Dynamic Quorum Consensus Decouples BFT Security and Liveness Overhead
Adaptive Threshold Consensus dynamically adjusts finality quorums, radically minimizing communication complexity for highly decentralized BFT networks.
Falcon Protocol Achieves Low Latency Asynchronous Byzantine Consensus
A novel BFT protocol, Falcon, uses Graded Broadcast to bypass costly agreement stages, fundamentally improving decentralized system throughput and latency.
Epidemic Consensus Protocol Unlocks Leaderless Decentralization and Extreme Blockchain Scale
A new leaderless epidemic consensus protocol resolves the scalability-decentralization tradeoff, leveraging probabilistic convergence for massive network throughput.
Reducing BFT Authenticator Complexity Enables Truly Scalable Asynchronous Consensus
JUMBO introduces Quorum Certificate aggregation and dispersal to reduce aBFT authenticator complexity, unlocking consensus scalability for hundreds of nodes.
Proof of Quantum Work Consensus Leverages Quantum Supremacy to Secure Blockchains
Proof of Quantum Work, a quantum-enhanced consensus mechanism, leverages quantum supremacy to achieve energy-efficient and classically intractable block production.
Succinct State Proofs Decouple Verification from State Bloat
A novel polynomial commitment scheme enables constant-size cryptographic proofs of the entire blockchain state, resolving the critical state synchronization bottleneck and preserving decentralization.
Reusable Formal Verification Framework Secures Complex DAG-Based Consensus Protocols
A compositional TLA+ framework enables reusable, mechanized safety proofs for complex DAG consensus, fundamentally securing the next generation of high-throughput distributed ledgers.
DAG-Based BFT Protocol Mitigates MEV without Complex Cryptography
Fino integrates MEV-resistance directly into Directed Acyclic Graph consensus, decoupling transaction content from ordering metadata to secure high-throughput systems.
Asymmetric Trust Model Secures DAG Consensus Protocols
Researchers generalize DAG consensus to an asymmetric trust model, enabling protocols to maintain security even when nodes hold non-uniform fault tolerance assumptions.
