Monday, March 2, 2026
  • Login
Euro Times
No Result
View All Result
  • Home
  • Finance
  • Business
  • World
  • Politics
  • Markets
  • Stock Market
  • Cryptocurrency
  • Investing
  • Health
  • Technology
  • Home
  • Finance
  • Business
  • World
  • Politics
  • Markets
  • Stock Market
  • Cryptocurrency
  • Investing
  • Health
  • Technology
Euro Times
No Result
View All Result

Per-transaction encryption to fight malicious MEV

by Cointelegraph by Gleb K
February 10, 2026
in Cryptocurrency
Reading Time: 6 mins read
A A
0
Home Cryptocurrency
Share on FacebookShare on Twitter


Malicious MEV assaults pose a major risk to merchants on Ethereum. Our newest analysis reveals that just about 2,000 sandwich assaults occur every day and greater than $2 million is extracted from the community every month. Even merchants who execute massive WETH, WBTC or steady swaps stay in danger and may lose a considerable portion of their trades. 

MEV thrives due to the clear nature of blockchains, the place transaction knowledge is seen earlier than transactions are executed and finalized. One path towards mitigating MEV is mempool encryption, significantly by using threshold encryption. In our earlier articles, we examined two completely different fashions for threshold-encrypted mempools. Shutter, one of many first tasks to use threshold encryption to guard the mempool, launched a per-epoch setup. Batched threshold encryption (BTE), a more recent mannequin, decrypts a number of transactions with a single key to scale back communication prices and lift throughput.

On this piece, we analyze Flash Freezing Flash Boys (F3B) by H. Zhang et al. (2022), a newly proposed threshold encryption design that applies encryption on a per-transaction foundation. We discover its mechanics, clarify its scaling properties as considerations latency and reminiscence, and talk about the explanations it has not but been deployed in follow.

How Flash Freezing Flash Boys implements per-transaction encryption

Flash Freezing Flash Boys addresses limitations in early threshold encryption programs that relied on per-epoch setups. Tasks resembling FairBlock and the early variations of Shutter used a single key to encrypt each transaction inside a particular epoch. An epoch is a set variety of blocks, e.g., 32 blocks on Ethereum. This created a vulnerability the place some transactions that fail to be included within the specified block ends would nonetheless be decrypted with the remainder of the batch. This is able to expose delicate knowledge and open up MEV alternatives to validators, thus making them weak to front-running.

F3B applies threshold encryption on a per-transaction foundation, which ensures that every transaction stays confidential till it reaches finality. The overall circulate of the F3B protocol is proven within the determine under. The consumer encrypts the transaction with a key that solely the designated threshold committee, referred to as the Secret Administration Committee (SMC), can entry. The transaction ciphertext and the encrypted key are despatched to the consensus group as a pair (Step 1). Thus, nodes can retailer and order transactions whereas retaining all required decryption metadata for immediate post-finality reconstruction and execution. In the meantime, the SMC prepares its decryption shares however withholds them till the consensus commits the transaction (Step 2). As soon as a transaction is finalized and the SMC releases sufficient legitimate shares (Step 3), the consensus group decrypts the transaction and executes it (Step 4).

Per-transaction encryption had lengthy remained impractical because of its heavy computational load for encryption and decryption in addition to the storage requirement from massive encrypted payloads. F3B addresses this by threshold-encrypting solely a light-weight symmetric key as an alternative of the complete transaction. The transaction itself is encrypted with this symmetric key. This strategy can cut back the quantity of information that must be asymmetrically encrypted by as much as ~10 occasions for a easy swap transaction. 

Comparability of various cryptographic implementations of F3B and their latency overhead

Flash Freezing Flash Boys will be applied with one in all two cryptographic protocols, both TDH2 or PVSS. The distinction lies in who bears the setup burden and the way typically the committee construction is mounted, with corresponding benefits and downsides in flexibility, latency and storage overhead.

TDH2 (Threshold Diffie-Hellman 2) depends on a committee that runs a distributed key era (DKG) course of to provide particular person key shares together with a collective public key. Then, a consumer creates a contemporary symmetric key, encrypts their transaction with it, and encrypts that symmetric key to the committee’s public key. The consensus group writes this encrypted pair onto the chain. After the chain reaches the required variety of confirmations, committee members publish partial decryptions of the encrypted symmetric key along with NIZK (Non-Interactive Zero-Information) proofs, that are required to stop chosen-ciphertext assaults, the place attackers submit malformed ciphertexts to attempt to trick trustees into leaking info throughout decryption. NIZKs assure the consumer’s ciphertext is well-formed and decryptable, and in addition that trustees submitted right decryption shares.  Consensus verifies the proofs and, as soon as a threshold of legitimate shares is out there, reconstructs and decrypts the symmetric key, decrypts the transaction, after which executes it.

The second scheme, PVSS (Publicly Verifiable Secret Sharing), follows a distinct path. As an alternative of the committee working a DKG in each epoch, committee members every have a long-term personal key and a corresponding public key, which is saved on the blockchain and accessible to any consumer. For every transaction, customers decide a random polynomial and use Shamir’s secret sharing to generate secret shares, that are then encrypted for every chosen trustee utilizing the respective public key. The symmetric secret’s obtained by hashing the reconstructed secret. The encrypted shares are every accompanied by an NIZK proof, which permits anybody to confirm that every one shares had been derived from the identical secret, together with a public polynomial dedication, a document that binds the share-secret relationship. The following steps of transaction inclusion, post-finality share launch, key reconstruction, decryption and execution are just like these within the TDH2 scheme. 

The TDH2 protocol is extra environment friendly because of a set committee and constant-size threshold-encryption knowledge. PVSS, against this, provides customers extra flexibility, since they’ll choose the committee members liable for their transaction. Nonetheless, this comes at the price of bigger public-key ciphertexts and better computational overhead because of per-trustee encryption. Within the better scheme of issues, the prototype implementation of the F3B protocol on simulated proof-of-stake Ethereum confirmed that it has minimal efficiency overhead. With a committee of 128 trustees, the delay incurred after finality is barely 197 ms for TDH2 and 205 ms for PVSS, which is equal to 0.026% and 0.027% of Ethereum’s 768-second finality time. Storage overhead is simply 80 bytes per transaction for TDH2, whereas PVSS’s overhead grows linearly with the variety of trustees because of per-member shares, proofs and commitments. These outcomes verify that F3B may ship its privateness ensures with negligible affect on Ethereum’s efficiency and capability.

Incentives and punishments within the Flash Freezing Flash Boys protocol

F3B incentivizes sincere conduct amongst Secret Administration Committee trustees by a staking mechanism with locked collateral. Charges inspire trustees to remain on-line and preserve the extent of efficiency the protocol requires. A slashing good contract ensures that if anybody submits proof of a violation, which demonstrates that decryption was carried out prematurely, the offending trustee’s stake is forfeited. In TDH2, such proof consists of a trustee’s decryption share that may be publicly verified towards the transaction ciphertext. In the meantime, in PVSS, the proofs encompass a decrypted share along with a trustee-specific NIZK proof that authenticates it. This mechanism penalizes provable untimely disclosure of decryption shares, growing the price of detectable misbehavior. Nonetheless, it doesn’t stop trustees from colluding privately off-chain to reconstruct and decrypt transaction knowledge with out publishing any shares. In consequence, the protocol nonetheless depends on the belief that majority of committee members behave truthfully. 

As a result of encrypted transactions can’t be executed instantly, one other assault vector is for a malicious consumer to flood the blockchain with non-executable transactions to decelerate affirmation occasions. It is a potential assault floor widespread to all encrypted mempool schemes. F3B requires that customers make a storage deposit for each encrypted transaction, which makes spamming pricey. The system deducts the deposit upfront and refunds solely a part of it when the transaction executes efficiently.

Challenges to deploying F3B on Ethereum

Flash Freezing Flash Boys provides a complete cryptographic strategy to mitigating MEV, however it’s unlikely to see real-world deployment on Ethereum as a result of complexity of integration. Though F3B leaves the consensus mechanism untouched and preserves full compatibility with present good contracts, it requires modifications to the execution layer to assist encrypted transactions and delayed execution. This is able to require a far broader onerous fork than another replace launched since The Merge.

Nonetheless, F3B represents a beneficial analysis milestone that extends past Ethereum. Its trust-minimized mechanism for sharing personal transaction knowledge will be utilized to each rising blockchain networks and decentralized purposes that require delayed execution. F3B-style protocols will be helpful even on sub-second blockchains the place decrease block occasions already considerably cut back MEV, to totally remove mempool-based front-running. For instance utility, F3B may be utilized in a sealed-bid public sale good contract, the place bidders submit encrypted bids that stay hidden till the bidding part ends. Thus, bids will be revealed and executed solely after the public sale deadline, which prevents bid manipulation, front-running or early info leakage. 

This text doesn’t include funding recommendation or suggestions. Each funding and buying and selling transfer entails danger, and readers ought to conduct their very own analysis when making a choice. This text is for normal info functions and isn’t supposed to be and shouldn’t be taken as, authorized, tax, funding, monetary, or different recommendation. The views, ideas, and opinions expressed listed below are the writer’s alone and don’t essentially mirror or symbolize the views and opinions of Cointelegraph. Cointelegraph doesn’t endorse the content material of this text nor any product talked about herein. Readers ought to do their very own analysis earlier than taking any motion associated to any product or firm talked about and carry full accountability for his or her choices. Whereas we try to offer correct and well timed info, Cointelegraph doesn’t assure the accuracy, completeness, or reliability of any info on this article. This text could include forward-looking statements which can be topic to dangers and uncertainties. Cointelegraph is not going to be answerable for any loss or injury arising out of your reliance on this info.



Source link

Tags: encryptionfightmaliciousMEVPertransaction
Previous Post

Michael Saylor downplays Strategy credit risk as bitcoin tumbles: ‘We’ll refinance the debt’

Next Post

UNICEF Sounds Alarm as AI Fuels a New Global Child-Exploitation Crisis — Global Issues

Related Posts

US Military Action Against Iran Exposes Split Between Polymarket and Kalshi Models

US Military Action Against Iran Exposes Split Between Polymarket and Kalshi Models

by Tanya Chepkova
March 2, 2026
0

US and Israeli strikes on Iran over the weekend despatched shockwaves by prediction markets, exposing sharp operational contrasts as a...

Mapping Out XRP’s Path To ,200: Analyst Shares Insights

Mapping Out XRP’s Path To $1,200: Analyst Shares Insights

by Sandra White
February 20, 2026
0

Latest market dynamics have given completely different causes as to why the XRP worth is programmed to shoot to double...

Decision Zone: Bitcoin Compresses Under K With K or K in Sight

Decision Zone: Bitcoin Compresses Under $72K With $80K or $60K in Sight

by Jamie Redman
February 15, 2026
0

Bitcoin value stands at $69,397, commanding a market capitalization of $1.40 trillion, with $42.58 billion in 24-hour buying and selling...

Ethereum Flushes Into Major Demand: ,150 Hold Could Change Everything

Ethereum Flushes Into Major Demand: $2,150 Hold Could Change Everything

by Index Investing News
February 5, 2026
0

Ethereum has seen a pointy sell-off that despatched the worth straight into a serious demand zone close to $2,150, which...

Trump Says New Fed Chair Will Cut Rates After Warsh Nomination

Trump Says New Fed Chair Will Cut Rates After Warsh Nomination

by Evans Karanja
January 31, 2026
0

Be part of Our Telegram channel to remain updated on breaking information protection US President Donald Trump mentioned Friday that...

NVIDIA injects B into CoreWeave, CRWV stock jumps 10% premarket

NVIDIA injects $2B into CoreWeave, CRWV stock jumps 10% premarket

by Vivian Nguyen
January 26, 2026
0

CoreWeave, a US-based cloud computing firm specializing in GPU-accelerated infrastructure for synthetic intelligence, mentioned Monday it raised $2 billion by...

Next Post
UNICEF Sounds Alarm as AI Fuels a New Global Child-Exploitation Crisis — Global Issues

UNICEF Sounds Alarm as AI Fuels a New Global Child-Exploitation Crisis — Global Issues

December retail sales were flat, falling well short of estimate

December retail sales were flat, falling well short of estimate

Dimon says Trump debanking lawsuit ‘has no merit’ but he’s sympathetic to concerns

Dimon says Trump debanking lawsuit ‘has no merit’ but he’s sympathetic to concerns

March 2, 2026
Trump interrupts Iran war update to boast about his ballroom

Trump interrupts Iran war update to boast about his ballroom

March 2, 2026
Notable Monday Option Activity: DAKT, LITE, OKLO

Notable Monday Option Activity: DAKT, LITE, OKLO

March 2, 2026
MWC: All the News and New Gear at Mobile World Congress

MWC: All the News and New Gear at Mobile World Congress

March 2, 2026
How Child Labour Persists Along Zanzibar’s Blue Economy — Global Issues

How Child Labour Persists Along Zanzibar’s Blue Economy — Global Issues

March 2, 2026
Is RentAHuman the Future of Labor?

Is RentAHuman the Future of Labor?

March 2, 2026
Euro Times

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Finance
  • Health
  • Investing
  • Markets
  • Politics
  • Stock Market
  • Technology
  • Uncategorized
  • World

LATEST UPDATES

Dimon says Trump debanking lawsuit ‘has no merit’ but he’s sympathetic to concerns

Trump interrupts Iran war update to boast about his ballroom

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2022 - Euro Times.
Euro Times is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Finance
  • Business
  • World
  • Politics
  • Markets
  • Stock Market
  • Cryptocurrency
  • Investing
  • Health
  • Technology

Copyright © 2022 - Euro Times.
Euro Times is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In