Collaborative Mining Secures PoS/BFT against Long-Range Attacks
        
        
        
        
          
        
        
      
        
    
        
        A novel collaborative mining protocol fundamentally redefines long-range attack security for PoS/BFT systems, enabling robust, energy-efficient decentralized applications.
        
        Cryptanalysis Exposes Verifiable Delay Function Flaws Threatening Consensus Security
        
        
        
        
          
        
        
      
        
    
        
        Cryptographers proved a Verifiable Delay Function's fixed sequential time can be bypassed, challenging its use for secure, fair randomness in Proof-of-Stake.
        
        Wakeness Vectors Secure Proof-of-Stake against Fully-Fluctuating Node Participation
        
        
        
        
          
        
        
      
        
    
        
        Wakeness vectors enable Proof-of-Stake protocols to securely handle arbitrary node participation fluctuations, rivaling Proof-of-Work robustness.
        
        Bitcoin Checkpointing Resolves Proof-of-Stake Long-Range Attack Impossibility
        
        
        
        
          
        
        
      
        
    
        
        A new protocol secures Proof-of-Stake history by anchoring succinct commitments to Bitcoin's Proof-of-Work, providing non-slashable long-range attack safety.
        
        Mechanism Design Enforces Truthful Consensus, Mitigating Disputes in Proof-of-Stake
        
        
        
        
          
        
        
      
        
    
        
        Applying economic revelation mechanisms to PoS protocols ensures truthful block proposal as the unique equilibrium, fundamentally enhancing network robustness.
        
        PoS Security via PoW Checkpointing Protocol Achieves Historical Finality
        
        
        
        
          
        
        
      
        
    
        
        A novel checkpointing protocol embeds Proof-of-Stake finality into Proof-of-Work, providing provable, non-slashable security against long-range attacks.
        
        Bitcoin Checkpointing Secures Proof-of-Stake against Long-Range Attacks
        
        
        
        
          
        
        
      
        
    
        
        A new protocol anchors Proof-of-Stake history to Bitcoin's Proof-of-Work, providing an external trust source to cryptoeconomically secure PoS against long-range attacks.
        
        Mechanism Design Enforces Truthful Consensus Using Staked Collateral
        
        
        
        
          
        
        
      
        
    
        
        A novel revelation mechanism leverages staked assets to ensure validators' truthfulness, resolving consensus disputes by making block proposal honesty the unique subgame perfect equilibrium.
        
        Formalizing Proof-of-Stake Security Limits under Dynamic Availability and Reconfiguration
        
        
        
        
          
        
        
      
        
    
        
        This research formalizes the Dynamic Availability and Reconfiguration (DAR) model, proving the minimum security assumptions required for scalable, decentralized Proof-of-Stake consensus.
        
        Verifiable Entropy Functions Secure Optimal Decentralized Randomness Extraction
        
        
        
        
          
        
        
      
        
    
        
        The Verifiable Entropy Function, a new primitive, guarantees maximal unbiased randomness from distributed inputs, fundamentally securing Proof-of-Stake consensus.
        
        Post-Quantum Verifiable Delay Functions Eliminate Trusted Setup
        
        
        
        
          
        
        
      
        
    
        
        Isogeny-based Verifiable Delay Functions leverage endomorphism rings for quantum-secure, trustless, and efficiently verifiable sequential computation.
        
        Dual-Layer Consensus Decouples Scalability and Finality for Secure Sharding
        
        
        
        
          
        
        
      
        
    
        
        Dual-Layer Consensus introduces a BFT-typed finality committee to PoS sharding, achieving high concurrency and guaranteed deterministic finality.
        
        Incremental Proofs Maintain Constant-Size Sequential Work for Continuous Verification
        
        
        
        
          
        
        
      
        
    
        
        This new cryptographic primitive enables constant-size proofs for arbitrarily long sequential computations, fundamentally solving the accumulated overhead problem for VDFs.
        
        Cornucopia: Accumulators and VDFs Secure Scalable Decentralized Randomness Beacons
        
        
        
        
          
        
        
      
        
    
        
        This new Cornucopia framework combines Verifiable Delay Functions with accumulators to create a scalable, bias-resistant randomness beacon secure with only one honest participant.
        
        Formalizing Accountable Finality Quantifies Proof-of-Stake Reorganization Economic Cost
        
        
        
        
          
        
        
      
        
    
        
        The new Accountability Gadget formally quantifies the economic cost of PoS reorganizations, transforming finality from a social consensus into a provable, suicidal economic guarantee.
        
        Winkle Foils Proof-of-Stake Long-Range Attacks with Decentralized Coin Holder Checkpoints
        
        
        
        
          
        
        
      
        
    
        
        Winkle introduces a decentralized checkpointing primitive, leveraging coin holder transaction-based votes to cryptoeconomically secure PoS history against long-range attacks.
        
        Accountable Safety Unifies Finality for Robust Proof-of-Stake Consensus
        
        
        
        
          
        
        
      
        
    
        
        Formal proof establishes accountable safety as the single, stronger security primitive, guaranteeing consistency and enabling verifiable fault attribution in BFT systems.
        
        Asynchronous Finality Gadget Secures Proof-of-Stake Safety
        
        
        
        
          
        
        
      
        
    
        
        The φ-Gadget introduces a two-phase threshold signature mechanism to decouple block ordering from finality, guaranteeing safety under asynchronous network conditions.
        
        Tournament Algorithm Establishes Fair Leader Election for Decentralized Consensus
        
        
        
        
          
        
        
      
        
    
        
        PureLottery introduces a single-elimination tournament model, leveraging VDFs to achieve provably fair, bias-resistant leader election critical for PoS security.
        
        Homomorphic Sortition Secures Proof-of-Stake Leader Election Liveness
        
        
        
        
          
        
        
      
        
    
        
        Homomorphic Sortition uses Threshold FHE to create the first asynchronous, non-expiring secret leader election, securing PoS liveness.
        
        STAKESURE Mechanism Guarantees Strong Cryptoeconomic Safety for Over-Leveraged Proof-of-Stake
        
        
        
        
          
        
        
      
        
    
        
        STAKESURE introduces a novel insurance mechanism to allocate slashed funds, guaranteeing strong cryptoeconomic safety by compensating harmed parties.
        
        Cryptographic Sequential Delay Secures Decentralized Randomness Beacons
        
        
        
        
          
        
        
      
        
    
        
        Verifiable Delay Functions introduce cryptographically enforced sequential time, preventing parallel computation and eliminating randomness bias in Proof-of-Stake leader election.
        
        Coin Holder Checkpointing Secures Proof-of-Stake History against Long-Range Attack
        
        
        
        
          
        
        
      
        
    
        
        Winkle introduces coin holder-driven decentralized checkpointing, cryptoeconomically securing Proof-of-Stake history against deep chain rewrites.
        
        Game-Theoretic Incentives Guarantee Provably Uniform Decentralized Randomness
        
        
        
        
          
        
        
      
        
    
        
        A new Randomness Incentive Game (RIG) establishes a Nash Equilibrium where participants are compelled to submit provably uniform inputs, securing all decentralized randomness protocols.
