{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T02:14:02Z","timestamp":1773022442841,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100000601","name":"De Montfort University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000601","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Batman University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"DOI":"10.1186\/s13638-024-02390-4","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T12:02:17Z","timestamp":1723550537000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption"],"prefix":"10.1186","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3768-0016","authenticated-orcid":false,"given":"Mustafa Ibrahim","family":"Alnajjar","sequence":"first","affiliation":[]},{"given":"Mehmet Sabir","family":"Kiraz","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Al-Bayatti","sequence":"additional","affiliation":[]},{"given":"Suleyman","family":"Kardas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"2390_CR1","unstructured":"S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system. Decentral. Bus. Rev. 21260 (2008)"},{"issue":"2014","key":"2390_CR2","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"G. Wood et al., Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Pap. 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Pap."},{"key":"2390_CR3","doi-asserted-by":"crossref","unstructured":"K. Kulkarni, T. Diamandis, T. Chitra Towards a theory of maximal extractable value i: Constant function market makers. arXiv preprint arXiv:2207.11835 (2022)","DOI":"10.1007\/978-3-031-48974-7_26"},{"key":"2390_CR4","unstructured":"Optimistic Rollups. https:\/\/ethereum.org\/en\/developers\/docs\/scaling\/optimistic-rollups\/. Accessed on 16 May 2024"},{"key":"2390_CR5","unstructured":"zkROLLUPS. https:\/\/ethereum.org\/en\/developers\/docs\/scaling\/zk-rollups\/. Accessed on 16 May 2024"},{"key":"2390_CR6","unstructured":"ZKSync: zkEVM. https:\/\/docs.zksync.io\/zk-stack\/components\/zkEVM\/overview.html#zkevm. Accessed on 16 May 2024"},{"key":"2390_CR7","doi-asserted-by":"crossref","unstructured":"A. Judmayer, N. Stifter, P. Schindler, E. Weippl, Estimating (miner) extractable value is hard, let\u2019s go shopping! In: International Conference on Financial Cryptography and Data Security, pp. 74\u201392 (2022). Springer","DOI":"10.1007\/978-3-031-32415-4_6"},{"key":"2390_CR8","unstructured":"Flashbots Auction. https:\/\/docs.flashbots.net\/flashbots-auction\/overview. Accessed on 16 May 2024"},{"key":"2390_CR9","unstructured":"Edennetwork: Multichain Infrastructure for Maximal Value. https:\/\/www.edennetwork.io\/. Accessed on 16 May 2024"},{"key":"2390_CR10","unstructured":"V. Buterin, Proto-Danksharding FAQ. https:\/\/notes.ethereum.org\/@vbuterin\/proto_danksharding_faq#What-is-Danksharding. Accessed on 16 May 2024"},{"key":"2390_CR11","doi-asserted-by":"crossref","unstructured":"P. Daian, S. Goldfeder, T. Kell, Y. Li, X. Zhao, I. Bentov, L. Breidenbach, A. Juels, Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 910\u2013927 (2020). IEEE","DOI":"10.1109\/SP40000.2020.00040"},{"key":"2390_CR12","unstructured":"M. Team, Introducing Themis Protocol v1. A solution to MEV for Application-Specific Blockchains. https:\/\/blog.mangata.finance\/blog\/2021-10-10-themis-protocol\/ (2021). Accessed on 16 May 2024"},{"key":"2390_CR13","unstructured":"R. Miller, MEV-SGX: A Sealed Bid MEV Auction Design. https:\/\/ethresear.ch\/t\/mev-sgx-a-sealed-bid-mev-auction-design\/9677 (2021). Accessed on 16 May 2024"},{"key":"2390_CR14","unstructured":"Ethereum Foundation: Danksharding. https:\/\/ethereum.org\/en\/roadmap\/danksharding\/. Accessed on 16 May 2024"},{"key":"2390_CR15","doi-asserted-by":"crossref","unstructured":"Q. Wang, R. Li, Q. Wang, S. Chen, Y. Xiang, Exploring unfairness on proof of authority: Order manipulation attacks and remedies. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 123\u2013137 (2022)","DOI":"10.1145\/3488932.3517394"},{"key":"2390_CR16","unstructured":"Ethereum Foundation: Clique PoA protocol & Rinkeby PoA testnet. https:\/\/github.com\/ethereum\/EIPs\/issues\/225. Accessed on 16 May 2024"},{"key":"2390_CR17","unstructured":"Ethereum Foundation: go-ethereum: Official Go implementation of the Ethereum protocol. https:\/\/geth.ethereum.org\/. Accessed on 16 May 2024"},{"key":"2390_CR18","unstructured":"S. De\u00a0Angelis, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone, Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain. Int. J. Emerg. Sci. Eng. (IJESE) (2018)"},{"key":"2390_CR19","doi-asserted-by":"crossref","unstructured":"P. Ekparinya, V. Gramoli, G. Jourjon, The attack of the clones against proof-of-authority. arXiv preprint arXiv:1902.10244 (2019)","DOI":"10.14722\/ndss.2020.24082"},{"key":"2390_CR20","unstructured":"H.K. Alper, BABE- Web3 Foundation. https:\/\/research.web3.foundation\/Polkadot\/protocols\/block-production\/Babe. Accessed on 16 May 2024"},{"key":"2390_CR21","doi-asserted-by":"crossref","unstructured":"P. Rogaway, T. Shrimpton, Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: International Workshop on Fast Software Encryption, pp. 371\u2013388. Springer (2004)","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"2390_CR22","doi-asserted-by":"publisher","unstructured":"H. Delfs, H. Knebl, Symmetric-Key Encryption, pp. 11\u201331. Springer, Berlin (2007). https:\/\/doi.org\/10.1007\/3-540-49244-5_2","DOI":"10.1007\/3-540-49244-5_2"},{"key":"2390_CR23","doi-asserted-by":"crossref","unstructured":"C. Paar, J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, Springer. Berlin (2009)","DOI":"10.1007\/978-3-642-04101-3"},{"issue":"5","key":"2390_CR24","first-page":"98","volume":"2","author":"A Shetty","year":"2014","unstructured":"A. Shetty, K. Shravya, K. Krithika, A review on asymmetric cryptography-rsa and elgamal algorithm. Int. J. Innov. Res. Comput. Commun. Eng. 2(5), 98\u2013105 (2014)","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"key":"2390_CR25","unstructured":"Cardano Foundation: Cardano. https:\/\/cardano.org\/. Accessed on 16 May 2024"},{"key":"2390_CR26","unstructured":"Ethereum Foundation: Ethereum Roadmap. https:\/\/ethereum.org\/en\/upgrades\/. Accessed on 16 May 2024"},{"key":"2390_CR27","doi-asserted-by":"crossref","unstructured":"A. Abidi, B. Bouallegue, F. Kahri, Implementation of elliptic curve digital signature algorithm (ecdsa). In: 2014 Global Summit on Computer & Information Technology (GSCIT), pp. 1\u20136 (2014). IEEE","DOI":"10.1109\/GSCIT.2014.6970118"},{"issue":"1","key":"2390_CR28","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1515\/JMC.2009.004","volume":"3","author":"G Neven","year":"2009","unstructured":"G. Neven, N.P. Smart, B. Warinschi, Hash function requirements for Schnorr signatures. J. Math. Cryptol. 3(1), 69\u201387 (2009)","journal-title":"J. Math. Cryptol."},{"issue":"4","key":"2390_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3460772","volume":"47","author":"D Blackman","year":"2021","unstructured":"D. Blackman, S. Vigna, Scrambled linear pseudorandom number generators. ACM Trans. Math. Softw. (TOMS) 47(4), 1\u201332 (2021)","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"key":"2390_CR30","unstructured":"D. Malkhi, P. Szalachowski, Maximal extractable value (mev) protection on a dag. arXiv preprint arXiv:2208.00940 (2023)"},{"issue":"9","key":"2390_CR31","doi-asserted-by":"publisher","first-page":"3772","DOI":"10.1109\/TAC.2019.2950873","volume":"65","author":"P Ferraro","year":"2020","unstructured":"P. Ferraro, C. King, R. Shorten, On the stability of unverified transactions in a dag-based distributed ledger. IEEE Trans. Autom. Control 65(9), 3772\u20133783 (2020). https:\/\/doi.org\/10.1109\/TAC.2019.2950873","journal-title":"IEEE Trans. Autom. Control"},{"key":"2390_CR32","unstructured":"V. Costan, S. Devadas, Intel SGX Explained. Cryptology ePrint Archive, Paper 2016\/086. https:\/\/eprint.iacr.org\/2016\/086 (2016)"},{"key":"2390_CR33","doi-asserted-by":"publisher","unstructured":"A.C.-C. Yao, How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp. 162\u2013167 (1986). https:\/\/doi.org\/10.1109\/SFCS.1986.25","DOI":"10.1109\/SFCS.1986.25"},{"key":"2390_CR34","unstructured":"A. Ozdemir, D. Boneh, Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. Cryptology ePrint Archive, Paper 2021\/1530. https:\/\/eprint.iacr.org\/2021\/1530 (2021)"},{"key":"2390_CR35","doi-asserted-by":"publisher","unstructured":"D. Evans, V. Kolesnikov, M. Rosulek, A pragmatic introduction to secure multi-party computation. Found. Trends\u00ae Privacy Secur. 2(2-3), 70\u2013246 (2018). https:\/\/doi.org\/10.1561\/3300000019","DOI":"10.1561\/3300000019"},{"key":"2390_CR36","unstructured":"H.E. Edition, Crlist. https:\/\/notes.ethereum.org. Accessed on 16 May 2024"},{"issue":"5","key":"2390_CR37","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.3390\/s23052594","volume":"23","author":"K Rashid","year":"2023","unstructured":"K. Rashid, Y. Saeed, A. Ali, F. Jamil, R. Alkanhel, A. Muthanna, An adaptive real-time malicious node detection framework using machine learning in vehicular ad-hoc networks (vanets). Sensors 23(5), 2594 (2023)","journal-title":"Sensors"},{"issue":"11","key":"2390_CR38","doi-asserted-by":"publisher","first-page":"5259","DOI":"10.3390\/s23115259","volume":"23","author":"H Sohail","year":"2023","unstructured":"H. Sohail, M. Hassan, M. Elmagzoub, A. Rajab, K. Rajab, A. Ahmed, A. Shaikh, A. Ali, H. Jamil, Bbsf: Blockchain-based secure weather forecasting information through routing protocol in vanet. Sensors 23(11), 5259 (2023)","journal-title":"Sensors"},{"key":"2390_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104569","volume":"93","author":"A Ali","year":"2022","unstructured":"A. Ali, M.M. Iqbal, S. Jabbar, M.N. Asghar, U. Raza, F. Al-Turjman, Vablock: A blockchain-based secure communication in v2v network using icn network support technology. Microprocess. Microsyst. 93, 104569 (2022)","journal-title":"Microprocess. Microsyst."},{"key":"2390_CR40","unstructured":"Sharding. https:\/\/github.com\/ethereum\/wiki\/wiki\/Sharding-FAQs\/c54cf1b520b0bd07468bee6950cda9a2c4ab4982. Accessed on 16 May 2024"},{"key":"2390_CR41","unstructured":"Iota. https:\/\/www.iota.org\/foundation\/research-papers. Accessed on 16 May 2024"},{"issue":"1\u201310","key":"2390_CR42","first-page":"119","volume":"1","author":"S Johnson","year":"2016","unstructured":"S. Johnson, V. Scarlata, C. Rozas, E. Brickell, F. Mckeen et al., Intel software guard extensions: Epid provisioning and attestation services. White Pap. 1(1\u201310), 119 (2016)","journal-title":"White Pap."},{"issue":"2","key":"2390_CR43","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"2390_CR44","doi-asserted-by":"crossref","unstructured":"A.C. Yao, Protocols for secure computations. in: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160\u2013164 (1982). IEEE","DOI":"10.1109\/SFCS.1982.38"},{"key":"2390_CR45","doi-asserted-by":"publisher","unstructured":"K. Qin, L. Zhou, A. Gervais, Quantifying blockchain extractable value: How dark is the forest? in: 2022 IEEE Symposium on Security and Privacy (SP), pp. 198\u2013214 (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833734","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"2390_CR46","doi-asserted-by":"crossref","unstructured":"M. Bartoletti, J.H.-Y. Chiang, A. Lluch\u00a0Lafuente, Maximizing extractable value from automated market makers. in: Financial Cryptography and Data Security, pp. 3\u201319. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-18283-9_1"},{"key":"2390_CR47","unstructured":"J. Piet, J. Fairoze, N. Weaver, Extracting godl [sic] from the salt mines: Ethereum miners extracting value. arXiv preprint arXiv:2203.15930 (2023)"},{"key":"2390_CR48","unstructured":"P. Z\u00fcst, Analyzing and Preventing Sandwich Attacks in Ethereum. Bachelor\u2019s thesis, ETH Zurich (2021)"},{"key":"2390_CR49","unstructured":"Polkadot: Polkadot Network. https:\/\/polkadot.network\/. (Accessed on 16 May 2024)"},{"key":"2390_CR50","doi-asserted-by":"crossref","unstructured":"H. Morita, J.C. Schuldt, T. Matsuda, G. Hanaoka, T. Iwata, On the security of the schnorr signature scheme and dsa against related-key attacks. in: ICISC 2015, pp. 20\u201335 (2015). Springer","DOI":"10.1007\/978-3-319-30840-1_2"},{"key":"2390_CR51","doi-asserted-by":"crossref","unstructured":"J. Arndt, Generating random permutations. PhD thesis, Australian National University (2010). https:\/\/www.jjj.de\/pub\/arndt-rand-perm-thesis.pdf","DOI":"10.1007\/978-3-642-14764-7_10"},{"key":"2390_CR52","unstructured":"Mangata: Mangata Node. https:\/\/github.com\/mangata-finance\/mangata-node. Accessed on 16 May 2024"},{"key":"2390_CR53","unstructured":"Substrate: Consensus. https:\/\/docs.substrate.io\/fundamentals\/consensus. Accessed on 16 May 2024"},{"key":"2390_CR54","doi-asserted-by":"publisher","unstructured":"I.J. Scott, M. de Castro Neto, F.L. Pinheiro, Bringing trust and transparency to the opaque world of waste management with blockchain: A polkadot parathread application. Comput. Ind. Eng. 182 (2023). https:\/\/doi.org\/10.1016\/j.cie.2023.109347","DOI":"10.1016\/j.cie.2023.109347"},{"key":"2390_CR55","doi-asserted-by":"publisher","unstructured":"B. Kaliski, PKCS #7: Cryptographic Message Syntax Version 1.5. RFC Editor (1998). https:\/\/doi.org\/10.17487\/RFC2315 . https:\/\/www.rfc-editor.org\/info\/rfc2315","DOI":"10.17487\/RFC2315"},{"key":"2390_CR56","doi-asserted-by":"crossref","unstructured":"D. Pointcheval, 1. OAEP: Optimal Asymmetric Encryption Padding, pp. 443\u2013445. Springer, Boston, MA (2005)","DOI":"10.1007\/0-387-23483-7_284"},{"key":"2390_CR57","doi-asserted-by":"publisher","first-page":"13938","DOI":"10.1109\/ACCESS.2021.3051602","volume":"9","author":"S Singh","year":"2021","unstructured":"S. Singh, A.S.M.S. Hosen, B. Yoon, Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access 9, 13938\u201313959 (2021)","journal-title":"IEEE Access"},{"key":"2390_CR58","doi-asserted-by":"publisher","unstructured":"A. Bhudia, A. Cartwright, E. Cartwright, J. Hernandez-Castro, D. Hurley-Smith, Extortion of a staking pool in a proof-of-stake consensus mechanism. in: 2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS), pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/COINS54846.2022.9854946","DOI":"10.1109\/COINS54846.2022.9854946"},{"key":"2390_CR59","unstructured":"G. Fanti, L. Kogan, P. Viswanath, Economics of proof-of-stake payment systems. In: Working Paper, pp. 1\u20136 (2021)"},{"key":"2390_CR60","doi-asserted-by":"crossref","unstructured":"W. Li, S. Andreina, J.-M. Bohli, G. Karame, Securing proof-of-stake blockchain protocols. in: Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings, pp. 297\u2013315 (2017). Springer","DOI":"10.1007\/978-3-319-67816-0_17"},{"issue":"1","key":"2390_CR61","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1038\/s41598-024-51578-7","volume":"14","author":"K Venkatesan","year":"2024","unstructured":"K. Venkatesan, S.B. Rahayu, Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques. Sci. Rep. 14(1), 1149 (2024)","journal-title":"Sci. Rep."},{"key":"2390_CR62","doi-asserted-by":"crossref","unstructured":"J. Akinsola, M. Adeagbo, S. Akinseinde, F. Onipede, A. Yusuf, Applications of blockchain technology in cyber attacks prevention. in: Sustainable and Advanced Applications of Blockchain in Smart Computational Technologies, pp. 129\u2013159 (2022)","DOI":"10.1201\/9781003193425-9"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02390-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-024-02390-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02390-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T12:07:12Z","timestamp":1723550832000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-024-02390-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":62,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["2390"],"URL":"https:\/\/doi.org\/10.1186\/s13638-024-02390-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3311434\/v1","asserted-by":"object"}]},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"1 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"While the work was being carried out and a first draft of this paper was written, the authors had no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"62"}}