Aggregatable Key-Evolving VRFs Secure Proof-of-Stake with Constant-Size Proofs
A-KE-VRFs unify proof aggregation and forward security for Verifiable Random Functions, radically improving PoS scalability and historical security.
Decoupling Coding and Commitment Strengthens Data Availability Sampling Assurance
A new Data Availability Sampling paradigm uses Random Linear Network Coding to generate coded samples on-the-fly, achieving significantly stronger security assurance for light clients.
Zero-Knowledge Mechanisms Decouple Commitment from Disclosure in Protocol Design
Research pioneers a cryptographic primitive that proves a mechanism's incentive properties and execution correctness without revealing its secret rules.
Characterizing Off-Chain Influence-Proof Fee Mechanisms via a Burn Identity
Foundational mechanism design proves that off-chain influence-proof transaction fees are mathematically equivalent to a novel burn identity, securing transaction ordering.
Decentralized Clock Network Enforces Fair Transaction Ordering and Mitigates MEV
A Decentralized Clock Network cryptographically timestamps transactions, decoupling fair ordering from consensus to neutralize adversarial MEV.
Perpetual DEX Hyperliquid Suffers $4.9 Million Market Manipulation Exploit
Illiquid assets and high leverage created a structural vulnerability, forcing the liquidity vault to absorb $4.9M in unbacked bad debt.
Dual-Layer Consensus Architecture Trades Fault Tolerance for Dramatically Lower Finality Latency
BlueBottle's dual-layer consensus uses a fast, low-fault-tolerance core secured by a decentralized guard protocol, achieving sub-second finality.
