Dynamic Quorum Consensus Decouples BFT Security and Liveness Overhead
Adaptive Threshold Consensus dynamically adjusts finality quorums, radically minimizing communication complexity for highly decentralized BFT networks.
Cardano Network Suffers Chain Split Exploiting Legacy Delegation Transaction Flaw
A legacy validation flaw allowed a malformed delegation transaction to partition the Cardano network, compromising chain integrity and operational stability.
Consensus-Integrated Proof of Useful Work Decentralizes Zero-Knowledge Proof Generation
A new consensus mechanism embeds general-purpose zk-SNARK computation as Proof of Useful Work, transforming block production into a decentralized verifiable computation marketplace.
Cardano Network Splits Exploiting Legacy Software Flaw Causing Operational Halt
A known, unpatched software vulnerability allowed a malformed transaction to fork the Cardano network, immediately compromising ledger integrity and forcing exchange suspension.
Zero-Knowledge Proof of Training Secures Private Consensus
This new ZKPoT consensus mechanism cryptographically validates model contributions without revealing private data, solving the privacy-efficiency trilemma for decentralized AI.
Unifying Sequencing and Data Availability with Decentralized Set Byzantine Consensus
A new Decentralized Arranger model unifies rollup sequencing and data availability using Set Byzantine Consensus, resolving centralization risk.
Automated Liveness Verification Reduces Proof Burden for Distributed Protocols
LVR soundly reduces complex liveness proofs to simpler safety property checks using automated ranking function synthesis, accelerating foundational protocol verification.
Zero-Knowledge Proof of Training Secures Private Collaborative AI Consensus
ZKPoT uses zk-SNARKs to cryptographically verify AI model performance without revealing private data, solving the privacy-utility dilemma in decentralized machine learning.
Cardano Network Partitioned by Legacy Transaction Validation Flaw
A consensus-level bug, rooted in a legacy validation bypass, created competing chain histories, directly compromising network integrity.
