Non-Interactive Proofs Cryptographically Secure Proof-of-Stake Long-Range Attacks
Non-interactive epiality proofs establish a bounded trust model, cryptographically securing Proof-of-Stake light clients against historical chain rewrites.
Cryptographic Liveness Proofs Secure Proof-of-Stake against Long-Range Attacks
A new Verifiable Liveness Proof primitive enables non-interactive, cryptographic slashing for censorship and downtime, hardening PoS finality.
