Security of Blockchains at Capacity

03/16/2023
by   Lucianna Kiffer, et al.
0

Given a network of nodes with certain communication and computation capacities, what is the maximum rate at which a blockchain can run securely? We study this question for proof-of-work (PoW) and proof-of-stake (PoS) longest chain protocols under a 'bounded bandwidth' model which captures queuing and processing delays due to high block rate relative to capacity, bursty release of adversarial blocks, and in PoS, spamming due to equivocations. We demonstrate that security of both PoW and PoS longest chain, when operating at capacity, requires carefully designed scheduling policies that correctly prioritize which blocks are processed first, as we show attack strategies tailored to such policies. In PoS, we show an attack exploiting equivocations, which highlights that the throughput of the PoS longest chain protocol with a broad class of scheduling policies must decrease as the desired security error probability decreases. At the same time, through an improved analysis method, our work is the first to identify block production rates under which PoW longest chain is secure in the bounded bandwidth setting. We also present the first PoS longest chain protocol, SaPoS, which is secure with a block production rate independent of the security error probability, by using an 'equivocation removal' policy to prevent equivocation spamming.

READ FULL TEXT
research
11/24/2021

Securing Proof-of-Stake Nakamoto Consensus Under Bandwidth Constraint

Satoshi Nakamoto's Proof-of-Work (PoW) longest chain (LC) protocol was a...
research
05/21/2020

Everything is a Race and Nakamoto Always Wins

Nakamoto invented the longest chain protocol, and claimed its security b...
research
05/07/2020

QuickSync: A Quickly Synchronizing PoS-Based Blockchain Protocol

To implement a blockchain, we need a blockchain protocol for all the nod...
research
09/18/2019

Barracuda: The Power of ℓ-polling in Proof-of-Stake Blockchains

A blockchain is a database of sequential events that is maintained by a ...
research
02/01/2021

The Longest-Chain Protocol Under Random Delays

In the field of distributed consensus and blockchains, the synchronous c...
research
02/16/2022

Blockchain Security when Messages are Lost

Security analyses for consensus protocols in blockchain research have pr...
research
01/15/2020

Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders

We improve the fundamental security threshold of Proof-of-Stake (PoS) bl...

Please sign up or login with your details

Forgot password? Click here to reset