Recent works of Roughgarden (EC\u2721) and Chung and Shi (SODA\u2723) initiate the study of a new decentralized mechanism design problem called transaction fee mechanism design (TFM). Unlike the classical mechanism design literature, in the decentralized environment, even the auctioneer (i.e., the miner) can be a strategic player, and it can even collude with a subset of the users facilitated by binding side contracts. Chung and Shi showed two main impossibility results that rule out the existence of a dream TFM. First, any TFM that provides incentive compatibility for individual users and miner-user coalitions must always have zero miner revenue, no matter whether the block size is finite or infinite. Second, assuming finite block size, no...
Decentralized exchanges (DEXes) provide effective price discovery and fair trading while dealing wit...
ABSTRACT We study a model of incentivizing correct computations in a variety of cryptographic tasks....
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
In blockchains such as Bitcoin and Ethereum, users compete in a transaction fee auction to get their...
We study a mechanism design problem in the blockchain proof-of-stake (PoS) protocol. Our main object...
Blockchain systems often employ proof-of-work consensus protocols to validate and add transactions i...
Bitcoin’s main innovation lies in allowing a decentralized system that relies on anonymous, profit dr...
Classical results on secure multi-party computation (MPC) imply that fully secure computation, inclu...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
We develop a model of coordination and allocation of decentralized multi-sided markets, in which our...
The incentive-compatibility properties of blockchain transaction fee mechanisms have been investigat...
We present efficient protocols for amortized secure multiparty computation with penalties and secure...
Proof-of-Stake blockchains based on a longest-chain consensus protocol are an attractive energy-frie...
In the past decade, a theory of manipulation-robust algorithms has been emerging to address the chal...
In the Bitcoin system, miners are incentivized to join the system and validate transactions through ...
Decentralized exchanges (DEXes) provide effective price discovery and fair trading while dealing wit...
ABSTRACT We study a model of incentivizing correct computations in a variety of cryptographic tasks....
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...
In blockchains such as Bitcoin and Ethereum, users compete in a transaction fee auction to get their...
We study a mechanism design problem in the blockchain proof-of-stake (PoS) protocol. Our main object...
Blockchain systems often employ proof-of-work consensus protocols to validate and add transactions i...
Bitcoin’s main innovation lies in allowing a decentralized system that relies on anonymous, profit dr...
Classical results on secure multi-party computation (MPC) imply that fully secure computation, inclu...
Research in Multi-Party Computation is constantly evolving over the years. Starting from the very fi...
We develop a model of coordination and allocation of decentralized multi-sided markets, in which our...
The incentive-compatibility properties of blockchain transaction fee mechanisms have been investigat...
We present efficient protocols for amortized secure multiparty computation with penalties and secure...
Proof-of-Stake blockchains based on a longest-chain consensus protocol are an attractive energy-frie...
In the past decade, a theory of manipulation-robust algorithms has been emerging to address the chal...
In the Bitcoin system, miners are incentivized to join the system and validate transactions through ...
Decentralized exchanges (DEXes) provide effective price discovery and fair trading while dealing wit...
ABSTRACT We study a model of incentivizing correct computations in a variety of cryptographic tasks....
Classical results on secure multi-party computation (MPC) imply that fully secure computa-tion, incl...