A survey of blockchain consensus protocols

J Xu, C Wang, X Jia - ACM Computing Surveys, 2023 - dl.acm.org
Blockchain consensus protocols have been a focus of attention since the advent of Bitcoin.
Although classic distributed consensus algorithms made significant contributions to the …

Reaching consensus in the byzantine empire: A comprehensive review of bft consensus algorithms

G Zhang, F Pan, Y Mao, S Tijanic, M Dang'Ana… - ACM Computing …, 2024 - dl.acm.org
Byzantine fault-tolerant (BFT) consensus algorithms are at the core of providing safety and
liveness guarantees for distributed systems that must operate in the presence of arbitrary …

Red belly: A secure, fair and scalable open blockchain

T Crain, C Natoli, V Gramoli - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Blockchain has found applications to track ownership of digital assets. Yet, several
blockchains were shown vulnerable to network attacks. It is thus crucial for companies to …

Dumbo-ng: Fast asynchronous bft consensus with throughput-oblivious latency

Y Gao, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang - Proceedings of the 2022 …, 2022 - dl.acm.org
Despite recent progresses of practical asynchronous Byzantine-fault tolerant (BFT)
consensus, the state-of-the-art designs still suffer from suboptimal performance. Particularly …

[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks

L Breidenbach, C Cachin, B Chan, A Coventry, S Ellis… - Chainlink Labs, 2021 - naorib.ir
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …

Themis: Fast, strong order-fairness in byzantine consensus

M Kelkar, S Deb, S Long, A Juels… - Proceedings of the 2023 …, 2023 - dl.acm.org
We introduce Themis, a scheme for introducing fair ordering of transactions into
(permissioned) Byzantine consensus protocols with at most ƒ faulty nodes among n≥ 4ƒ+ 1 …

Sok: Preventing transaction reordering manipulations in decentralized finance

L Heimbach, R Wattenhofer - Proceedings of the 4th ACM Conference …, 2022 - dl.acm.org
User transactions on Ethereum's peer-to-peer network are at risk of being attacked. The
smart contracts building decentralized finance (DeFi) have introduced a new transaction …

Maximal extractable value (mev) protection on a dag

D Malkhi, P Szalachowski - arxiv preprint arxiv:2208.00940, 2022 - arxiv.org
Many cryptocurrency platforms are vulnerable to Maximal Extractable Value (MEV) attacks,
where a malicious consensus leader can inject transactions or change the order of user …

The blockchain imitation game

K Qin, S Chaliasos, L Zhou, B Livshits, D Song… - 32nd USENIX Security …, 2023 - usenix.org
The use of blockchains for automated and adversarial trading has become commonplace.
However, due to the transparent nature of blockchains, an adversary is able to observe any …

Sok: Mev countermeasures: Theory and practice

S Yang, F Zhang, K Huang, X Chen, Y Yang… - arxiv preprint arxiv …, 2022 - arxiv.org
Blockchains offer strong security guarantees, but they cannot protect the ordering of
transactions. Powerful players, such as miners, sequencers, and sophisticated bots, can …