AnonMint, Every post you've made here has been error and confusion.
The very first post in the thread points out that decentralized versions take more work because of the anti-DOS proofing.
A couple posts down I give some examples of how it can be done.
You're presuming a broken model that I don't believe anyone here has ever suggested. You'd always being the protocol by specifying the inputs in which you intend to sign. Signature authority over inputs is the principle scarcity that allows you to may the system dos-attack resistant. After the inputs are signed, outputs can be specified in a cheat proof way, and then the only avenue for disruption is refusing to sign which can be addressed by blacklisting your inputs (and other rate limiting tokens) and restarting.