Verifiable Training Proofs Secure Decentralized AI Consensus
The Zero-Knowledge Proof of Training (ZKPoT) mechanism leverages zk-SNARKs to create a consensus primitive that validates collaborative AI model updates with cryptographic privacy.
Practical Asynchronous BFT Protocol Achieves High Performance and Simplicity
Alea-BFT uses a two-stage pipeline with a designated leader to combine classical BFT efficiency with asynchronous network resilience, enabling practical adoption.
Obfuscation Enables Deterministic Asynchronous Consensus Defying FLP Impossibility
Program obfuscation and time-lock puzzles overcome the FLP impossibility, yielding a deterministic consensus for asynchronous networks.
Graded Common Subset Enables Linear Asynchronous Byzantine Consensus
Introducing the Graded Common Subset, this breakthrough mechanism achieves linear communication complexity, unlocking highly scalable, fully asynchronous Byzantine consensus for global decentralized systems.
Graded Dispersal Simplifies BFT Protocols Reducing Complexity and Communication Overhead
Foundational BFT protocols are simplified through Graded Dispersal, a new primitive that cuts communication complexity by 40% and reduces consensus rounds.
Uncertified DAG Consensus Achieves Sub-Second Latency in Asynchronous Networks
A novel aBFT protocol bypasses costly explicit certification using an uncertified DAG, delivering sub-second finality essential for global-scale decentralized systems.
Deterministic Bounds Secure Small Consensus Committees for Scalable Ledgers
New cryptographic sortition provides deterministic security bounds on adversarial influence, enabling constant-sized, efficient consensus committees.
Verifiable Functions Forge Decentralized Consensus Eliminating Predictability and Centralization
PoVF introduces a novel consensus mechanism combining two verifiable functions to guarantee provably fair leader election and eliminate centralization risk.
Adaptively Secure BLS Threshold Signatures from Standard Cryptographic Assumptions
A new threshold signature scheme achieves adaptive security with standard assumptions, fundamentally hardening distributed trust primitives for decentralized systems.
