Formalizing Proof-of-Stake Incentive Compatibility and Forking Attack Risk
Game theory proves the fork-choice rule is only eventually incentive-compatible, exposing a rational forking risk under network synchrony shifts.
Coin Holder Checkpointing Secures Proof-of-Stake against Long-Range Attack
The Winkle protocol introduces decentralized coin holder checkpointing, transforming every transaction into a security vote to establish an immutable chain history.
PoS Security via PoW Checkpointing Protocol Achieves Historical Finality
A novel checkpointing protocol embeds Proof-of-Stake finality into Proof-of-Work, providing provable, non-slashable security against long-range attacks.