Formal Methodology Assesses Blockchain Liveness against Malicious Miner Attacks
This research introduces a rigorous methodology to formally evaluate permissioned blockchain consensus algorithm liveness against malicious denial-of-service attacks, enhancing system resilience.
Weakly-Terminating Binary Agreement Simplifies Atomic Broadcast for Robust Distributed Systems
Weakly-terminating Binary Agreement simplifies Atomic Broadcast, enabling more efficient, resilient protocols for decentralized systems.
Decentralized Digital Identity System via Blockchain Microservices Architecture
A novel microservices architecture, integrated with Ethereum blockchain simulation, establishes a secure and decentralized digital identity system, empowering user control and enhancing data traceability.
Epidemic Consensus Protocol Scales Decentralized Blockchains to Extreme Limits
A novel Blockchain Epidemic Consensus Protocol enhances scalability and efficiency for extreme-scale decentralized networks, surpassing traditional and modern algorithms.
Scalable Zero-Knowledge Proofs Enhance Blockchain Hashing Verification
This research introduces a novel methodology leveraging Plonky2 to achieve efficient, scalable zero-knowledge proofs for cryptographic hashing, critical for blockchain integrity.
Zero-Knowledge Proofs: Applications, Infrastructure, and Future Trajectories
This survey distills the expansive utility of zero-knowledge proofs, showcasing their transformative impact on privacy and scalability across digital systems.
FBFT: Confidential Byzantine Fault Tolerance for Central Bank DLTs
A novel protocol integrates PBFT with threshold signatures, enabling confidential, fault-tolerant consensus in permissioned distributed ledgers for finance.
Epidemic Consensus Protocol Scales Decentralized Blockchain Networks
A novel leaderless epidemic consensus protocol enhances blockchain scalability, throughput, and efficiency for vast decentralized networks.
Distributed Verifiable Computation Secures Mobile Edge Computing Integrity and Efficiency
This paper introduces a distributed verifiable computation framework for mobile edge environments, ensuring integrity and low-latency for critical IoT applications.
