Chitin Protocol Secures Proof-of-Stake Liveness against View Interference Attacks
Chitin introduces a novel PoS architecture combining dynamic availability with a finality gadget, securing liveness against view-interference for single-slot confirmation.
Lattice Polynomial Commitments Achieve Post-Quantum Transparent SNARKs
This research delivers the first efficient lattice-based polynomial commitment scheme, securing succinct arguments against quantum adversaries without a trusted setup.
Random Linear Coding Secures Data Availability Sampling Paradigm
Modularizing DAS with on-the-fly network coding over uncoded commitments provides orders of magnitude stronger availability assurance.
Adaptive Byzantine Agreement Achieves Optimal Communication Complexity by Tracking Real Faults
The new BFT protocol dynamically scales communication cost based on actual faults, overcoming classic $O(n^2)$ bounds for truly scalable decentralized systems.
Dynamic MEV Extraction Rate Balances Incentives for Producers and Users
A dynamic MEV extraction rate, analogous to EIP-1559, is proposed to stabilize the sharing of value between block producers and users.
Zero-Knowledge Proof of Training Secures Decentralized Utility-Based Consensus
The ZKPoT consensus mechanism uses zk-SNARKs to validate collaborative model training performance privately, resolving the privacy-utility trade-off.
Sublinear Memory Zero-Knowledge Proofs Democratize Verifiable Computation for All Devices
Cryptographers achieved square-root memory scaling for ZKPs, solving the core resource bottleneck and enabling verifiable computation on mobile devices.
Off-Chain Influence Proofness Challenges EIP-1559 and Transaction Fee Mechanism Design
This research introduces off-chain influence proofness, demonstrating EIP-1559's vulnerability to censorship threats and proving fundamental limits on TFM design.
Transparent Polynomial Commitment Achieves Constant Proof Size and Verifier Time
Behemoth is a new transparent Polynomial Commitment Scheme that eliminates trusted setup while delivering constant-time verification, fundamentally changing zero-knowledge proof architecture.
