🚀 Gate Square Creator Certification Incentive Program Is Live!
Join Gate Square and share over $10,000 in monthly creator rewards!
Whether you’re an active Gate Square creator or an established voice on another platform, consistent quality content can earn you token rewards, exclusive Gate merch, and massive traffic exposure!
✅ Eligibility:
You can apply if you meet any of the following:
1️⃣ Verified creator on another platform
2️⃣ At least 1,000 followers on a single platform (no combined total)
3️⃣ Gate Square certified creator meeting follower and engagement criteria
Click to apply now 👉
How to use ZK and VDF to realize the idea of "privacy mempool"?
Most of the current L2 Sequencers basically adopt the “first-in, first-out” (FIFS) transaction ordering method to protect users from MEV, but this also weakens the value of blocks.
And through this split Blockspace solution, we can have both fish and bear’s paw.
The specific process is: the user uses a “time puzzle” to encrypt his transaction, and at the same time calculates a “zk proof” to prove that the time puzzle “has a solution”, and then uses the “time puzzle” and the corresponding “Zk proof” Proof" and sent to “Sequencer”.
After the Sequencer receives the “encrypted transaction”:
! [scale70] (https://img-cdn.gateio.im/resized-social/moments-40baef27dd-430469c41e-dd1a6f-7649e1)
Summarize
By dividing “Blockspace” into two parts, user transactions can be protected in the “Top Blockspace”, and Mev Searcher can go to the “Bottom Blockspace” together, which protects user transactions from being hamful mev, and Sequencer can maximize the “block income”. However, this solution pays extra computational costs, mainly because users need to calculate a “zk proof” for their own time puzzles and Sequencer needs to solve the “time puzzles” provided by each user.
We can make a comparison with Arbitrum’s previous transaction ranking strategy that allows Mev Searcher to obtain the highest priority of 0.5s through higher bids. Compared with the scheme proposed in this paper, the Arbitrum method is characterized by:
Finally, by the way: The reason for “zk proof” is to prevent the sequencer from being attacked by DDOS.