Formal MEV Theory Enables Proofs of Contract Security and Value Extraction
A formal, abstract MEV model allows provable security against transaction-ordering attacks, foundational for resilient DeFi architecture.
Formalizing Maximal Extractable Value Theory for Security Proofs
A new abstract model of blockchain execution formally defines Maximal Extractable Value (MEV), shifting the field from empirical observation to rigorous security proofs.
Accountable Delegation Secures Proof-of-Stake Liveness and Safety
A new Verifiable Inactivity Proof primitive enforces real-time delegate accountability, fundamentally securing DPoS liveness against non-participation.
Compiler Security Proof Enables Robust Distributed Cryptographic Synthesis
A novel compiler security proof unifies four theoretical models to automatically generate robust, distributed cryptographic systems from simple centralized code, fundamentally simplifying secure application development.
Cryptographic Whistleblowing Secures Protocols against Smart Collusion Incentives
This research introduces Cryptographic Whistleblowing, a mechanism design primitive that uses provable on-chain penalties to enforce honesty against financially rational colluders.
Formalizing MEV with Adversarial Knowledge Enables Provable Security
This abstract model defines Maximal Extractable Value via adversarial knowledge, providing the foundational theory for provable security against economic attacks.
Formalizing MEV with Abstract Blockchain Models for Robust Security Analysis
A formal MEV theory, built on abstract blockchain models, enables rigorous security proofs, fortifying decentralized systems against economic exploitation.
Formalizing MEV for Provably Secure Blockchain Design
A new formal theory of Maximal Extractable Value provides foundational tools for designing blockchains resilient to economic manipulation.
Verifiable Attribute Trees Enable Private, Decentralized Credential Revocation
A novel cryptographic primitive, Verifiable Attribute Trees, secures anonymous credentials with efficient, privacy-preserving, and decentralized revocation, fostering robust digital identity.
