Cryptographic Oracle Decouples Data Availability from Execution for Scalable Rollups
The Data Availability Oracle (DAO) uses polynomial commitments and game theory to cryptographically enforce off-chain data publication, unlocking trustless, massive L2 scalability.
Ordered Consensus with Secret Random Oracle Mitigates Blockchain Ordering Attacks
Secret Random Oracles leverage Threshold VRFs to augment State Machine Replication, cryptographically enforcing fair transaction ordering.
Secure BFT Consensus for Dynamically Available Networks Using PVSS
A novel BFT protocol integrates PVSS with pre-commits to secure fast consensus in dynamic networks, achieving $4Delta$ latency and 50% resilience.
Erasure Code Commitments Enforce Data Availability Consistency
This new cryptographic primitive enforces that committed data is a valid code word, fundamentally securing data availability sampling protocols against malicious data encoding.
Mechanism Design Revelation Ensures Truthful Proof-of-Stake Consensus
Applying economic revelation mechanisms to Proof-of-Stake protocols forces validators' self-interest to align with network truthfulness, fundamentally securing consensus.
Distributed Verifiable Random Function Secures Decentralized Randomness Beacons
Implementing a Distributed VRF with zk-SNARKs and NI-DKG creates a publicly verifiable, unbiased, and unmanipulable source of network randomness.
DAG Consensus Achieves Blind Order-Fairness Mitigating MEV
Integrating a commit-and-reveal framework with DAG-based Byzantine Fault Tolerance establishes Blind Order-Fairness, securing transaction sequencing from malicious extraction.
Accountable Liveness Formalizes Proof-of-Stake Slashing for Network Stalling
A new theoretical model proves the conditions for formally punishing validators who stall transaction finality, strengthening PoS security foundations.
Formal Rewrites Safely Scale Byzantine Fault Tolerance Protocols Fivefold
A new formal model and rewrite methodology prove that decoupling and partitioning can safely achieve a fivefold throughput increase for BFT protocols.
