Formalizing Optimistic Rollup Fraud Proofs for Enhanced Security
This research establishes a rigorous framework for fraud proofs, ensuring the integrity of off-chain computations and unlocking scalable blockchain architectures.
Efficient Data Availability Sampling with Robust Repair for Scalable Blockchains
This research introduces novel data availability sampling constructions, enabling robust and efficient data recovery crucial for blockchain scalability.
Robust Distributed Arrays Secure Data Availability Sampling without Honest Majority
This research introduces Robust Distributed Arrays, a novel distributed data structure that secures the DAS networking layer against malicious actors without relying on an honest majority assumption.
On-The-Fly Coding Dramatically Improves Data Availability Security Assurance
Modularizing data availability by committing to uncoded data and using Random Linear Network Coding for stronger sampling assurance.
Set Byzantine Consensus Decouples Rollup Sequencing from Centralized Control
The research introduces Set Byzantine Consensus to construct a Decentralized Arranger, fundamentally solving rollup centralization by separating transaction content agreement from final ordering.
Erasure Code Commitments Cryptographically Enforce Data Availability Consistency
This new cryptographic primitive, defined by position- and code-binding, solves the data availability problem by guaranteeing that committed data is a valid erasure codeword, securing modular blockchain scaling.
Erasure Code Commitments Enforce Data Availability Consistency
This new cryptographic primitive enforces that committed data is a valid code word, fundamentally securing data availability sampling protocols against malicious data encoding.
Erasure Code Commitments Enable Efficient Trustless Data Availability Sampling
This new cryptographic primitive formally guarantees committed data is a valid code word, enabling poly-logarithmic Data Availability Sampling without a trusted setup.
Decentralized Fair Sequencing Using Verifiable Delay Functions and Threshold Cryptography
A novel mechanism leverages Verifiable Delay Functions and Threshold Cryptography to enforce first-come, first-served transaction ordering, fundamentally mitigating sequencer MEV risk.
