Security Analysis of Filecoin's Expected Consensus in the Byzantine vs Honest Model

08/14/2023
by   Xuechao Wang, et al.
0

Filecoin is the largest storage-based open-source blockchain, both by storage capacity (>11EiB) and market capitalization. This paper provides the first formal security analysis of Filecoin's consensus (ordering) protocol, Expected Consensus (EC). Specifically, we show that EC is secure against an arbitrary adversary that controls a fraction β of the total storage for β m< 1- e^-(1-β)m, where m is a parameter that corresponds to the expected number of blocks per round, currently m=5 in Filecoin. We then present an attack, the n-split attack, where an adversary splits the honest miners between multiple chains, and show that it is successful for β m ≥ 1- e^-(1-β)m, thus proving that β m= 1- e^-(1-β)m is the tight security threshold of EC. This corresponds roughly to an adversary with 20% of the total storage pledged to the chain. Finally, we propose two improvements to EC security that would increase this threshold. One of these two fixes is being implemented as a Filecoin Improvement Proposal (FIP).

READ FULL TEXT
research
11/22/2022

Modeling Resources in Permissionless Longest-chain Total-order Broadcast

Blockchain protocols implement total-order broadcast in a permissionless...
research
07/18/2019

Towards a Multi-Chain Future of Proof-of-Space

Proof-of-Space provides an intriguing alternative for consensus protocol...
research
02/20/2020

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain

Blockchain, the technology behind the popular Bitcoin, is considered a "...
research
05/24/2020

Better Late than Never; Scaling Computations in Blockchain by Delaying Transactions

Proof-of-Work (PoW) based blockchains typically allocate only a tiny fra...
research
06/15/2019

A Secure Consensus Protocol for Sidechains

Sidechain technology has been envisioned as a promising solution to acce...
research
10/09/2021

A Multiple Snapshot Attack on Deniable Storage Systems

While disk encryption is suitable for use in most situations where confi...
research
07/16/2022

Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake

Cryptographic Self-Selection is a subroutine used to select a leader for...

Please sign up or login with your details

Forgot password? Click here to reset