Aggregating Node Preferences Enhances Byzantine Fault Tolerance in Blockchain Consensus
A novel PBFT algorithm allows nodes to express preferences, integrating incentive mechanisms and verifiable randomness to achieve robust multi-value consensus.
Encrypted Mempools Alone Cannot Solve Maximal Extractable Value
Cryptographically concealing transaction data until execution faces fundamental economic and technical limits, preventing universal MEV mitigation.
Proposer-Builder Separation Mitigates MEV Centralization
A novel mechanism, Proposer-Builder Separation, disentangles block construction from proposal, enhancing blockchain decentralization and censorship resistance.
Verifiable Randomness Enhances DPoS Decentralization and Security
A novel DPoS mechanism leverages verifiable randomness to unpredictably select delegates, fundamentally strengthening decentralization and mitigating power concentration.
Formalizing Universal Maximal Extractable Value for Blockchain Security
This research establishes a rigorous, universal definition of Maximal Extractable Value, quantifying maximum adversarial gain to fortify blockchain security.
Pod: Optimal-Latency, Censorship-Free, Accountable Generalized Consensus Layer
A novel consensus primitive eliminates inter-replica communication, achieving physically optimal latency and enabling high-speed, accountable decentralized applications.
New Data Availability Sampling Paradigm: Uncoded Commitments, On-the-Fly Coding
This research introduces a novel data availability sampling method, enhancing blockchain scalability and security through dynamic, on-the-fly data encoding.
Incentivizing Multiple Proposers for Robust Blockchain Censorship Resistance
This research designs transaction fee mechanisms to economically incentivize multiple block proposers, fundamentally countering censorship and bribery in decentralized networks.
Fiat-Shamir Transformation Vulnerable to Practical Attacks, Impacting Blockchain Security
Researchers expose a critical flaw in Fiat-Shamir, enabling false proofs in widely used systems and demanding re-evaluation of blockchain security foundations.
