A Predictable Incentive Mechanism for TrueBit

06/29/2018
by   Julia Koch, et al.
0

TrueBit is a protocol that uses interactive verification to allow a resource-constrained computation environment like a blockchain to perform much larger computations than usual in a trusted way. As long as a single honest participant is present to verify the computation, an invalid computation cannot get accepted. In TrueBit, the presence of such a verifier is incentivised by randomly injected forced errors. Additionally, in order to counter sybil attacks, the reward for finding an error drops off exponentially with the number of challengers. The main drawback of this mechanism is that it makes it very hard to predict whether participation will be profitable or not. To even out the rewards, we propose to randomly select multiple solvers from a pool and evenly share the fees among them, while still allowing outside challengers. Furthermore, a proof of independent execution will make it harder to establish computation pools which share computation results.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/18/2018

Delayed Blockchain Protocols

Given the parallels between game theory and consensus, it makes sense to...
research
09/29/2021

A verified algebraic representation of Cairo program execution

Cryptographic interactive proof systems provide an efficient and scalabl...
research
06/21/2023

Tailstorm: A Secure and Fair Blockchain for Cash Transactions

Proof-of-work (PoW) cryptocurrencies rely on a balance of security and f...
research
09/20/2018

Compounding of Wealth in Proof-of-Stake Cryptocurrencies

Proof-of-stake (PoS) is a promising approach for designing efficient blo...
research
08/31/2020

Share Withholding Attack in Blockchain Mining: Technical Report

Cryptocurrency achieves distributed consensus using proof of work (PoW)....
research
02/22/2023

IRS: An Incentive-compatible Reward Scheme for Algorand

Founded in 2017, Algorand is one of the world's first carbon-negative, p...
research
10/31/2019

Outsourcing Computation: the Minimal Refereed Mechanism

We consider a setting where a verifier with limited computation power de...

Please sign up or login with your details

Forgot password? Click here to reset