You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: report/src/sections/00-abstract.tex
+10-1Lines changed: 10 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,15 @@
1
1
2
2
\begin{abstract}
3
-
This is the abstract~\cite{greenwade1993}.
3
+
Ethereum is one of the biggest proof-of-stake blockchains.
4
+
However, it is still vulnerable to attacks.
5
+
One such attack is made possible by Heimbach et al.~where an adversary could de-anonymize validators and then preform a denial-of-service attack on them.
6
+
To try and combat this attack, Ethereum has proposed the use of the Whisk protocol.
7
+
Whisk is a Single secret leader election protocol that uses a zero-knowledge proof called Curdleproofs that uses inner product arguments to proof the validity of a shuffle of validators.
8
+
This paper improves upon Curdleproofs' inner product arguments by introducing CAAUrdleproofs, which is a modified version of Curdleproofs with ideas from Springproofs as to allow for the use of any shuffle size.
9
+
We show that CAAUrdleproofs has similar proving and verifying times to Curdleproofs when the shuffle size is a power of two.
10
+
We also show that CAAUrdleproofs has a performance advantage for any shuffle size that is not a power of two, and that this advantage grows the lower the shuffle size is below a power of two.
11
+
After performing experiments, we also suggest a new shuffle size which is smaller than the current one used in Curdleproofs that would result in a smaller block overhead than the one created by the current Curdleproofs protocol.
0 commit comments