Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Cryptoeconomic Security for Data Availability Committees

    Layer 2 systems have received increasing attention due to their potential to scale the throughput of L1 blockchains. To avoid the cost of putting data on chain, these systems increasingly turn to off-chain dat...

    Ertem Nusret Tas, Dan Boneh in Financial Cryptography and Data Security (2024)

  2. No Access

    Chapter and Conference Paper

    The Availability-Accountability Dilemma and Its Resolution via Accountability Gadgets

    For applications of Byzantine fault tolerant (BFT) consensus protocols where the participants are economic agents, recent works highlighted the importance of accountability: the ability to identify participants w...

    Joachim Neu, Ertem Nusret Tas, David Tse in Financial Cryptography and Data Security (2022)

  3. No Access

    Chapter and Conference Paper

    Three Attacks on Proof-of-Stake Ethereum

    Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators’ profits and delay...

    Caspar Schwarz-Schilling, Joachim Neu in Financial Cryptography and Data Security (2022)