Differential Privacy Ensures Transaction Ordering Fairness in Blockchains
Researchers connect Differential Privacy to State Machine Replication, using cryptographic noise to eliminate algorithmic bias and mitigate Maximal Extractable Value.
Asymmetric DAG Consensus Achieves Robustness with Heterogeneous Node Trust
By formalizing an asymmetric common core primitive, this new DAG-based consensus protocol enables robust, constant-time finality under heterogeneous trust assumptions.
Zero-Knowledge Proof of Training Secures Decentralized Machine Learning
ZKPoT leverages zk-SNARKs to cryptographically validate model training contributions, resolving the core privacy-efficiency conflict in federated learning.
Zero-Knowledge Proof of Training Secures Private Decentralized Machine Learning
ZKPoT consensus uses zk-SNARKs to prove model accuracy privately, resolving the privacy-utility-efficiency trilemma for federated learning.
Optimal Flexible Consensus Allows Client-Specific Safety-Liveness Trade-Offs
This new BFT construction enables clients to optimally select their safety-liveness resilience, fundamentally decentralizing the finality trade-off.
Accountable Byzantine Consensus Achieves Optimal Communication and Accountability Complexity
New Accountable Byzantine Consensus protocol, `abcopt`, delivers optimal communication complexity while guaranteeing provable validator accountability.
ZKPoT Consensus Secures Federated Learning with Verifiable, Private Model Contributions
Zero-Knowledge Proof of Training (ZKPoT) is a new consensus primitive that cryptographically verifies model accuracy without exposing private training data, resolving the privacy-utility conflict in decentralized AI.
Zero-Knowledge Proof Consensus Secures Decentralized Machine Learning without Accuracy Trade-Offs
ZKPoT consensus uses zk-SNARKs to privately verify model training quality, resolving the efficiency-privacy trade-off in decentralized AI.
Threshold Cryptography Introduces Undetectable Collusion Risks in MEV Mitigation
Analyzing threshold encrypted mempools reveals that cryptographic privacy shifts MEV risk to new, undetectable forms of decryptor collusion and information asymmetry
