Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake

07/16/2022
by   Matheus V. X. Ferreira, et al.
0

Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols, such as Algorand. In cryptographic self-selection, each round r has a seed Q_r. In round r, each account owner is asked to digitally sign Q_r, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round r, and their credential becomes the seed Q_r+1. Such protocols leave open the possibility of a selfish-mining style attack: a user who owns multiple accounts that each produce low-scoring credentials in round r can selectively choose which ones to broadcast in order to influence the seed for round r+1. Indeed, the user can pre-compute their credentials for round r+1 for each potential seed, and broadcast only the credential (among those with a low enough score to be the leader) that produces the most favorable seed. We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than 38% of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/23/2022

Homomorphic Sortition – Secret Leader Election for Blockchain

In a secret single leader election protocol (SSLE), one of the system me...
research
06/19/2020

Multi-Round Influence Maximization

In this paper, we study the Multi-Round Influence Maximization (MRIM) pr...
research
09/15/2021

Private Attacks in Longest Chain Proof-of-stake Protocols with Single Secret Leader Elections

Single Secret Leader Elections have recently been proposed as an improve...
research
01/15/2020

Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders

We improve the fundamental security threshold of Proof-of-Stake (PoS) bl...
research
01/27/2023

Distributed Consensus in Wireless Networks with Probabilistic Broadcast Scheduling

We consider distributed average consensus in a wireless network with par...
research
08/14/2023

Security Analysis of Filecoin's Expected Consensus in the Byzantine vs Honest Model

Filecoin is the largest storage-based open-source blockchain, both by st...
research
02/20/2019

Robustness of Randomized Rumour Spreading

In this work we consider three well-studied broadcast protocols: Push, P...

Please sign up or login with your details

Forgot password? Click here to reset