Motivated by proof-of-stake (PoS) blockchains such as Ethereum, two key
...
Dynamic vector commitments that enable local updates of opening proofs h...
Fourteen years after the invention of Bitcoin, there has been a prolifer...
Accountability, the ability to provably identify protocol violators, gai...
Popular Ethereum wallets (e.g., MetaMask) entrust centralized infrastruc...
The latest message driven (LMD) greedy heaviest observed sub-tree (GHOST...
Layer 2 systems have received increasing attention due to their potentia...
Bitcoin is the most secure blockchain in the world, supported by the imm...
Decoupling consensus from transaction verification and execution is an
i...
We present two attacks targeting the Proof-of-Stake (PoS) Ethereum conse...
Bitcoin is the most secure blockchain in the world, supported by the imm...
Recently, two attacks were presented against Proof-of-Stake (PoS) Ethere...
Byzantine fault tolerant (BFT) consensus protocols are traditionally
dev...
The availability-finality dilemma says that blockchain protocols cannot ...
The CAP theorem says that no blockchain can be live under dynamic
partic...
Nakamoto invented the longest chain protocol, and claimed its security b...