – the data protection blockchain platform – and brought together experts from Input | Output (IO), Shielded, and the Midnight Foundation, representing a significant milestone in Midnight’s development. However, for the researchers at Input | Output Research (IOR), this journey started eight years ago on a blackboard.
Evolution of Midnight
Midnight’s evolution from the blackboard to the blockchain began at IOR and is documented in years of peer-reviewed research. During the summit, Professor Aggelos Kiayias, chief scientist at IO, and Professor Elias Koutsoupias from the University of Oxford, held a fireside chat to discuss the scientific journey of Midnight. They traced its origins from the original 2016 sidechains paper, to solving concurrency problems in privacy enhanced smart contracts with Kachina, breakthrough research in zero-knowledge proofs (ZKPs), the Minotaur consensus protocol, and Midnight’s token-resource model along the way.
The discussion illustrated how years of scientific breakthroughs have culminated in Midnight’s unique privacy-first architecture, mapping the ‘long arc’ of IOR’s foundational approach to research.
The evolution of scalability
The scientific journey began in 2016 with a foundational challenge: how can a decentralized system grow and create a rich ecosystem without bloating the base chain? Professor Kiayias and the IOR team reflected on the early research and addressed this by looking beyond simple sidechains to a more integrated model of partner chains.
Midnight, as the first partner chain to Cardano, inherits security from the existing, highly decentralized, mature network. This means that developers can experiment with bold new features – like programmable privacy in the case of Midnight – without having to build a resilient infrastructure from scratch.
The concept of merged staking was also introduced in this research work, which utilizes a cross chain bridge, an umbilical cord of sorts, between a mature network like Cardano and an independent partner chain like Midnight. Merged staking solves this by allowing Cardano stake pool operators (SPOs) to run the Midnight software alongside their existing Cardano nodes.
Solving the concurrency clash with Kachina
A significant challenge in blockchain privacy is concurrency. In traditional payment systems, privacy is straightforward. However, when you introduce smart contracts, multiple users often try to interact with a private contract state simultaneously. Without careful design, their ZKPs clash, causing their transactions to stall.
Professor Kiayias highlighted the Kachina paper as the architectural breakthrough that solved this. By enabling privacy-enhanced smart contracts with suitable tradeoffs between concurrency and privacy, Midnight enables complex, concurrent business logic where data remains confidential while the network remains fluid and responsive.
Rational privacy and robust mechanism design
Professor Elias Koutsoupias shared his perspective on algorithmic game theory. He argued that the goal of Midnight isn’t just to hide data, but to facilitate rational privacy – the strategic, incentivized disclosure of information, which is essential for the next generation of blockchains.
IOR is building a system where privacy is a strategic tool, not just a choice:
- Information as strategy: much like in an auction, disclosing specific private information can be a strategic advantage if the system is designed to reward it.
- System robustness: professor Koutsoupias emphasized that a protocol must be robust, meaning that it must function as intended even when users employ unexpected strategies. Midnight is built to withstand the unpredictable nature of human behavior in a decentralized economy.
Midnight’s dual-component tokenomics model
One of the most innovative directions discussed was Midnight’s unique dual-token economic model. Unlike traditional single-resource systems, where transaction fees can be volatile and unpredictable, Midnight utilizes two distinct tokens to decouple network value from network usage:
- NIGHT – the unshielded utility token used for consensus, securing the network, and governance
- DUST – a non-tradable, shielded resource that is generated automatically by holding NIGHT
This separation supports predictability as DUST is solely used to pay for transaction execution. Most blockchains use a single-token design, where the single token must be used for both staking and paying fees. Midnight moves beyond the limitations of traditional blockchain economics with a strategic dual-token economic model that decouples network security from user utility.
By treating blockchain capacity as a tokenized resource, users can plan their future service needs without being at the mercy of fluctuating gas prices. The related theoretical concept was a major breakthrough for the IOR team, who presented this work in the blockchain space tokenization paper, at the Advances in Financial Technology (AFT ‘24) conference.
As Professor Kiayias noted, this model can also move the industry away from more restrictive one-dimensional gas markets. This shift is also reflected in the more recent multi-dimensional pricing paper, which highlights the benefits that multi-dimensional pricing may offer compared to single-dimensional pricing.
Looking ahead: the post-quantum horizon
The discussion concluded with a look ahead towards the next decade. As quantum computing looms, the threat of harvest now, decrypt later – where adversaries collect encrypted data today to decrypt it once quantum power arrives – becomes a pressing concern. To combat this, IOR is researching how to transition Midnight toward lattice-based cryptography.
Lattice-based cryptography isn't just about defense; it’s about expanding the horizons of what is possible, the holy grail of data interaction. Lattice-based encryption enables several key advancements:
- Quantum resilience: it safeguards confidential data that remains secure for decades, even against a quantum adversary.
- The power of FHE: lattice-based structures are the primary foundation for fully homomorphic encryption (FHE). This allows data from different sources to interact and be computed upon while remaining fully encrypted.
- Complex, confidential logic: for the first time, we can envision a privacy-first world, where business logic from multiple parties contributes sensitive inputs to a smart contract, and the contract computes the result while keeping every individual input confidential.
By building with these advanced primitives today, Midnight is being positioned to be future-proofed for the next generation of computing.
From the blackboard to the real world
As the session concluded, participants reflected on the journey. For professors Kiayias and Koutsoupias, seeing mechanism design and zero-knowledge protocols move from academic blackboards to a live network capable of solving real-world business problems is the realization of more than a decade of work.
For a moderator, it was inspiring to see how these abstract mathematical concepts – theories that many thought were decades away from use – are actually the engine rooms of the Midnight network. Midnight stands as a testament to IOR’s evidence-based methodology: that the most revolutionary technologies are those built on a foundation of mathematical ground truth and peer-reviewed rigor, including a formal methods approach.
Explore IOR’s research initiatives further and dive into the foundational papers mentioned in this talk – including Kachina, Minotaur, blockchain space tokenization (BST), and multi-dimensional pricing – on the IOR research page. Watch the full video of the fireside chat for more details.
Disclaimer: This post is for informational purposes and does not constitute financial, investment, or legal advice. Technical specifications and development plans regarding the Midnight network and its tokens are based on current research and are subject to change as the protocol evolves.





