Time-Bound Schnorr Signatures Curb MEV, Restoring Transaction Predictability.
This research introduces time-bound Schnorr signatures, a cryptographic primitive that embeds an expiry block height directly into a transaction's signature, fundamentally altering MEV dynamics by restoring predictable transaction inclusion and reducing predatory extraction.
Zero-Knowledge Mechanisms: Private Commitment, Verifiable Execution without Mediators
This research introduces a framework for committing to and executing mechanisms privately, leveraging zero-knowledge proofs to enable verifiable properties without disclosure.
Aggregating Node Preferences Enhances Byzantine Fault Tolerance in Blockchain Consensus
A novel PBFT algorithm allows nodes to express preferences, integrating incentive mechanisms and verifiable randomness to achieve robust multi-value consensus.
Private Mechanism Design through Zero-Knowledge Commitments
This research introduces a novel framework for private mechanism design, enabling verifiable commitment to rules without revealing sensitive information or requiring trusted intermediaries.
Hidden Mechanisms with Zero-Knowledge Proofs for Private Verifiable Commitment
This research enables verifiable, private mechanism execution without mediators, leveraging zero-knowledge proofs to conceal rules while ensuring compliance.
Formalizing Universal Maximal Extractable Value for Blockchain Security
This research establishes a rigorous, universal definition of Maximal Extractable Value, quantifying maximum adversarial gain to fortify blockchain security.
Private Mechanism Design with Zero-Knowledge Proofs Eliminates Trusted Mediators
This research introduces a novel framework for mechanism design, enabling private, verifiable execution of protocols without trusted third parties through advanced zero-knowledge proofs.
Mechanism Design Mitigates Selfish Miner Inefficiencies in Blockchain Order Books
A novel adjustable block size mechanism quantifies and reduces social welfare loss from selfish miner behavior in blockchain order books, enhancing market efficiency.
Game Theory Models Cross-Chain MEV Exploits as Strategic, Zero-Sum Warfare.
This analysis models cross-chain MEV extraction during bridge exploits as strategic warfare, exposing zero-sum competition and profit concentration.
