Protected Order Flow Limits Adversarial MEV in Proposer-Builder Separation Systems
PROF enforces transaction ordering within profitable bundles, preventing order manipulation and ensuring timely inclusion in Proposer-Builder Separation.
Cost-Effective Verifiable Delay Functions Unlock Secure EVM Randomness
Optimizing Pietrzak's VDF verification from 4M to 2M gas makes unbiasable on-chain randomness feasible, securing leader election and decentralized applications.
MAD-DAG: Novel Ledger Function Secures Consensus against Selfish MEV Mining
A new DAG ledger function cryptographically destroys conflicting MEV, raising the selfish mining security threshold to ensure protocol integrity.
Leaderless Asynchronous BFT Protocol Secures Transaction Ordering Fairness
A novel leaderless BFT protocol uses Verifiable Delay Functions and Asynchronous Secret Sharing to achieve cryptographically-enforced fair transaction ordering, eliminating centralized sequencing risk.
Decentralized Clock Network Enforces Fair Transaction Ordering and Mitigates MEV
A Decentralized Clock Network cryptographically timestamps transactions, decoupling fair ordering from consensus to neutralize adversarial MEV.
Mutual-Assured-Destruction DAG Secures Consensus against MEV and Rushing
MAD-DAG introduces a ledger function that destroys block content on chain-length ties, mathematically eliminating selfish mining profitability under real-world MEV conditions.
Optimistic Rollups Secure Decentralized Federated Learning Model Integrity
This mechanism secures decentralized AI model aggregation by applying optimistic rollup fraud proofs to validate off-chain model weight updates, ensuring global model integrity.
Cryptographic Time-Locks and Distributed Sequencing Ensure Fair Transaction Ordering
A distributed sequencing committee uses Threshold Cryptography and Verifiable Delay Functions to cryptographically decouple ordering from the consensus proposer, eliminating MEV extraction.
Application-Layer Mechanism Design Eliminates Miner Arbitrage and Ensures Strategy-Proof AMMs
A new AMM mechanism uses batch processing and a constant potential function to achieve provable strategy-proofness, eliminating MEV at the application layer.
