Modeling Resources in Permissionless Longest-chain Total-order Broadcast

11/22/2022
by   Sarah Azouvi, et al.
0

Blockchain protocols implement total-order broadcast in a permissionless setting, where processes can freely join and leave. In such a setting, to safeguard against Sybil attacks, correct processes rely on cryptographic proofs tied to a particular type of resource to make them eligible to order transactions. For example, in the case of Proof-of-Work (PoW), this resource is computation, and the proof is a solution to a computationally hard puzzle. Conversely, in Proof-of-Stake (PoS), the resource corresponds to the number of coins that every process in the system owns, and a secure lottery selects a process for participation proportionally to its coin holdings. Although many resource-based blockchain protocols are formally proven secure in the literature, the existing security proofs fail to demonstrate why particular types of resources cause the blockchain protocols to be vulnerable to distinct classes of attacks. For instance, PoS systems are more vulnerable to long-range attacks, where an adversary corrupts past processes to re-write the history, than Proof-of-Work and Proof-of-Storage systems. Proof-of-Storage-based and Proof-of-Stake-based protocols are both more susceptible to private double-spending attacks than Proof-of-Work-based protocols; in this case, an adversary mines its chain in secret without sharing its blocks with the rest of the processes until the end of the attack. In this paper, we formally characterize the properties of resources through an abstraction called resource allocator and give a framework for understanding longest-chain consensus protocols based on different underlying resources. In addition, we use this resource allocator to demonstrate security trade-offs between various resources focusing on well-known attacks (e.g., the long-range attack and nothing-at-stake attacks).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/10/2022

Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot

Blockchain systems based on a reusable resource, such as proof-of-stake ...
research
08/14/2023

Security Analysis of Filecoin's Expected Consensus in the Byzantine vs Honest Model

Filecoin is the largest storage-based open-source blockchain, both by st...
research
09/09/2019

Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol

Proof-of-stake (PoS) blockchain protocols are emerging as one of the mos...
research
09/18/2018

Formal Barriers to Longest-Chain Proof-of-Stake Protocols

The security of most existing cryptocurrencies is based on a concept cal...
research
09/20/2022

Correctness of Broadcast via Multicast: Graphically and Formally

Maintaining data consistency among multiple parties requires nodes to re...
research
11/11/2019

Just Enough Security: Reducing Proof-of-Work Ecological Footprint

Proof-of-work (PoW) mechanisms secure about 80% of the $250B cryptocurre...
research
01/13/2021

Secure Process Algebra

Based on our previous work on truly concurrent process algebras APTC, we...

Please sign up or login with your details

Forgot password? Click here to reset