A General Framework for the Security Analysis of Blockchain Protocols

09/20/2020
by   Andrew Lewis-Pye, et al.
0

Blockchain protocols differ in fundamental ways, including the mechanics of selecting users to produce blocks (e.g., proof-of-work vs. proof-of-stake) and the method to establish consensus (e.g., longest chain rules vs. Byzantine fault-tolerant (BFT) inspired protocols). These fundamental differences have hindered "apples-to-apples" comparisons between different categories of blockchain protocols and, in turn, the development of theory to formally discuss their relative merits. This paper presents a parsimonious abstraction sufficient for capturing and comparing properties of many well-known permissionless blockchain protocols, simultaneously capturing essential properties of both proof-of-work (PoW) and proof-of-stake (PoS) protocols, and of both longest-chain-type and BFT-type protocols. Our framework blackboxes the precise mechanics of the user selection process, allowing us to isolate the properties of the selection process that are significant for protocol design. We demonstrate the utility of our general framework with several concrete results: 1. We prove a CAP-type impossibility theorem asserting that liveness with an unknown level of participation rules out security in a partially synchronous setting. 2. Delving deeper into the partially synchronous setting, we prove that a necessary and sufficient condition for security is the production of "certificates," meaning stand-alone proofs of block confirmation. 3. Restricting to synchronous settings, we prove that typical protocols with a known level of participation (including longest chain-type PoS protocols) can be adapted to provide certificates, but those with an unknown level of participation cannot. 4. Finally, we use our framework to articulate a modular two-step approach to blockchain security analysis that effectively reduces the permissionless case to the permissioned case.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/18/2020

Resource Pools and the CAP Theorem

Blockchain protocols differ in fundamental ways, including the mechanics...
research
09/10/2021

How Does Blockchain Security Dictate Blockchain Implementation?

Blockchain protocols come with a variety of security guarantees. For exa...
research
09/03/2019

A Generic Sharding Scheme for Blockchain Protocols

This thesis introduces a formal general framework for scaling blockchain...
research
01/18/2021

Byzantine Generals in the Permissionless Setting

Consensus protocols have traditionally been studied in a setting where a...
research
09/23/2019

IBFT 2.0: A Safe and Live Variation of the IBFT Blockchain Consensus Protocol for Eventually Synchronous Networks

In this work, we present IBFT 2.0 (Istanbul BFT 2.0), which is a Proof-o...
research
01/06/2021

Highway: Efficient Consensus with Flexible Finality

There has been recently a lot of progress in designing efficient partial...
research
02/12/2019

Asymptotic Performance Analysis of Blockchain Protocols

In the light of the recent fame of Blockchain technologies, numerous pro...

Please sign up or login with your details

Forgot password? Click here to reset