cover

Secure Off-Chain Execution for Bitcoin Smart Contracts: A Failsafe Protocol

7 Jul 2025

A protocol moves Bitcoin contracts off-chain using signed state updates, slashing fees. Timelocks ensure an honest user can always enforce the contract on-chain

cover

Building Trust on Bitcoin: A Look at How Pre-Signed Transaction Trees Secure Contracts

7 Jul 2025

On-chain Bitcoin contracts are executed as pre-signed transaction trees, where implicit signatures from all parties guarantee fair play and prevent stalling.

cover

A New Blueprint for Bitcoin Contracts: Off-Chain Efficiency, On-Chain Guarantees

7 Jul 2025

A new protocol moves Bitcoin smart contracts off-chain to save fees, with an on-chain failsafe to guarantee correct execution against adversaries.

cover

Efficient Proof Systems: How PoStake, PoSpace, and VDFs Impact Blockchain Security

2 Jul 2025

Explore how adversaries exploit blockchain systems through double spending, selfish mining, and efficient proof systems like PoStake and PoSpace.

cover

This Math Hack Could Let Miners Earn Extra on Blockchains

2 Jul 2025

Formal analysis reveals a new selfish mining strategy for blockchain protocols using MDPs and ε-tight revenue models. Future-proofing blockchain?

cover

New Research Shows Classic Selfish Mining Is Outdated

2 Jul 2025

New attack strategy using disjoint forks achieves 20% higher mining revenue than classic selfish mining in proof-based blockchains.

cover

The Limits of Automated Selfish Mining Detection

2 Jul 2025

A flexible, formally verified approach to modeling selfish mining in blockchains using MDPs—highlighting benefits, limitations, and strategic insights.

cover

Understanding Ergodicity in Markov Decision Processes

1 Jul 2025

his proof demonstrates how strategies in Markov decision processes yield ergodic Markov chains, with state recurrence ensured by honest mining behavior.

cover

The Math Behind Selfish Mining and Reward Allocation

1 Jul 2025

Formal analysis of selfish mining in efficient proof systems using mean-payoff MDPs and custom reward functions to model optimal adversarial strategies.