Threshold Encrypted Mempools: Limitations and Considerations

07/20/2023
by   Antoine Rondelet, et al.
0

Encrypted mempools are a class of solutions aimed at preventing or reducing negative externalities of MEV extraction using cryptographic privacy. Mempool encryption aims to hide information related to pending transactions until a block including the transactions is committed, targeting the prevention of frontrunning and similar behaviour. Among the various methods of encryption, threshold schemes are particularly interesting for the design of MEV mitigation mechanisms, as their distributed nature and minimal hardware requirements harmonize with a broader goal of decentralization. This work looks beyond the formal and technical cryptographic aspects of threshold encryption schemes to focus on the market and incentive implications of implementing encrypted mempools as MEV mitigation techniques. In particular, this paper argues that the deployment of such protocols without proper consideration and understanding of market impact invites several undesired outcomes, with the ultimate goal of stimulating further analysis of this class of solutions outside of pure cryptograhic considerations. Included in the paper is an overview of a series of problems, various candidate solutions in the form of mempool encryption techniques with a focus on threshold encryption, potential drawbacks to these solutions, and Osmosis as a case study. The paper targets a broad audience and remains agnostic to blockchain design where possible while drawing from mostly financial examples.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/10/2023

Revisiting Fully Homomorphic Encryption Schemes

Homomorphic encryption is a sophisticated encryption technique that allo...
research
07/17/2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

New cryptographic techniques such as homomorphic encryption (HE) allow c...
research
11/29/2018

(Un)Encrypted Computing and Indistinguishability Obfuscation

This paper first describes an `obfuscating' compiler technology develope...
research
02/16/2019

Compiled Obfuscation for Data Structures in Encrypted Computing

Encrypted computing is an emerging technology based on a processor that ...
research
06/08/2018

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Most encrypted data formats, such as PGP, leak substantial metadata in t...
research
05/18/2022

Toward Timed-Release Encryption in Web3 An Efficient Dual-Propose Proof-of-Work Consensus

Many existing timed-release encryption schemes uses time-lock puzzles to...

Please sign up or login with your details

Forgot password? Click here to reset