Native Onion Routing Secures Proof-of-Stake Leader Election
PoS-CoPOR integrates native onion routing to anonymize block proposers, fundamentally preventing Denial-of-Service attacks on pre-elected leaders.
Zero-Knowledge Proofs: Transforming Digital Privacy and Computational Integrity
Zero-knowledge proofs enable verifiable computation without revealing data, unlocking private, scalable solutions for diverse digital systems.
Dynamic Committee Rotation Secures Sharded Blockchain Consensus
A novel protocol uses verifiable random functions to dynamically reshuffle sharding committees, fundamentally enhancing blockchain security and throughput.
Zero-Knowledge Mechanisms Enable Private, Verifiable Commitments without Mediators
This framework leverages zero-knowledge proofs for private mechanism commitment and execution, ensuring verifiable properties without disclosure or mediators.
Validated Strong Asynchronous BFT for Scalable Vote-Based Blockchains
A novel validated strong BFT model enables leader-based asynchronous consensus, reducing message complexity and achieving linear view changes for scalable blockchains.
Léonne: Topological Consensus Networks Resolve Blockchain Trilemma with Quantum Security
Léonne introduces a novel Proof-of-Consensus using topological networks and quantum dynamics, enabling scalable, secure, and decentralized blockchains.
Post-Quantum Dynamic K-Times Anonymous Authentication Enhances Privacy and Management
Pioneering lattice-based dynamic k-TAA enables adaptable, post-quantum anonymous authentication, critical for future privacy-preserving systems.
Dynamic Merkle Trees for Efficient Data Integrity
Dynamic Merkle Trees optimize data integrity verification in cloud storage by adapting to workload patterns, significantly enhancing throughput and reducing latency.
Self-Stabilizing Replicated State Machines Resist Byzantine and Recurring Transient Faults
This paper introduces the first protocol for repeated Byzantine agreement that integrates self-stabilization, enabling distributed systems to autonomously recover from both malicious and transient errors.
