{"id":9067,"date":"2025-12-24T21:11:58","date_gmt":"2025-12-24T21:11:58","guid":{"rendered":"https:\/\/uplatz.com\/blog\/?p=9067"},"modified":"2025-12-24T21:11:58","modified_gmt":"2025-12-24T21:11:58","slug":"asynchronous-blockchains-designing-networks-that-never-wait-2","status":"publish","type":"post","link":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/","title":{"rendered":"Asynchronous Blockchains: Designing Networks That Never Wait"},"content":{"rendered":"<h2><b>Executive Summary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The history of distributed ledger technology is fundamentally a history of grappling with the constraints of time. In the quest to create decentralized networks that are secure, scalable, and decentralized, protocol designers have traditionally relied on the crutch of synchrony\u2014the assumption that messages sent between nodes will arrive within a predictable timeframe. This reliance on &#8220;waiting&#8221; for timeouts, for block propagation, or for leader stability has been the primary bottleneck preventing blockchains from achieving the throughput and latency required for global-scale financial infrastructure. This report provides an exhaustive analysis of the paradigm shift toward <\/span><b>Asynchronous Byzantine Fault Tolerance (ABFT)<\/b><span style=\"font-weight: 400;\">, a class of protocols designed to operate correctly without global clocks or bounded message delays.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By decoupling data dissemination from consensus ordering and leveraging novel data structures like <\/span><b>Directed Acyclic Graphs (DAGs)<\/b><span style=\"font-weight: 400;\">, asynchronous blockchains such as <\/span><b>Sui<\/b><span style=\"font-weight: 400;\">, <\/span><b>Aleph Zero<\/b><span style=\"font-weight: 400;\">, <\/span><b>Fantom<\/b><span style=\"font-weight: 400;\">, and <\/span><b>Hedera<\/b><span style=\"font-weight: 400;\"> have demonstrated the ability to process hundreds of thousands of transactions per second with sub-second finality. We explore the theoretical underpinnings of this shift, tracing the evolution from the <\/span><b>FLP Impossibility Theorem<\/b><span style=\"font-weight: 400;\"> to the breakthrough of <\/span><b>HoneyBadgerBFT<\/b><span style=\"font-weight: 400;\">, and finally to the modern modular architectures of <\/span><b>Narwhal<\/b><span style=\"font-weight: 400;\">, <\/span><b>Tusk<\/b><span style=\"font-weight: 400;\">, and <\/span><b>Mysticeti<\/b><span style=\"font-weight: 400;\">. The analysis reveals that true scalability lies in networks that &#8220;never wait,&#8221; replacing latency constraints with bandwidth constraints and utilizing advanced cryptographic primitives like <\/span><b>threshold signatures<\/b><span style=\"font-weight: 400;\"> and <\/span><b>random beacons<\/b><span style=\"font-weight: 400;\"> to achieve coordination in chaos.<\/span><\/p>\n<h2><b>1. Introduction: The Synchronization Bottleneck<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In the domain of distributed systems, time is the enemy. The fundamental challenge of achieving consensus among a distributed set of potentially malicious (Byzantine) nodes is coordination. How do distinct computers, separated by oceans and unreliable networks, agree on the order of events? The classical solution, employed by Bitcoin and early Proof-of-Stake systems, is to impose a temporal structure on the network. These systems operate in lockstep, governed by a &#8220;synchronous&#8221; or &#8220;partially synchronous&#8221; model where progress depends on the assumption that messages will be delivered within a specific bound, denoted as $\\Delta$.<\/span><span style=\"font-weight: 400;\">1<\/span><\/p>\n<h3><b>1.1 The Cost of Waiting<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In a synchronous protocol, if a node does not receive a message within $\\Delta$, it assumes the sender is faulty. This creates a dangerous dependency. To ensure safety, $\\Delta$ must be set conservatively (e.g., 10 seconds), which artificially limits the speed of the network to the worst-case latency of the slowest link. If the network is faster than $\\Delta$, the protocol sits idle, wasting potential throughput. Conversely, if the network experiences a partition or a Distributed Denial of Service (DDoS) attack and delays exceed $\\Delta$, the protocol&#8217;s security guarantees can collapse, leading to forks or double-spending.<\/span><span style=\"font-weight: 400;\">2<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This &#8220;waiting&#8221; paradigm introduces a fundamental vulnerability. Leader-based protocols like PBFT (Practical Byzantine Fault Tolerance) or HotStuff (used in Aptos) rely on a specific leader node to drive consensus. If an adversary attacks the leader, the network effectively halts until a timeout triggers a complex &#8220;view-change&#8221; to elect a new leader. This fragility makes synchronous networks inherently susceptible to performance degradation in adversarial environments.<\/span><span style=\"font-weight: 400;\">3<\/span><\/p>\n<h3><b>1.2 The Asynchronous Alternative<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Asynchronous blockchains reject these timing assumptions entirely. In an asynchronous model, the adversary can delay messages indefinitely (though they must eventually be delivered). There is no global clock, and nodes cannot rely on timeouts to determine failure. A protocol designed for this environment must be &#8220;ready for anything,&#8221; capable of making progress regardless of network conditions. These networks &#8220;never wait&#8221; for a specific time bound; they proceed at the speed of the actual network, processing transactions as fast as bandwidth allows.<\/span><span style=\"font-weight: 400;\">1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Designing for asynchrony is notoriously difficult due to the <\/span><b>FLP Impossibility Theorem<\/b><span style=\"font-weight: 400;\">, which states that deterministic consensus is impossible in a purely asynchronous system with even a single crash fault.<\/span><span style=\"font-weight: 400;\">5<\/span><span style=\"font-weight: 400;\"> However, modern cryptographic breakthroughs have allowed researchers to circumvent this barrier using randomization and DAG-based structures, leading to a new generation of high-performance protocols.<\/span><\/p>\n<h2><b>2. Theoretical Foundations and the FLP Impossibility<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To fully appreciate the architecture of modern asynchronous blockchains, one must first navigate the theoretical constraints that governed their development.<\/span><\/p>\n<h3><b>2.1 The FLP Impossibility Theorem (1985)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The most significant hurdle in distributed computing theory is the result published by Fischer, Lynch, and Paterson (FLP). They proved that in an asynchronous system where nodes can fail (even without malicious intent), there exists no <\/span><b>deterministic<\/b><span style=\"font-weight: 400;\"> protocol that can guarantee consensus in finite time.<\/span><span style=\"font-weight: 400;\">1<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The core of the proof lies in the inability to distinguish between a crashed node and a slow node. In an asynchronous network, if a node is silent, the other nodes cannot know if it has failed or if its messages are merely delayed. A deterministic protocol, forced to wait for input to make a decision, could potentially be stalled indefinitely by an adversary who manipulates message scheduling to keep the system in an indecisive state.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This theorem implies that any practical asynchronous protocol must relax one of the core requirements of consensus:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Safety:<\/b><span style=\"font-weight: 400;\"> All honest nodes agree on the same value.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Liveness:<\/b><span style=\"font-weight: 400;\"> The system eventually reaches a decision.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Determinism:<\/b><span style=\"font-weight: 400;\"> The protocol always produces the same output for a given input.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Asynchronous blockchains typically sacrifice <\/span><b>determinism<\/b><span style=\"font-weight: 400;\"> in favor of <\/span><b>randomization<\/b><span style=\"font-weight: 400;\">. By introducing a source of randomness (like a coin flip), the system can break symmetry and force a decision with probability 1, thus circumventing the FLP result while maintaining both safety and liveness.<\/span><span style=\"font-weight: 400;\">1<\/span><\/p>\n<h3><b>2.2 Synchrony vs. Asynchrony: A Taxonomy of Time<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The distinction between timing models is the defining characteristic of blockchain architecture.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Synchronous Model:<\/b><span style=\"font-weight: 400;\"> Assumes a known, finite upper bound ($\\Delta$) on message transmission. If a message is sent at time $t$, it <\/span><i><span style=\"font-weight: 400;\">must<\/span><\/i><span style=\"font-weight: 400;\"> arrive by $t+\\Delta$. This is the easiest model to design for but the most brittle in practice. If the assumption is violated (e.g., due to a network outage), safety is compromised.<\/span><span style=\"font-weight: 400;\">2<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Partially Synchronous Model:<\/b><span style=\"font-weight: 400;\"> A &#8220;sweet spot&#8221; used by most modern chains (Cosmos, Aptos, Solana). It assumes the network may be asynchronous for an unknown period, but eventually, there will be a <\/span><b>Global Stabilization Time (GST)<\/b><span style=\"font-weight: 400;\"> after which the network behaves synchronously with a bound $\\Delta$. These protocols guarantee safety always (even during asynchrony) but only guarantee liveness (progress) after GST. The downside is that during the asynchronous period, the chain stops finalizing blocks.<\/span><span style=\"font-weight: 400;\">3<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Asynchronous Model:<\/b><span style=\"font-weight: 400;\"> Makes no assumptions about time. Messages can be delayed arbitrarily. Protocols in this model guarantee both safety and liveness regardless of network timing. This makes them incredibly robust against DDoS attacks and network partitions, as they do not rely on leaders or timeouts.<\/span><span style=\"font-weight: 400;\">1<\/span><\/li>\n<\/ul>\n<h3><b>2.3 The CAP Theorem Context<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">While often conflated, the FLP result is distinct from the CAP Theorem (Consistency, Availability, Partition Tolerance). In the context of blockchains, &#8220;Consistency&#8221; maps to Safety, and &#8220;Availability&#8221; maps to Liveness. The CAP theorem states that during a network partition, a system must choose between being safe (consistent) or live (available). Asynchronous BFT protocols generally prioritize <\/span><b>Consistency<\/b><span style=\"font-weight: 400;\"> (Safety) \u2014 they will never confirm conflicting transactions \u2014 but they achieve <\/span><b>Availability<\/b><span style=\"font-weight: 400;\"> (Liveness) through randomization techniques that allow them to recover from partitions without manual intervention.<\/span><span style=\"font-weight: 400;\">3<\/span><\/p>\n<h2><b>3. The Pioneer: HoneyBadgerBFT and the Era of Randomization<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The transition from theoretical possibility to practical implementation began with <\/span><b>HoneyBadgerBFT (HBBFT)<\/b><span style=\"font-weight: 400;\">, the first asynchronous BFT protocol designed to be practical for cryptocurrency applications.<\/span><\/p>\n<h3><b>3.1 Breaking the Leader Paradigm<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Traditional BFT protocols like PBFT rely on a leader to propose a block and drive consensus. This leader is a bottleneck; if the leader is slow, the whole network is slow. If the leader is malicious, they can censor transactions. HoneyBadgerBFT introduced a leaderless architecture where nodes push transactions concurrently.<\/span><span style=\"font-weight: 400;\">8<\/span><\/p>\n<h3><b>3.2 The Asynchronous Common Subset (ACS)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The core primitive of HBBFT is the <\/span><b>Asynchronous Common Subset (ACS)<\/b><span style=\"font-weight: 400;\">. The goal is for all nodes to agree on a set of transactions to include in the next block, without caring about the order initially.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Reliable Broadcast (RBC):<\/b><span style=\"font-weight: 400;\"> Each node proposes a batch of transactions. It uses an erasure-coding scheme (like AVID) to break the batch into fragments and scatter them across the network. This ensures that the data is available without requiring every node to download the full batch from the sender, optimizing bandwidth.<\/span><span style=\"font-weight: 400;\">10<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Binary Agreement (BA):<\/b><span style=\"font-weight: 400;\"> For each proposed batch, nodes run a binary agreement protocol to decide &#8220;Yes&#8221; or &#8220;No&#8221; on whether to include it in the final set.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Common Coin:<\/b><span style=\"font-weight: 400;\"> To resolve split votes in the Binary Agreement phase (where half say Yes, half say No), HBBFT uses a <\/span><b>Common Coin<\/b><span style=\"font-weight: 400;\">. This is a cryptographic primitive where nodes collectively generate a random bit. If the vote is deadlocked, the Common Coin flips, and everyone adopts the random value. This breaks the FLP stall.<\/span><span style=\"font-weight: 400;\">10<\/span><\/li>\n<\/ol>\n<h3><b>3.3 Threshold Encryption for Censorship Resistance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A critical innovation in HBBFT is the use of <\/span><b>Threshold Encryption<\/b><span style=\"font-weight: 400;\">. In a standard blockchain, a leader can see the contents of a transaction before ordering it, allowing them to extract <\/span><b>Maximal Extractable Value (MEV)<\/b><span style=\"font-weight: 400;\"> or censor specific users. In HBBFT, transactions are encrypted by the user. The nodes agree on the <\/span><i><span style=\"font-weight: 400;\">encrypted<\/span><\/i><span style=\"font-weight: 400;\"> batches first. Only after the order is finalized do the nodes decrypt the batch using their threshold keys. This makes it impossible to censor transactions based on their content, as the content is unknown until it is too late to change the order.<\/span><span style=\"font-weight: 400;\">8<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While HBBFT proved that asynchronous BFT was possible, it was computationally expensive and had high latency due to the multiple rounds of Binary Agreement required for every batch. This led researchers to look for more efficient structures, eventually converging on the Directed Acyclic Graph (DAG).<\/span><span style=\"font-weight: 400;\">12<\/span><\/p>\n<h2><b>4. The DAG Revolution: From Chains to Graphs<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To overcome the throughput limitations of linear blockchains and the latency of early asynchronous protocols, the industry shifted toward <\/span><b>Directed Acyclic Graphs (DAGs)<\/b><span style=\"font-weight: 400;\">. In a linear blockchain, blocks form a single line, meaning blocks must be produced sequentially. In a DAG, blocks (or events) can be produced in parallel and reference multiple previous blocks, forming a braided web of history.<\/span><span style=\"font-weight: 400;\">13<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This structure is naturally suited for asynchrony. Since nodes don&#8217;t need to agree on a single &#8220;tip&#8221; of the chain before creating the next block, they can work concurrently. The challenge then becomes post-hoc ordering: how to take this tangled graph and flatten it into a linear sequence of transactions that every node agrees on.<\/span><\/p>\n<h3><b>4.1 Comparison: Blockchain vs. DAG<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td><b>Feature<\/b><\/td>\n<td><b>Linear Blockchain<\/b><\/td>\n<td><b>DAG (BlockDAG)<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Structure<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Single chain of blocks.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Graph of interconnected blocks\/events.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Block Production<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Sequential (one leader at a time).<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Parallel (multiple leaders\/nodes at once).<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Consensus<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Agreement required <\/span><i><span style=\"font-weight: 400;\">before<\/span><\/i><span style=\"font-weight: 400;\"> block is added.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Agreement often derived <\/span><i><span style=\"font-weight: 400;\">after<\/span><\/i><span style=\"font-weight: 400;\"> via graph structure.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Throughput<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Limited by block size and interval.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Limited primarily by network bandwidth.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Orphans<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Stale blocks are discarded (wasteful).<\/span><\/td>\n<td><span style=\"font-weight: 400;\">&#8220;Orphans&#8221; are referenced and included (efficient).<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><b>5. Case Study: Hedera Hashgraph<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Hedera Hashgraph serves as a prime example of a &#8220;pure&#8221; DAG-based consensus that leverages the graph structure itself to achieve ABFT without the heavy message overhead of HBBFT.<\/span><\/p>\n<h3><b>5.1 Gossip about Gossip<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The foundation of Hashgraph is a communication protocol called Gossip about Gossip. In a standard gossip protocol, Node A tells Node B &#8220;Here is a transaction.&#8221; In Hashgraph, Node A tells Node B &#8220;Here is a transaction, and here is the time I received it, and here are the two events (one from me, one from someone else) that preceded it.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When this information propagates, it builds a cryptographically secure data structure (the Hashgraph) on every node. This graph depicts not just the transactions, but the history of communication itself. Each node knows exactly who talked to whom and when.15<\/span><\/p>\n<h3><b>5.2 Virtual Voting: The Zero-Bandwidth Consensus<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The brilliance of Hashgraph lies in Virtual Voting. Because every node possesses a copy of the Hashgraph, Node A can inspect the graph and calculate what Node B knows. Node A can determine, &#8220;If I were to send a vote to Node B right now, what would they see?&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since Node A can mathematically deduce Node B&#8217;s perspective, there is no need to actually send a vote over the network. Every node runs the voting algorithm locally on their own machine, feeding it the data from the Hashgraph. They reach the exact same conclusion without exchanging a single byte of voting data. This effectively reduces the bandwidth cost of consensus to zero (overhead is only the transactions and gossip structure).17<\/span><\/p>\n<h3><b>5.3 Famous Witnesses and Fairness<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To establish a total order, Hashgraph uses <\/span><b>Famous Witnesses<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The Hashgraph is divided into &#8220;rounds.&#8221; The first event a node creates in a round is a <\/span><b>Witness<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Nodes determine if a Witness is &#8220;Famous&#8221; by checking if it is &#8220;seen&#8221; by the majority of Witnesses in the next round. This &#8220;seeing&#8221; is calculated using the graph&#8217;s connectivity (strongly seeing).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Once the Famous Witnesses are identified, they act as anchors. The system calculates the &#8220;consensus timestamp&#8221; of every transaction based on when the Famous Witnesses received it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The result is a <\/span><b>Fair Timestamp<\/b><span style=\"font-weight: 400;\">: the median time that the network received a transaction. This prevents a leader from arbitrarily manipulating timestamps or ordering.<\/span><span style=\"font-weight: 400;\">17<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Hashgraph achieves ABFT, is resistant to DDoS (no leader), and offers extremely high throughput (10,000+ TPS) with low latency (3-5 seconds). However, it operates in a permissioned (governing council) mode for public networks, which distinguishes it from permissionless implementations like Fantom.<\/span><span style=\"font-weight: 400;\">11<\/span><\/p>\n<h2><b>6. Case Study: Fantom and Lachesis<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Fantom utilizes a consensus mechanism called <\/span><b>Lachesis<\/b><span style=\"font-weight: 400;\">, which, like Hashgraph, is a leaderless, DAG-based aBFT protocol, but it employs different algorithms to achieve finality.<\/span><span style=\"font-weight: 400;\">20<\/span><\/p>\n<h3><b>6.1 The OPERA Chain<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In Fantom, nodes construct a local DAG called the <\/span><b>OPERA Chain<\/b><span style=\"font-weight: 400;\">. Each node creates &#8220;event blocks&#8221; containing transactions and references to previous event blocks (one self-parent and one other-parent). This structure captures the causal relationship of events.<\/span><span style=\"font-weight: 400;\">22<\/span><\/p>\n<h3><b>6.2 Clotho and Atropos: The Election Mechanism<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Lachesis distills the complex DAG into a simpler structure for ordering:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Roots:<\/b><span style=\"font-weight: 400;\"> Events that are known by a supermajority ($2\/3$) of nodes are flagged as &#8220;Roots.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Clotho:<\/b><span style=\"font-weight: 400;\"> As the DAG grows, specific Roots are promoted to <\/span><b>Clotho<\/b><span style=\"font-weight: 400;\"> status. A Clotho is a Root that is acknowledged by a supermajority of other Roots. These act as checkpoints in the DAG.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Atropos:<\/b><span style=\"font-weight: 400;\"> The final stage is the selection of an <\/span><b>Atropos<\/b><span style=\"font-weight: 400;\"> from the Clotho candidates. The Atropos blocks form the &#8220;Main Chain&#8221; of the network. Once an Atropos is finalized, all transactions in its past cone are finalized.<\/span><span style=\"font-weight: 400;\">20<\/span><\/li>\n<\/ol>\n<h3><b>6.3 Finality and Performance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Lachesis enables Fantom to achieve <\/span><b>absolute finality<\/b><span style=\"font-weight: 400;\"> in 1-2 seconds. Unlike probabilistic finality (where a transaction becomes &#8220;more&#8221; secure over time, like in Bitcoin), once an Atropos is selected, the history is immutable. This speed, combined with the ability to process thousands of TPS, makes it suitable for high-frequency DeFi applications. The leaderless nature ensures that there is no single point of failure for DDoS attacks.<\/span><span style=\"font-weight: 400;\">24<\/span><\/p>\n<h2><b>7. Case Study: Aleph Zero and AlephBFT<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Aleph Zero represents a hybrid approach, combining the speed of DAGs with the structured security of a rotating committee, integrated with privacy-preserving technologies.<\/span><span style=\"font-weight: 400;\">26<\/span><\/p>\n<h3><b>7.1 AlephBFT Mechanics<\/b><\/h3>\n<p><b>AlephBFT<\/b><span style=\"font-weight: 400;\"> is a peer-reviewed consensus protocol presented at the AFT 2019 conference. It builds a DAG where units (blocks) are created by committee members.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Committee:<\/b><span style=\"font-weight: 400;\"> Unlike pure gossip protocols where every node talks to every node (which scales poorly to thousands of nodes), Aleph Zero selects a rotating committee of validators to construct the DAG.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Asynchronous Operation:<\/b><span style=\"font-weight: 400;\"> The creation of the DAG is asynchronous. Validators emit units as fast as possible.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ordering:<\/b><span style=\"font-weight: 400;\"> Once the DAG is formed, the protocol applies a deterministic algorithm to extract a linear ordering. This allows AlephBFT to tolerate asynchronous conditions (safety) while optimizing for speed.<\/span><span style=\"font-weight: 400;\">27<\/span><\/li>\n<\/ul>\n<h3><b>7.2 Privacy: The &#8220;Liminal&#8221; Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A key differentiator for Aleph Zero is its focus on privacy. It integrates <\/span><b>Secure Multi-Party Computation (sMPC)<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Zero-Knowledge Proofs (ZK-SNARKs)<\/b><span style=\"font-weight: 400;\"> into the platform. This allows for &#8220;private smart contracts&#8221; where the global state is updated without revealing the input data of individual users. This is particularly relevant for institutional use cases requiring compliance (ZK-ID) and confidentiality.<\/span><span style=\"font-weight: 400;\">28<\/span><\/p>\n<h2><b>8. The Modern Modular Stack: Narwhal, Tusk, and Mysticeti<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The most significant recent evolution in asynchronous blockchains is the architectural decoupling of <\/span><b>transaction dissemination<\/b><span style=\"font-weight: 400;\"> (making data available) from <\/span><b>transaction ordering<\/b><span style=\"font-weight: 400;\"> (consensus). This modular approach, pioneered by the <\/span><b>Narwhal<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Tusk<\/b><span style=\"font-weight: 400;\"> papers and adopted by the <\/span><b>Sui<\/b><span style=\"font-weight: 400;\"> blockchain, represents the state-of-the-art.<\/span><span style=\"font-weight: 400;\">30<\/span><\/p>\n<h3><b>8.1 Narwhal: The High-Performance Mempool<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In traditional blockchains, the &#8220;mempool&#8221; (memory pool of unconfirmed transactions) is a chaotic waiting room. Narwhal transforms the mempool into a structured, reliable data store.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Workers:<\/b><span style=\"font-weight: 400;\"> Each validator runs multiple &#8220;worker&#8221; processes. These workers ingest transactions, batch them, and broadcast them to workers on other nodes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Proofs of Availability:<\/b><span style=\"font-weight: 400;\"> When a worker receives a batch, it signs it and sends the signature back. Once a batch has $2f+1$ signatures (a quorum), a <\/span><b>Certificate<\/b><span style=\"font-weight: 400;\"> is created. This certificate is a cryptographic proof that the data is available on the network.<\/span><span style=\"font-weight: 400;\">32<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The DAG of Certificates:<\/b><span style=\"font-weight: 400;\"> The consensus engine <\/span><i><span style=\"font-weight: 400;\">never sees the raw transactions<\/span><\/i><span style=\"font-weight: 400;\">. It only sees the Certificates. Narwhal builds a DAG of these certificates. This means the heavy lifting (bandwidth) is done by the workers, while the consensus engine (CPU) only processes tiny metadata headers. This allows the network to scale linearly with bandwidth.<\/span><span style=\"font-weight: 400;\">34<\/span><\/li>\n<\/ul>\n<h3><b>8.2 Tusk: Zero-Message Overhead Consensus<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Tusk is the consensus component designed to sit on top of Narwhal. It is a &#8220;Zero-Message Overhead&#8221; protocol.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mechanism:<\/b><span style=\"font-weight: 400;\"> Tusk looks at the DAG of certificates built by Narwhal. Because the DAG is causally linked, Tusk can run a randomized algorithm (using a shared coin) to agree on a total ordering of the batches <\/span><i><span style=\"font-weight: 400;\">without sending any extra consensus messages<\/span><\/i><span style=\"font-weight: 400;\">. The communication for consensus is effectively piggybacked on the data dissemination.<\/span><span style=\"font-weight: 400;\">31<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Resilience:<\/b><span style=\"font-weight: 400;\"> Tusk is fully asynchronous and leaderless. It maintains high throughput (160,000+ TPS) even when the network is under attack or failing, making it one of the most robust protocols in existence.<\/span><span style=\"font-weight: 400;\">4<\/span><\/li>\n<\/ul>\n<h3><b>8.3 Bullshark: Optimizing for Partial Synchrony<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">While Tusk is robust, researchers noted that real-world networks are synchronous 99% of the time. <\/span><b>Bullshark<\/b><span style=\"font-weight: 400;\"> was developed to optimize Narwhal for the &#8220;happy path&#8221; (partial synchrony).<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Fast Path:<\/b><span style=\"font-weight: 400;\"> Bullshark introduces a &#8220;Fast Path&#8221; that allows the network to commit blocks quickly when the network is stable, using a simplified voting mechanism.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Fallback:<\/b><span style=\"font-weight: 400;\"> If the network becomes asynchronous (bad conditions), it falls back to a slower but safe mechanism. This trade-off allowed Bullshark to achieve lower latency than Tusk in good conditions, though it introduced some complexity regarding garbage collection of old blocks.<\/span><span style=\"font-weight: 400;\">35<\/span><\/li>\n<\/ul>\n<h3><b>8.4 Mysticeti: The Lower Bound of Latency (Sui)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In 2024, Sui upgraded from Bullshark to <\/span><b>Mysticeti<\/b><span style=\"font-weight: 400;\">, pushing the boundaries of DAG-based consensus further.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Latency Problem:<\/b><span style=\"font-weight: 400;\"> Previous DAG protocols (Narwhal) required &#8220;Certified&#8221; blocks. To create a block, you had to broadcast it, wait for signatures, and creating a Certificate. This added round-trip times (RTTs).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Uncertified DAGs:<\/b><span style=\"font-weight: 400;\"> Mysticeti allows the DAG to be built from &#8220;Uncertified&#8221; blocks. Validators can propose blocks without waiting for a full quorum of signatures first. The consensus logic (safety checks) is applied <\/span><i><span style=\"font-weight: 400;\">post-hoc<\/span><\/i><span style=\"font-weight: 400;\"> on the graph structure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>3-Round Commit:<\/b><span style=\"font-weight: 400;\"> Mysticeti achieves consensus in just 3 message rounds, which is the theoretical lower bound for BFT. This reduced Sui&#8217;s consensus latency to ~390ms on testnets, an 80% improvement over Bullshark.<\/span><span style=\"font-weight: 400;\">37<\/span><\/li>\n<\/ul>\n<h2><b>9. Comparative Analysis: Asynchronous vs. Synchronous Leaders<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To contextualize the performance of asynchronous chains, we must compare them to the leading synchronous\/partially synchronous competitors: <\/span><b>Aptos<\/b><span style=\"font-weight: 400;\">, <\/span><b>Solana<\/b><span style=\"font-weight: 400;\">, and <\/span><b>Avalanche<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>9.1 Aptos (Block-STM &amp; HotStuff)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Aptos uses a derivative of <\/span><b>HotStuff<\/b><span style=\"font-weight: 400;\"> (AptosBFT), a partially synchronous, leader-based protocol.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mechanism:<\/b><span style=\"font-weight: 400;\"> Leaders rotate. The current leader proposes a block, and validators vote. If the leader fails, a new one is elected (wait for timeout).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Parallel Execution:<\/b><span style=\"font-weight: 400;\"> Aptos shines in <\/span><i><span style=\"font-weight: 400;\">execution<\/span><\/i><span style=\"font-weight: 400;\">. Its <\/span><b>Block-STM<\/b><span style=\"font-weight: 400;\"> engine allows transactions to be executed in parallel <\/span><i><span style=\"font-weight: 400;\">optimistically<\/span><\/i><span style=\"font-weight: 400;\">. If there is a conflict, the transaction is re-executed. This yields massive throughput (160k TPS).<\/span><span style=\"font-weight: 400;\">40<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Comparison:<\/b><span style=\"font-weight: 400;\"> While Aptos matches Sui in throughput due to parallel execution, its consensus layer is more brittle. A DDoS attack on the Aptos leader can degrade performance, whereas Sui\/Mysticeti has no single leader to attack.<\/span><span style=\"font-weight: 400;\">42<\/span><\/li>\n<\/ul>\n<h3><b>9.2 Solana (Proof of History)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Solana uses <\/span><b>Proof of History (PoH)<\/b><span style=\"font-weight: 400;\">, a unique clock-based mechanism.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mechanism:<\/b><span style=\"font-weight: 400;\"> Validators hash a sequence of events to prove time passage. The schedule of leaders is known in advance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vulnerability:<\/b><span style=\"font-weight: 400;\"> Because the leader schedule is deterministic and known, attackers can target the next leader with DDoS traffic just as they are about to propose. This has contributed to Solana&#8217;s historical instability\/outages compared to the theoretically unstoppable asynchronous networks.<\/span><span style=\"font-weight: 400;\">43<\/span><\/li>\n<\/ul>\n<h3><b>9.3 Avalanche (Snowman)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Avalanche uses a <\/span><b>Metastable<\/b><span style=\"font-weight: 400;\"> consensus mechanism based on repeated random sampling.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mechanism:<\/b><span style=\"font-weight: 400;\"> Nodes ask a small random set of peers for their preference. This creates a feedback loop where the network rapidly tips toward one color (decision).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Asynchrony:<\/b><span style=\"font-weight: 400;\"> While not BFT in the traditional sense (it is probabilistic), Avalanche is highly resilient and fast. It builds a DAG (X-Chain) but linearizes it (C-Chain) for smart contracts. It shares the &#8220;leaderless&#8221; benefit of ABFT protocols.<\/span><span style=\"font-weight: 400;\">45<\/span><\/li>\n<\/ul>\n<h3><b>9.4 Performance Matrix (2025 Data)<\/b><\/h3>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Feature<\/b><\/td>\n<td><b>Sui (Mysticeti)<\/b><\/td>\n<td><b>Hedera (Hashgraph)<\/b><\/td>\n<td><b>Fantom (Lachesis)<\/b><\/td>\n<td><b>Aleph Zero<\/b><\/td>\n<td><b>Aptos<\/b><\/td>\n<td><b>Solana<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Consensus<\/b><\/td>\n<td><span style=\"font-weight: 400;\">DAG (Uncertified)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DAG (Virtual Voting)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DAG (Clotho\/Atropos)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DAG (Rotating Committee)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">HotStuff (Leader)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">PoH (Leader)<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Model<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Partial\/Async<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Asynchronous<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Asynchronous<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Asynchronous<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Partial Sync<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Partial Sync<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Latency<\/b><\/td>\n<td><span style=\"font-weight: 400;\">~390ms <\/span><span style=\"font-weight: 400;\">39<\/span><\/td>\n<td><span style=\"font-weight: 400;\">2-5s <\/span><span style=\"font-weight: 400;\">16<\/span><\/td>\n<td><span style=\"font-weight: 400;\">1-2s <\/span><span style=\"font-weight: 400;\">24<\/span><\/td>\n<td><span style=\"font-weight: 400;\">~0.9s <\/span><span style=\"font-weight: 400;\">28<\/span><\/td>\n<td><span style=\"font-weight: 400;\">&lt;1s <\/span><span style=\"font-weight: 400;\">47<\/span><\/td>\n<td><span style=\"font-weight: 400;\">~0.4s (Block)<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Max TPS<\/b><\/td>\n<td><span style=\"font-weight: 400;\">297,000 <\/span><span style=\"font-weight: 400;\">48<\/span><\/td>\n<td><span style=\"font-weight: 400;\">3,300+ <\/span><span style=\"font-weight: 400;\">49<\/span><\/td>\n<td><span style=\"font-weight: 400;\">~181 (Real) <\/span><span style=\"font-weight: 400;\">50<\/span><\/td>\n<td><span style=\"font-weight: 400;\">100,000 (Theor.) <\/span><span style=\"font-weight: 400;\">51<\/span><\/td>\n<td><span style=\"font-weight: 400;\">160,000 <\/span><span style=\"font-weight: 400;\">40<\/span><\/td>\n<td><span style=\"font-weight: 400;\">65,000 <\/span><span style=\"font-weight: 400;\">43<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>DDoS Resilience<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Very High<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Very High<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Very High<\/span><\/td>\n<td><span style=\"font-weight: 400;\">High<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Medium<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Low<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><b>10. Cryptographic Engines of Asynchrony<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The magic of &#8220;never waiting&#8221; is powered by specific cryptographic primitives that replace the coordination role of time.<\/span><\/p>\n<h3><b>10.1 Threshold Signatures (BLS)<\/b><\/h3>\n<p><b>Boneh-Lynn-Shacham (BLS)<\/b><span style=\"font-weight: 400;\"> signatures are the workhorse of modern BFT. They allow signature <\/span><b>aggregation<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Why it matters:<\/b><span style=\"font-weight: 400;\"> In a network with 1,000 validators, sending 1,000 signatures for every block would crush the bandwidth. BLS allows all 1,000 signatures to be compressed into a single, constant-sized signature. This is essential for the <\/span><b>Certificates<\/b><span style=\"font-weight: 400;\"> in Narwhal and Mysticeti, allowing quorums to be proven efficiently.<\/span><span style=\"font-weight: 400;\">52<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mechanism:<\/b><span style=\"font-weight: 400;\"> Based on bilinear pairings over elliptic curves ($e: G_1 \\times G_2 \\rightarrow G_T$). The &#8220;uniqueness&#8221; property of BLS is also crucial\u2014for a given message and key, there is only one valid signature, which prevents malleability attacks.<\/span><span style=\"font-weight: 400;\">53<\/span><\/li>\n<\/ul>\n<h3><b>10.2 Random Beacons and Common Coins<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To solve the FLP &#8220;deadlock&#8221; (where the network can&#8217;t decide between A and B), asynchronous protocols use <\/span><b>Random Beacons<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Drand:<\/b><span style=\"font-weight: 400;\"> A distributed service that pulses random numbers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Common Coin:<\/b><span style=\"font-weight: 400;\"> A protocol where nodes contribute &#8220;shares&#8221; of a secret. Once enough shares (threshold) are revealed, the random number is reconstructed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Function:<\/b><span style=\"font-weight: 400;\"> This random number acts as a tie-breaker. &#8220;If we haven&#8217;t decided by round X, we flip a coin: Heads = Block A, Tails = Block B.&#8221; Since the coin is shared and unbiasable, the whole network jumps to the same decision instantly, ensuring liveness.<\/span><span style=\"font-weight: 400;\">10<\/span><\/li>\n<\/ul>\n<h3><b>10.3 Distributed Key Generation (DKG)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">For threshold cryptography to work, nodes must share a secret key without any single person knowing the full key. <\/span><b>DKG<\/b><span style=\"font-weight: 400;\"> protocols allow nodes to mathematically generate these key shares distributedly. This setup phase is critical for the security of the random beacons and threshold encryption used in HBBFT and Aleph Zero.<\/span><span style=\"font-weight: 400;\">55<\/span><\/p>\n<h2><b>11. Security Analysis: Robustness in Chaos<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The primary selling point of asynchronous blockchains is not just speed, but survival.<\/span><\/p>\n<h3><b>11.1 DDoS Resistance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In leader-based systems (Solana, Aptos, PBFT), an attacker can watch the network, identify the leader, and flood them with traffic. The network stalls until a new leader is elected. The attacker then targets the new leader.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In asynchronous, leaderless DAGs (Sui, Fantom, Hedera), there is no single target. An attacker would have to DDoS $1\/3$ of the entire network simultaneously to stop consensus. This raises the cost of attack exponentially.4<\/span><\/p>\n<h3><b>11.2 Censorship Resistance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Threshold encryption (as used in HBBFT and potential upgrades to others) provides strong censorship resistance. Since validators cannot see the transaction content until it is ordered, they cannot discriminately drop transactions from blacklisted addresses. This is a significant improvement over leader-based chains where the leader has absolute discretion over block inclusion.<\/span><span style=\"font-weight: 400;\">8<\/span><\/p>\n<h3><b>11.3 MEV Protection<\/b><\/h3>\n<p><b>Maximal Extractable Value (MEV)<\/b><span style=\"font-weight: 400;\"> is the profit a miner makes by reordering transactions (front-running). Asynchronous protocols with threshold encryption eliminate &#8220;toxic&#8221; MEV because the ordering is fixed before the content is revealed. However, protocols like Narwhal (without encryption) simply separate ordering from dissemination; while they make reordering harder due to the speed of the DAG, they do not strictly prevent it unless coupled with a simplified ordering mechanism like Tusk.<\/span><span style=\"font-weight: 400;\">28<\/span><\/p>\n<h2><b>12. Future Directions and Challenges<\/b><\/h2>\n<h3><b>12.1 The Bandwidth Constraint<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As protocols like Mysticeti remove latency bottlenecks, the limiting factor becomes <\/span><b>bandwidth<\/b><span style=\"font-weight: 400;\">. To process 300,000 TPS, validators need massive internet pipes. This creates a centralization pressure: only data centers can run nodes. Future research is focused on <\/span><b>state compression<\/b><span style=\"font-weight: 400;\"> and <\/span><b>sharding<\/b><span style=\"font-weight: 400;\"> to allow consumer hardware to participate despite the high throughput.<\/span><span style=\"font-weight: 400;\">37<\/span><\/p>\n<h3><b>12.2 Post-Quantum Security<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Most current ABFT protocols rely on BLS signatures, which are vulnerable to quantum computers (Shor&#8217;s algorithm). The structure of DAG-based consensus is compatible with post-quantum signatures (like Lattice-based crypto), but these signatures are much larger. The &#8220;Zero-Message Overhead&#8221; of Tusk makes it a prime candidate for adopting these heavy keys, as it minimizes the number of times they need to be sent.<\/span><span style=\"font-weight: 400;\">57<\/span><\/p>\n<h3><b>12.3 Convergence with Databases<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">We are witnessing the convergence of blockchains and distributed databases. Techniques like <\/span><b>Block-STM<\/b><span style=\"font-weight: 400;\"> (Aptos) and <\/span><b>Mysticeti<\/b><span style=\"font-weight: 400;\"> (Sui) draw heavily from optimistic concurrency control in databases. The future blockchain will likely look less like a &#8220;chain of blocks&#8221; and more like a globally replicated, asynchronous, ACID-compliant database state machine.<\/span><span style=\"font-weight: 400;\">41<\/span><\/p>\n<h2><b>13. Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The evolution of asynchronous blockchains marks a critical maturity point for distributed ledger technology. By abandoning the safety net of synchrony, protocols have evolved from the linear, fragile chains of the past into robust, high-speed directed acyclic graphs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From the theoretical breakthrough of <\/span><b>HoneyBadgerBFT<\/b><span style=\"font-weight: 400;\"> to the commercial speed of <\/span><b>Hedera Hashgraph<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Fantom<\/b><span style=\"font-weight: 400;\">, and finally to the modular, bandwidth-optimized architecture of <\/span><b>Sui&#8217;s Mysticeti<\/b><span style=\"font-weight: 400;\">, the industry has solved the &#8220;waiting&#8221; problem. These networks do not rely on global clocks or arbitrary timeouts; they operate at the limit of physics and bandwidth. While complexity remains a barrier\u2014requiring advanced threshold cryptography and intricate DAG traversal algorithms\u2014the result is a class of infrastructure capable of supporting the global financial system: networks that are secure, decentralized, and, crucially, never wait.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Note: Citations follow the format &#8220; referring to the provided research snippets. No separate reference list is included.<\/span><\/i><\/p>\n<h4><b>Works cited<\/b><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Foundations of Blockchains Lectures #4 &amp; 5: The Asynchronous Model and the FLP Impossibility Theorem (ROUGH DRAFT) &#8211; GitHub Pages, accessed on December 21, 2025, <\/span><a href=\"https:\/\/timroughgarden.github.io\/fob21\/l\/l4-5.pdf\"><span style=\"font-weight: 400;\">https:\/\/timroughgarden.github.io\/fob21\/l\/l4-5.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Synchrony and Timing Assumptions in Consensus Algorithms Used in Proof of Stake Blockchains | by zk &#8211; Zubin Koticha | Mechanism Labs | Medium, accessed on December 21, 2025, <\/span><a href=\"https:\/\/medium.com\/mechanism-labs\/synchrony-and-timing-assumptions-in-consensus-algorithms-used-in-proof-of-stake-blockchains-5356fb253459\"><span style=\"font-weight: 400;\">https:\/\/medium.com\/mechanism-labs\/synchrony-and-timing-assumptions-in-consensus-algorithms-used-in-proof-of-stake-blockchains-5356fb253459<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Foundations of Blockchains Lectures #6: The Partially Synchronous Model, 33%, and the CAP Principle (ROUGH DRAFT) &#8211; GitHub Pages, accessed on December 21, 2025, <\/span><a href=\"https:\/\/timroughgarden.github.io\/fob21\/l\/l6.pdf\"><span style=\"font-weight: 400;\">https:\/\/timroughgarden.github.io\/fob21\/l\/l6.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An Empirical Study of Consensus Protocols&#8217; DoS Resilience &#8211; Network Security Group, ETH Zurich, accessed on December 21, 2025, <\/span><a href=\"https:\/\/netsec.ethz.ch\/publications\/papers\/Consensus_DDoS_AsiaCCS_24.pdf\"><span style=\"font-weight: 400;\">https:\/\/netsec.ethz.ch\/publications\/papers\/Consensus_DDoS_AsiaCCS_24.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Impossibility of Distributed Consensus with One Faulty Process &#8211; cs.Princeton, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.cs.princeton.edu\/courses\/archive\/spr22\/cos418\/papers\/flp.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.cs.princeton.edu\/courses\/archive\/spr22\/cos418\/papers\/flp.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Asynchronous Byzantine Fault Tolerance (ABFT) &#8211; Emergent Mind, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.emergentmind.com\/topics\/asynchronous-byzantine-fault-tolerance-abft\"><span style=\"font-weight: 400;\">https:\/\/www.emergentmind.com\/topics\/asynchronous-byzantine-fault-tolerance-abft<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Synchrony, Asynchrony and Partial synchrony &#8211; Decentralized Thoughts, accessed on December 21, 2025, <\/span><a href=\"https:\/\/decentralizedthoughts.github.io\/2019-06-01-2019-5-31-models\/\"><span style=\"font-weight: 400;\">https:\/\/decentralizedthoughts.github.io\/2019-06-01-2019-5-31-models\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Honeybadger of BFT Protocols | PDF &#8211; Slideshare, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.slideshare.net\/slideshow\/honeybadger-of-bft-protocols\/157560935\"><span style=\"font-weight: 400;\">https:\/\/www.slideshare.net\/slideshow\/honeybadger-of-bft-protocols\/157560935<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">poanetwork\/hbbft: An implementation of the paper &#8220;Honey Badger of BFT Protocols&#8221; in Rust. This is a modular library of consensus. &#8211; GitHub, accessed on December 21, 2025, <\/span><a href=\"https:\/\/github.com\/poanetwork\/hbbft\"><span style=\"font-weight: 400;\">https:\/\/github.com\/poanetwork\/hbbft<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understanding the Honey Badger Consensus Algorithm | by Bernd Strehl &#8211; Medium, accessed on December 21, 2025, <\/span><a href=\"https:\/\/medium.com\/elbstack\/understanding-the-honey-badger-consensus-algorithm-240be28d7dc\"><span style=\"font-weight: 400;\">https:\/\/medium.com\/elbstack\/understanding-the-honey-badger-consensus-algorithm-240be28d7dc<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What is asynchronous byzantine fault tolerance (ABFT)? &#8211; Hedera, accessed on December 21, 2025, <\/span><a href=\"https:\/\/hedera.com\/learning\/hedera-hashgraph\/what-is-asynchronous-byzantine-fault-tolerance-abft\"><span style=\"font-weight: 400;\">https:\/\/hedera.com\/learning\/hedera-hashgraph\/what-is-asynchronous-byzantine-fault-tolerance-abft<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alea-BFT: Practical Asynchronous Byzantine Fault Tolerance &#8211; USENIX, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.usenix.org\/system\/files\/nsdi24-antunes.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.usenix.org\/system\/files\/nsdi24-antunes.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A Review of Asynchronous Byzantine Consensus Protocols &#8211; PMC &#8211; NIH, accessed on December 21, 2025, <\/span><a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC11679012\/\"><span style=\"font-weight: 400;\">https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC11679012\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A Survey on Consensus Algorithms of Blockchain Based on DAG &#8211; ResearchGate, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.researchgate.net\/publication\/384991759_A_Survey_on_Consensus_Algorithms_of_Blockchain_Based_on_DAG\"><span style=\"font-weight: 400;\">https:\/\/www.researchgate.net\/publication\/384991759_A_Survey_on_Consensus_Algorithms_of_Blockchain_Based_on_DAG<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What is Hashgraph Consensus Mechanism?-Fincash, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.fincash.com\/l\/basics\/hashgraph-consensus-mechanism\"><span style=\"font-weight: 400;\">https:\/\/www.fincash.com\/l\/basics\/hashgraph-consensus-mechanism<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hashgraph Consensus: What It is, How It Works &#8211; Investopedia, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.investopedia.com\/terms\/h\/hashgraph-consensus-mechanism.asp\"><span style=\"font-weight: 400;\">https:\/\/www.investopedia.com\/terms\/h\/hashgraph-consensus-mechanism.asp<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How does Hashgraph consensus work? &#8211; Accubits Blog, accessed on December 21, 2025, <\/span><a href=\"https:\/\/blog.accubits.com\/how-does-hashgraph-consensus-work\/\"><span style=\"font-weight: 400;\">https:\/\/blog.accubits.com\/how-does-hashgraph-consensus-work\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hashgraph Consensus Algorithm &#8211; Hedera Docs, accessed on December 21, 2025, <\/span><a href=\"https:\/\/docs.hedera.com\/hedera\/core-concepts\/hashgraph-consensus-algorithms\"><span style=\"font-weight: 400;\">https:\/\/docs.hedera.com\/hedera\/core-concepts\/hashgraph-consensus-algorithms<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hedera Hashgraph vs Fantom utility comparison &#8211; CoinExams, accessed on December 21, 2025, <\/span><a href=\"https:\/\/coinexams.com\/compare\/hedera-hashgraph-vs-fantom\"><span style=\"font-weight: 400;\">https:\/\/coinexams.com\/compare\/hedera-hashgraph-vs-fantom<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">fantom-documentation\/lachesis.md at master &#8211; GitHub, accessed on December 21, 2025, <\/span><a href=\"https:\/\/github.com\/Fantom-foundation\/fantom-documentation\/blob\/master\/lachesis.md\"><span style=\"font-weight: 400;\">https:\/\/github.com\/Fantom-foundation\/fantom-documentation\/blob\/master\/lachesis.md<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How Consensus Works on Fantom, accessed on December 21, 2025, <\/span><a href=\"https:\/\/blog.fantom.foundation\/how-consensus-works-on-fantom\/\"><span style=\"font-weight: 400;\">https:\/\/blog.fantom.foundation\/how-consensus-works-on-fantom\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A Simple Guide to Understanding Fantom&#8217;s Lachesis Protocol and DAG Structure &#8211; Kishan, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.0xkishan.com\/blogs\/a-simple-guide-to-understanding-fantoms-lachesis-protocol-and-dag-structure\"><span style=\"font-weight: 400;\">https:\/\/www.0xkishan.com\/blogs\/a-simple-guide-to-understanding-fantoms-lachesis-protocol-and-dag-structure<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understand Fantom (FTM) in one article &#8211; Gate.com, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.gate.com\/learn\/articles\/understand-fantom-ftm-in-one-article\/4128\"><span style=\"font-weight: 400;\">https:\/\/www.gate.com\/learn\/articles\/understand-fantom-ftm-in-one-article\/4128<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How Fantom is Solving The Blockchain Trilema &#8211; EatTheBlocks, accessed on December 21, 2025, <\/span><a href=\"https:\/\/eattheblocks.com\/getting-started-with-fantom-blockchain\/\"><span style=\"font-weight: 400;\">https:\/\/eattheblocks.com\/getting-started-with-fantom-blockchain\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understanding Lachesis Consensus: The Backbone of Asset Chain&#8217;s Speed and Security | by Valentine Blaze | Medium, accessed on December 21, 2025, <\/span><a href=\"https:\/\/medium.com\/@V-Blaze\/understanding-lachesis-consensus-the-backbone-of-asset-chains-speed-and-security-02d7c166e132\"><span style=\"font-weight: 400;\">https:\/\/medium.com\/@V-Blaze\/understanding-lachesis-consensus-the-backbone-of-asset-chains-speed-and-security-02d7c166e132<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">AlephBFT Consensus &#8211; Aleph Zero, accessed on December 21, 2025, <\/span><a href=\"https:\/\/docs.alephzero.org\/aleph-zero\/explore\/alephbft-consensus\"><span style=\"font-weight: 400;\">https:\/\/docs.alephzero.org\/aleph-zero\/explore\/alephbft-consensus<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What is Aleph? &#8211; AlephBFT, accessed on December 21, 2025, <\/span><a href=\"https:\/\/cardinal-cryptography.github.io\/AlephBFT\/how_alephbft_does_it.html\"><span style=\"font-weight: 400;\">https:\/\/cardinal-cryptography.github.io\/AlephBFT\/how_alephbft_does_it.html<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aleph Zero Overview &#8211; Reflexivity Research, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.reflexivityresearch.com\/free-reports\/aleph-zero-overview\"><span style=\"font-weight: 400;\">https:\/\/www.reflexivityresearch.com\/free-reports\/aleph-zero-overview<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aleph Zero Information &#8211; OnBloq, accessed on December 21, 2025, <\/span><a href=\"https:\/\/onbloq.com\/azero\/\"><span style=\"font-weight: 400;\">https:\/\/onbloq.com\/azero\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Narwhal Protocol: Scalable BFT for Ledgers &#8211; Emergent Mind, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.emergentmind.com\/topics\/narwhal-protocol\"><span style=\"font-weight: 400;\">https:\/\/www.emergentmind.com\/topics\/narwhal-protocol<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus &#8211; Meta Research, accessed on December 21, 2025, <\/span><a href=\"https:\/\/research.facebook.com\/publications\/narwhal-and-tusk-a-dag-based-mempool-and-efficient-bft-consensus\/\"><span style=\"font-weight: 400;\">https:\/\/research.facebook.com\/publications\/narwhal-and-tusk-a-dag-based-mempool-and-efficient-bft-consensus\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Narwhal: Scalable Blockchain Data Propagation with DAG-Based Design | blog.wonjoon, accessed on December 21, 2025, <\/span><a href=\"https:\/\/wnjoon.github.io\/2024\/12\/17\/what-is-narwhal\/\"><span style=\"font-weight: 400;\">https:\/\/wnjoon.github.io\/2024\/12\/17\/what-is-narwhal\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus &#8211; Alberto Sonnino, accessed on December 21, 2025, <\/span><a href=\"https:\/\/sonnino.com\/papers\/narwhal-and-tusk.pdf\"><span style=\"font-weight: 400;\">https:\/\/sonnino.com\/papers\/narwhal-and-tusk.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">[Infrastructure] Aptos Series #4: Block-STM, Narwhal&amp;Tusk, and Bullshark \u2014 Technologies for Further Scalability &#8211; A41.io, accessed on December 21, 2025, <\/span><a href=\"https:\/\/medium.a41.io\/aptos-series-4-block-stm-narwhal-tusk-and-bullshark-technologies-for-further-scalability-681f2ccc17cc\"><span style=\"font-weight: 400;\">https:\/\/medium.a41.io\/aptos-series-4-block-stm-narwhal-tusk-and-bullshark-technologies-for-further-scalability-681f2ccc17cc<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Research on the Next-gen Consensus Mechanism &#8212; BFT Consensus Based on DAG &#8211; PlatON Network, accessed on December 21, 2025, <\/span><a href=\"https:\/\/platon.network\/informationDetail?id=185&amp;plat=1\"><span style=\"font-weight: 400;\">https:\/\/platon.network\/informationDetail?id=185&amp;plat=1<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Bullshark: DAG BFT Protocols Made Practical &#8211; Aptos Labs, accessed on December 21, 2025, <\/span><a href=\"https:\/\/aptoslabs.com\/pdf\/2201.05677.pdf\"><span style=\"font-weight: 400;\">https:\/\/aptoslabs.com\/pdf\/2201.05677.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consensus &#8211; Blockberry API, accessed on December 21, 2025, <\/span><a href=\"https:\/\/docs.blockberry.one\/docs\/consensus\"><span style=\"font-weight: 400;\">https:\/\/docs.blockberry.one\/docs\/consensus<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mysticeti: Reaching the Latency Limits with Uncertified DAGs &#8211; Network and Distributed System Security (NDSS) Symposium, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-929-paper.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-929-paper.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Zoom in on Mysticeti, the update that powers Sui (SUI) &#8211; OAK Research, accessed on December 21, 2025, <\/span><a href=\"https:\/\/oakresearch.io\/en\/analyses\/fundamentals\/zoom-in-mysticeti-update-sui\"><span style=\"font-weight: 400;\">https:\/\/oakresearch.io\/en\/analyses\/fundamentals\/zoom-in-mysticeti-update-sui<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aptos vs Sui: A Fight of The New-generation Layer-1 Blockchain Platforms &#8211; Global IT Services and Consulting Company &#8211; SotaTek, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.sotatek.com\/blogs\/blockchain\/aptos-vs-sui-a-fight-of-the-new-generation-layer-1-blockchain-platforms\/\"><span style=\"font-weight: 400;\">https:\/\/www.sotatek.com\/blogs\/blockchain\/aptos-vs-sui-a-fight-of-the-new-generation-layer-1-blockchain-platforms\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sui vs Aptos: A Technical Deep Dive into Move Language Implementations, accessed on December 21, 2025, <\/span><a href=\"https:\/\/aeorysanalytics.medium.com\/sui-vs-aptos-a-technical-deep-dive-into-move-language-implementations-b2c2c8132dd6\"><span style=\"font-weight: 400;\">https:\/\/aeorysanalytics.medium.com\/sui-vs-aptos-a-technical-deep-dive-into-move-language-implementations-b2c2c8132dd6<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SUI vs. APTOS: Blockchain Protocols Using the Move Programming Language &#8211; Trust Wallet, accessed on December 21, 2025, <\/span><a href=\"https:\/\/trustwallet.com\/blog\/blockchain\/sui-vs-aptos-blockchain-protocols-using-the-move-programming-language\"><span style=\"font-weight: 400;\">https:\/\/trustwallet.com\/blog\/blockchain\/sui-vs-aptos-blockchain-protocols-using-the-move-programming-language<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fastest Cryptocurrencies With High Transaction Speeds (TPS) &#8211; HollaEx, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.hollaex.com\/blog\/fastest-cryptocurrencies-with-high-transaction-speeds\"><span style=\"font-weight: 400;\">https:\/\/www.hollaex.com\/blog\/fastest-cryptocurrencies-with-high-transaction-speeds<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u200dFastest Blockchains in 2025: Which Networks Are Actually the Fastest?\u200d &#8211; Bleap, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.bleap.finance\/blog\/fastest-blockchains\"><span style=\"font-weight: 400;\">https:\/\/www.bleap.finance\/blog\/fastest-blockchains<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When Is Spring Coming? A Security Analysis of Avalanche Consensus &#8211; DROPS, accessed on December 21, 2025, <\/span><a href=\"https:\/\/drops.dagstuhl.de\/storage\/00lipics\/lipics-vol253-opodis2022\/LIPIcs.OPODIS.2022.10\/LIPIcs.OPODIS.2022.10.pdf\"><span style=\"font-weight: 400;\">https:\/\/drops.dagstuhl.de\/storage\/00lipics\/lipics-vol253-opodis2022\/LIPIcs.OPODIS.2022.10\/LIPIcs.OPODIS.2022.10.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An Analysis of Avalanche ConsensusIgnacio Amores-Sesar has been supported by the Swiss National Science Foundation (SNSF) under grant agreement Nr. 200021_188443 (Advanced Consensus Protocols). Philipp Schneider has been supported by a grant from Avalanche, Inc. to the University of Bern. &#8211; arXiv, accessed on December 21, 2025, <\/span><a href=\"https:\/\/arxiv.org\/html\/2401.02811v1\"><span style=\"font-weight: 400;\">https:\/\/arxiv.org\/html\/2401.02811v1<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Which blockchain is the fastest? &#8211; Pontem Network, accessed on December 21, 2025, <\/span><a href=\"https:\/\/pontem.network\/posts\/which-blockchain-is-the-fastest\"><span style=\"font-weight: 400;\">https:\/\/pontem.network\/posts\/which-blockchain-is-the-fastest<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consensus | Sui Documentation, accessed on December 21, 2025, <\/span><a href=\"https:\/\/docs.sui.io\/concepts\/sui-architecture\/consensus\"><span style=\"font-weight: 400;\">https:\/\/docs.sui.io\/concepts\/sui-architecture\/consensus<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hedera [TPS, Max TPS, Block Time &amp; TTF] &#8211; Chainspect, accessed on December 21, 2025, <\/span><a href=\"https:\/\/chainspect.app\/chain\/hedera\"><span style=\"font-weight: 400;\">https:\/\/chainspect.app\/chain\/hedera<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Transactions Per Second (TPS) &#8211; DEV Community, accessed on December 21, 2025, <\/span><a href=\"https:\/\/dev.to\/fromaline\/transaction-per-second-tps-3f8b\"><span style=\"font-weight: 400;\">https:\/\/dev.to\/fromaline\/transaction-per-second-tps-3f8b<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understanding TPS: A Key Measure of Blockchain Speed &#8211; Aleph Zero Blog, accessed on December 21, 2025, <\/span><a href=\"https:\/\/alephzero.org\/blog\/understanding-tps-key-measure-of-blockchain-speed\"><span style=\"font-weight: 400;\">https:\/\/alephzero.org\/blog\/understanding-tps-key-measure-of-blockchain-speed<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">BLS digital signature &#8211; Wikipedia, accessed on December 21, 2025, <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/BLS_digital_signature\"><span style=\"font-weight: 400;\">https:\/\/en.wikipedia.org\/wiki\/BLS_digital_signature<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Randomness Generation \u00b7 Cloudflare Randomness Beacon docs, accessed on December 21, 2025, <\/span><a href=\"https:\/\/developers.cloudflare.com\/randomness-beacon\/cryptographic-background\/randomness-generation\/\"><span style=\"font-weight: 400;\">https:\/\/developers.cloudflare.com\/randomness-beacon\/cryptographic-background\/randomness-generation\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">STROBE: Streaming Threshold Random Beacons &#8211; DROPS, accessed on December 21, 2025, <\/span><a href=\"https:\/\/drops.dagstuhl.de\/storage\/00lipics\/lipics-vol282-aft2023\/LIPIcs.AFT.2023.7\/LIPIcs.AFT.2023.7.pdf\"><span style=\"font-weight: 400;\">https:\/\/drops.dagstuhl.de\/storage\/00lipics\/lipics-vol282-aft2023\/LIPIcs.AFT.2023.7\/LIPIcs.AFT.2023.7.pdf<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How do Randomness Beacons based on Threshold Signatures work? &#8211; NEAR, accessed on December 21, 2025, <\/span><a href=\"https:\/\/www.near.org\/blog\/randomness-threshold-signatures\"><span style=\"font-weight: 400;\">https:\/\/www.near.org\/blog\/randomness-threshold-signatures<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Liveness analysis, modeling, and simulation of blockchain consensus algorithms&#8217; ability to tolerate malicious miners &#8211; UTC Scholar, accessed on December 21, 2025, <\/span><a href=\"https:\/\/scholar.utc.edu\/cgi\/viewcontent.cgi?article=1893&amp;context=theses\"><span style=\"font-weight: 400;\">https:\/\/scholar.utc.edu\/cgi\/viewcontent.cgi?article=1893&amp;context=theses<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SoK: DAG-based Consensus Protocols &#8211; arXiv, accessed on December 21, 2025, <\/span><a href=\"https:\/\/arxiv.org\/html\/2411.10026v1\"><span style=\"font-weight: 400;\">https:\/\/arxiv.org\/html\/2411.10026v1<\/span><\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary The history of distributed ledger technology is fundamentally a history of grappling with the constraints of time. In the quest to create decentralized networks that are secure, scalable, <span class=\"readmore\"><a href=\"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/\">Read More &#8230;<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2374],"tags":[],"class_list":["post-9067","post","type-post","status-publish","format-standard","hentry","category-deep-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Asynchronous Blockchains: Designing Networks That Never Wait | Uplatz Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Asynchronous Blockchains: Designing Networks That Never Wait | Uplatz Blog\" \/>\n<meta property=\"og:description\" content=\"Executive Summary The history of distributed ledger technology is fundamentally a history of grappling with the constraints of time. In the quest to create decentralized networks that are secure, scalable, Read More ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Uplatz Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Uplatz-1077816825610769\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-24T21:11:58+00:00\" \/>\n<meta name=\"author\" content=\"uplatzblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uplatz_global\" \/>\n<meta name=\"twitter:site\" content=\"@uplatz_global\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"uplatzblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/\"},\"author\":{\"name\":\"uplatzblog\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ecae69a21d0757bdb2f776e67d2645e\"},\"headline\":\"Asynchronous Blockchains: Designing Networks That Never Wait\",\"datePublished\":\"2025-12-24T21:11:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/\"},\"wordCount\":5487,\"publisher\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Deep Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/\",\"name\":\"Asynchronous Blockchains: Designing Networks That Never Wait | Uplatz Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-12-24T21:11:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/asynchronous-blockchains-designing-networks-that-never-wait-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Asynchronous Blockchains: Designing Networks That Never Wait\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\",\"name\":\"Uplatz Blog\",\"description\":\"Uplatz is a global IT Training &amp; Consulting company\",\"publisher\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#organization\",\"name\":\"uplatz.com\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Uplatz-Logo-Copy-2.png\",\"contentUrl\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Uplatz-Logo-Copy-2.png\",\"width\":1280,\"height\":800,\"caption\":\"uplatz.com\"},\"image\":{\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Uplatz-1077816825610769\\\/\",\"https:\\\/\\\/x.com\\\/uplatz_global\",\"https:\\\/\\\/www.instagram.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/7956715?trk=tyah&amp;amp;amp;amp;trkInfo=clickedVertical:company,clickedEntityId:7956715,idx:1-1-1,tarId:1464353969447,tas:uplatz\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uplatz.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ecae69a21d0757bdb2f776e67d2645e\",\"name\":\"uplatzblog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g\",\"caption\":\"uplatzblog\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Asynchronous Blockchains: Designing Networks That Never Wait | Uplatz Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/","og_locale":"en_US","og_type":"article","og_title":"Asynchronous Blockchains: Designing Networks That Never Wait | Uplatz Blog","og_description":"Executive Summary The history of distributed ledger technology is fundamentally a history of grappling with the constraints of time. In the quest to create decentralized networks that are secure, scalable, Read More ...","og_url":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/","og_site_name":"Uplatz Blog","article_publisher":"https:\/\/www.facebook.com\/Uplatz-1077816825610769\/","article_published_time":"2025-12-24T21:11:58+00:00","author":"uplatzblog","twitter_card":"summary_large_image","twitter_creator":"@uplatz_global","twitter_site":"@uplatz_global","twitter_misc":{"Written by":"uplatzblog","Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/#article","isPartOf":{"@id":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/"},"author":{"name":"uplatzblog","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/person\/8ecae69a21d0757bdb2f776e67d2645e"},"headline":"Asynchronous Blockchains: Designing Networks That Never Wait","datePublished":"2025-12-24T21:11:58+00:00","mainEntityOfPage":{"@id":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/"},"wordCount":5487,"publisher":{"@id":"https:\/\/uplatz.com\/blog\/#organization"},"articleSection":["Deep Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/","url":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/","name":"Asynchronous Blockchains: Designing Networks That Never Wait | Uplatz Blog","isPartOf":{"@id":"https:\/\/uplatz.com\/blog\/#website"},"datePublished":"2025-12-24T21:11:58+00:00","breadcrumb":{"@id":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uplatz.com\/blog\/asynchronous-blockchains-designing-networks-that-never-wait-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uplatz.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Asynchronous Blockchains: Designing Networks That Never Wait"}]},{"@type":"WebSite","@id":"https:\/\/uplatz.com\/blog\/#website","url":"https:\/\/uplatz.com\/blog\/","name":"Uplatz Blog","description":"Uplatz is a global IT Training &amp; Consulting company","publisher":{"@id":"https:\/\/uplatz.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uplatz.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uplatz.com\/blog\/#organization","name":"uplatz.com","url":"https:\/\/uplatz.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uplatz.com\/blog\/wp-content\/uploads\/2016\/11\/Uplatz-Logo-Copy-2.png","contentUrl":"https:\/\/uplatz.com\/blog\/wp-content\/uploads\/2016\/11\/Uplatz-Logo-Copy-2.png","width":1280,"height":800,"caption":"uplatz.com"},"image":{"@id":"https:\/\/uplatz.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Uplatz-1077816825610769\/","https:\/\/x.com\/uplatz_global","https:\/\/www.instagram.com\/","https:\/\/www.linkedin.com\/company\/7956715?trk=tyah&amp;amp;amp;amp;trkInfo=clickedVertical:company,clickedEntityId:7956715,idx:1-1-1,tarId:1464353969447,tas:uplatz"]},{"@type":"Person","@id":"https:\/\/uplatz.com\/blog\/#\/schema\/person\/8ecae69a21d0757bdb2f776e67d2645e","name":"uplatzblog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7f814c72279199f59ded4418a8653ad15f5f8904ac75e025a4e2abe24d58fa5d?s=96&d=mm&r=g","caption":"uplatzblog"}}]}},"_links":{"self":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/9067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/comments?post=9067"}],"version-history":[{"count":1,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/9067\/revisions"}],"predecessor-version":[{"id":9068,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/posts\/9067\/revisions\/9068"}],"wp:attachment":[{"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/media?parent=9067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/categories?post=9067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uplatz.com\/blog\/wp-json\/wp\/v2\/tags?post=9067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}