Epidemic Consensus Achieves Leaderless, Extreme-Scale, Collusion-Resistant Blockchain Finality
This new leaderless consensus protocol, Blockchain Epidemic Consensus Protocol (BECP), leverages viral communication to solve the decentralization-scalability trade-off.
Formalizing Blockchain Incentive Compatibility through New Economic Primitives
The research defines MMIC and OCA-proofness, new game-theoretic primitives that formally analyze and secure transaction fee mechanisms against collusion.
Equifficient Polynomial Commitments Achieve Smallest Proof Size and Fastest SNARKs
Equifficient Polynomial Commitments are a new primitive that enforces polynomial basis representation, enabling SNARKs with 160-byte proofs and triple-speed proving.
Stateless Zkrollups Achieve Sublinear State Growth for Infinite Scalability
A stateless zkRollup design shifts state preservation to clients, achieving sublinear state growth and eliminating state bloat for unprecedented L2 scalability.
Interactive Oracle Proofs Enable Trustless, Scalable, Post-Quantum Verifiable Computation
Interactive Oracle Proofs generalize PCPs, constructing transparent, quasi-linear proof systems that eliminate trusted setup for mass-scale verifiable computation.
Recursive Proofs Enable Stateless Clients and Infinite Blockchain Scalability
Recursive Proof Composition creates a succinct, constant-size cryptographic commitment to the entire chain history, unlocking true stateless verification.
Equifficient Polynomial Commitments Enable Fastest, Smallest Zero-Knowledge SNARKs
New Equifficient Polynomial Commitments (EPCs) enforce polynomial basis consistency, yielding SNARKs with record-smallest proof size and fastest prover time.
Cross-Blockchain Protocol Enables Legally Enforceable, Interoperable Digital Asset Ownership
A new cross-chain protocol introduces the Title Token, bridging blockchain immutability with legal enforceability for real-world asset tokenization.
Threshold Cryptography and Blockchain Secure Dual Location Query Privacy
A framework combining threshold cryptography and tokenized private chains achieves provably secure, dual-layer location and query privacy.
