Formal MEV Theory Enables Provable Security against Transaction Reordering Attacks
A formal, abstract MEV theory rigorously defines adversarial gain via knowledge axiomatization, enabling proofs of smart contract security.
Zero-Knowledge Mechanisms Enable Private Rules with Public Verifiability
This framework introduces a new cryptographic primitive that allows mechanism rules to remain secret while using ZKPs to publicly verify incentive compatibility and outcomes, removing the need for a trusted mediator.
Cryptographic Whistleblowing Secures Protocols against Smart Collusion Incentives
This research introduces Cryptographic Whistleblowing, a mechanism design primitive that uses provable on-chain penalties to enforce honesty against financially rational colluders.
Concurrent Proposers and Conditional Tips Enforce Economic Censorship Resistance
Introducing conditional tips across concurrent block proposers creates a mechanism design solution, establishing a Proposer's Dilemma to enforce timely transaction inclusion.
Zero-Knowledge Proof of Training Secures Decentralized Federated Learning Consensus
ZKPoT uses zk-SNARKs to verify decentralized model accuracy without revealing private data, solving the efficiency-privacy trade-off in federated learning.
Mechanism Design Characterizes Decentralized Verifiable Computation Incentives
This research fundamentally characterizes incentive mechanisms for verifiable computation, balancing decentralization against execution efficiency in strategic environments.
Decoupling Transaction Ordering from Execution Is the Key to Systemic MEV Mitigation
A new Decoupled Execution and Ordering framework enforces fair sequencing by committing to order before content is visible, neutralizing predatory MEV.
Threshold Cryptography Enforces Fair Transaction Ordering Mitigating MEV
A distributed threshold cryptosystem decouples transaction ordering from content knowledge, mathematically eliminating frontrunning risk and centralizing MEV incentives.
Time-Bound Signatures Mitigate MEV by Enforcing Transaction Inclusion Deadlines
A modified Schnorr signature cryptographically ties transaction validity to block height, eliminating rational producer MEV deferral and ensuring fairer ordering.
