Mechanism Design Secures Leaderless Blockchain Protocols with Shared Fee Incentives
Proposes FPA-EQ, the first TFM for multi-proposer systems, achieving Strongly BPIC to align block producer incentives and maximize welfare.
Economically Securing Decentralized Oracles with TEE-BFT Hybrid Assurance
TEE-BFT hybrid model formalizes oracle security, integrating hardware attestation with BFT consensus to mathematically price execution assurance.
Level-K Game Theory Secures Consensus against Bounded Rationality Assumptions
Introducing a new consensus mechanism that models validator behavior using Level-k reasoning, guaranteeing stability beyond perfect rationality.
Formal Impossibility Limits Blockchain Fee Mechanism Design, Forcing Trade-Offs
New mechanism design research proves an impossibility for fully incentive-compatible transaction fee protocols, establishing a fundamental trade-off.
Decoupling Work and Compensation Enables Resource Exhaustion Attacks on Blockchains
New attack vectors exploit Turing-complete transaction logic to decouple validator work from fee compensation, compromising blockchain liveness.
Coin Holder Checkpointing Secures Proof-of-Stake History Permanently
A new checkpointing primitive leverages the network's total economic weight to eliminate long-range attacks, securing PoS history trustlessly.
Accountable Sharding Secures State with Proactive Key Rotation and Global Economic Deterrents
A new sharding model leverages proactive secret sharing and global slashing to eliminate the 1/N security vulnerability, enabling scalable and robust decentralized architectures.
Mechanism Design Secures Consensus by Eliminating Dishonest Forking Incentives
A Simultaneous Report mechanism replaces costly network-wide voting, achieving provably truthful consensus by making dishonest block proposals economically irrational.
ZK-Rollup Fee Mechanisms Must Price Proving Costs to Prevent Attacks
Unaligned fee mechanisms create prover-killer attacks, fundamentally challenging ZK-Rollup liveness and demanding a cost-aware mechanism design.
Stubborn Nakamoto Protocol Achieves Permissionless Economic Security without PoW
The Stubborn Nakamoto protocol modifies Bitcoin's core rules to achieve provable economic security and permissionless design, decoupling finality from energy expenditure.
Formal Framework Exposes Restaking Protocol Sybil Attack Vulnerabilities
A new formal framework proves restaking's Sybil resistance is compromised by partial slashing rules, necessitating refined economic security models.