Uncertified DAG Consensus Achieves Sub-Second Asynchronous Byzantine Finality
This new asynchronous BFT protocol uses an uncertified DAG and a novel commit rule to shatter the latency barrier, enabling sub-second finality at high throughput.
Practical Asynchronous BFT Protocol Achieves Optimal Performance and Simplicity
A new asynchronous BFT protocol merges rotating leader efficiency with leaderless agreement, ensuring optimal resilience and high performance without relying on network timing assumptions.
Peer-Ranked Consensus Secures Decentralized AI Swarm Inference.
Research introduces a peer-ranked consensus protocol using on-chain reputation and proof-of-capability to create a meritocratic, Sybil-resistant foundation for verifiable decentralized AI services.
Dynamic Byzantine Detection Exceeds Classical One-Third Fault Tolerance
A new two-fold Byzantine consensus algorithm dynamically detects and isolates malicious nodes, fundamentally improving system resilience beyond the one-third fault constraint.
Validated Strong BFT Consensus Unlocks Scalable Asynchronous State Machine Replication
A novel Validated Strong BFT model permits leader-based coordination in asynchronous networks, dramatically reducing message complexity for scalable SMR.
Asynchronous BFT Achieves Throughput-Oblivious Latency and Censorship Resistance
This new aBFT protocol resolves the fundamental throughput-latency tension by concurrently executing transaction dissemination and agreement, ensuring robust censorship resistance.
Uncertified DAG Consensus Protocol Achieves Theoretical Minimum Latency
Introducing Mysticeti-C, a BFT protocol using uncertified DAGs and a novel commit rule to achieve the theoretical 3-round message latency limit, enabling sub-second finality.
DAG Consensus Achieves Blind Order-Fairness Mitigating MEV
Integrating a commit-and-reveal framework with DAG-based Byzantine Fault Tolerance establishes Blind Order-Fairness, securing transaction sequencing from malicious extraction.
Algebraic Verifiable Delay Functions Cryptanalysis Undermines Decentralized Randomness Security
Cryptanalysis exposes a critical flaw in algebraic Verifiable Delay Functions, proving their fixed time delay can be bypassed with parallel computation, requiring new primitives for secure public randomness.
