A Secure Sequencer and Data Availability Committee for Rollups (Extended Version)
- URL: http://arxiv.org/abs/2509.06614v2
- Date: Tue, 09 Sep 2025 21:07:49 GMT
- Title: A Secure Sequencer and Data Availability Committee for Rollups (Extended Version)
- Authors: Margarita Capretto, Martín Ceresa, Antonio Fernández Anta, Pedro Moreno-Sanchez, César Sánchez,
- Abstract summary: Layer 2 Rollups (L2s) are a faster alternative to conventional blockchains.<n>L2s perform most computations offchain using minimally blockchains (L1) under-the-hood to guarantee correctness.<n>We propose fraud-proof mechanisms, arbitrated by L1 contracts, to detect and generate evidence of dishonest behavior.
- Score: 7.299239909796724
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Blockchains face a scalability limitation, partly due to the throughput limitations of consensus protocols, especially when aiming to obtain a high degree of decentralization. Layer 2 Rollups (L2s) are a faster alternative to conventional blockchains. L2s perform most computations offchain using minimally blockchains (L1) under-the-hood to guarantee correctness. A sequencer is a service that receives offchain L2 transaction requests, batches these transactions, and commits compressed or hashed batches to L1. Using hashing needs less L1 space, which is beneficial for gas cost, but requires a data availability committee (DAC) service to translate hashes into their corresponding batches of transaction requests. The behavior of sequencers and DACs influence the evolution of the L2 blockchain, presenting a potential security threat and delaying L2 adoption. We propose in this paper fraud-proof mechanisms, arbitrated by L1 contracts, to detect and generate evidence of dishonest behavior of the sequencer and DAC. We study how these fraud-proofs limit the power of adversaries that control different number of sequencer and DACs members, and provide incentives for their honest behavior. We designed these fraud-proof mechanisms as two player games. Unlike the generic fraud-proofs in current L2s (designed to guarantee the correct execution of transactions), our fraud-proofs are over pred-etermined algorithms that verify the properties that determine the correctness of the DAC. Arbitrating over concrete algorithms makes our fraud-proofs more efficient, easier to understand, and simpler to prove correct. We provide as an artifact a mechanization in LEAN4 of our fraud-proof games, including (1) the verified strategies that honest players should play to win all games as well as (2) mechanisms to detect dishonest claims.
Related papers
- One Token Embedding Is Enough to Deadlock Your Large Reasoning Model [91.48868589442837]
We present the Deadlock Attack, a resource exhaustion method that hijacks an LRM's generative control flow.<n>Our method achieves a 100% attack success rate across four advanced LRMs.
arXiv Detail & Related papers (2025-10-12T07:42:57Z) - Calyx: Privacy-Preserving Multi-Token Optimistic-Rollup Protocol [9.113079192794027]
We introduce Calyx, the first privacy-preserving multi-token optimistic-Rollup protocol.<n>Calyx guarantees full payment privacy for all L2 transactions, revealing no information about the sender, recipient, transferred amount, or token type.<n>We analyze the security and privacy guarantees of the protocol and provide an implementation and evaluation.
arXiv Detail & Related papers (2025-09-30T18:35:31Z) - Efficient Blockchain-based Steganography via Backcalculating Generative Adversarial Network [105.47203971578871]
We propose a generic blockchain-based steganography framework (GBSF)<n>The sender generates the required fields such as amount and fees, where the additional covert data is embedded to enhance the channel capacity.<n>Based on GBSF, we design a reversible generative adversarial network (R-GAN)<n>We propose R-GAN with Counter-intuitive data preprocessing and Custom activation functions, namely CCR-GAN.
arXiv Detail & Related papers (2025-06-19T04:43:41Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Towards a Formal Foundation for Blockchain Rollups [9.760484165522005]
ZK-Rollups aim to address challenges by processing transactions off-chain and validating them on the main chain.<n>This work presents a formal analysis using the Alloy specification language to examine and design key Layer 2 functionalities.<n>We propose enhanced models to strengthen security and censorship resistance, setting new standards for the security of rollups.
arXiv Detail & Related papers (2024-06-23T21:12:19Z) - Fast and Secure Decentralized Optimistic Rollups Using Setchain [1.1534313664323634]
Layer 2 optimistic rollups (L2) are a faster alternative that offer the same interface in terms of smart contract development and user interaction.
We propose a decentralized L2 optimistic rollup based on Setchain, a decentralized Byzantine-tolerant implementation of sets.
arXiv Detail & Related papers (2024-06-04T13:45:12Z) - Proof of Diligence: Cryptoeconomic Security for Rollups [19.10751432868712]
We introduce an incentivized watchtower network designed to serve as the first line of defense for rollups.
Our main contribution is a Proof of Diligence'' protocol that requires watchtowers to continuously provide a proof that they have verified L2 assertions.
arXiv Detail & Related papers (2024-02-11T16:40:33Z) - ADESS: A Proof-of-Work Protocol to Deter Double-Spend Attacks [0.0]
A principal vulnerability of a proof-of-work ("PoW") blockchain is that an attacker can re-write the history of transactions.
We propose a modification to PoW protocols, called ADESS, that contains two novel features.
arXiv Detail & Related papers (2023-09-25T21:50:23Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.