Asymmetric Quorum Systems Model Subjective Trust for Decentralized Consensus
Introducing Asymmetric Byzantine Quorum Systems formalizes subjective node trust, paving the way for resilient, heterogeneous, and flexible consensus architectures.
New Data Availability Paradigm Decouples Commitment and Coding for Scalability
The new DAS paradigm commits to raw data, generating coded samples on-the-fly with RLNC, dramatically strengthening light node availability assurance.
Complexity-Preserving SNARKs via Recursive Composition and Proof-Carrying Data
The first complexity-preserving SNARK in the plain model eliminates expensive setup, enabling efficient, publicly verifiable, and composable computation.
Proposer-Builder Separation Centralizes Block Production and Stimulates Censorship
Proposer-Builder Separation democratizes MEV revenue but empirically shifts centralization risk to opaque builders and relays, demanding in-protocol solutions.
ZKPoT Consensus Secures Decentralized Learning against Privacy and Centralization
A Zero-Knowledge Proof of Training consensus mechanism leverages zk-SNARKs to validate machine learning model performance privately, securing decentralized AI.
HYDRA Eliminates Global Ordering for Scalable Concurrent BFT Consensus
The HYDRA framework introduces object-centric execution to parallelize BFT instances, fundamentally removing the global ordering bottleneck and unlocking true consensus scalability.
Unified Framework Achieves Private Scalable Verifiable Machine Learning
The new proof-composition framework casts verifiable machine learning as succinct matrix computations, delivering linear prover time and architecture privacy for decentralized AI.
C-NORM Metric Formalizes Proof-of-Stake Bootstrapping Decentralization
Game theory defines ideal PoS bootstrapping with C-NORM, proving existing airdrop methods centralize and validating PoW-based stake distribution.
Certificateless Proxy Re-Encryption Enables Private Decentralized Data Access Control
Certificateless Proxy Re-Encryption (CL-PRE) securely delegates data access on-chain by eliminating PKI overhead and private key exposure, enabling privacy-preserving data markets.
