Formalizing Data Availability Sampling as a New Cryptographic Commitment Primitive
Researchers formalize Data Availability Sampling as a cryptographic primitive, introducing a new commitment scheme that rigorously secures light client verification.
Erasure Code Commitments Enforce Data Availability Consistency
This new cryptographic primitive enforces that committed data is a valid code word, fundamentally securing data availability sampling protocols against malicious data encoding.
Zero-Overhead Data Availability Protocol Enables Trustless Scalability
ZODA introduces a tensor code-based proof of encoding that eliminates sampler communication overhead, fundamentally democratizing data availability verification for light nodes.
Coding Techniques Achieve Near-Optimal Synchronous BFT Communication Complexity
The Hamster protocol uses coding techniques to reduce Byzantine Fault Tolerance communication to near-optimal $O(mn)$, unlocking linear throughput scaling.
Probabilistic Sampling Verifies Data Availability Securing Modular Blockchain Scaling
Data Availability Sampling leverages erasure coding to enable light nodes to probabilistically verify block data, fundamentally solving the L2 scaling data bottleneck.
Sharding Consensus Achieves Optimal Cross-Shard Overhead and Security Atomicity
A new sharding consensus pattern achieves provable cross-shard atomicity and optimal intra-shard communication overhead using a jointly managed buffer.
Data Availability Sampling Secures Modular Blockchain Scalability
Modular architecture decouples core functions, using Data Availability Sampling and erasure coding to enable trust-minimized, mass-scale rollups.
Direct Communication Protocol Secures Data Availability Sampling Efficiency
PANDAS uses direct communication and a two-phase seeding/consolidation model to meet the 4-second DAS deadline, ensuring data availability despite malicious nodes.
Decoupling Data Commitment from Coding Enhances Sampling Security
A new Data Availability Sampling paradigm commits to uncoded data, enabling on-the-fly coding for verification, which drastically strengthens light client security guarantees.
