The Discrepancy Attack on Polyshard-ed Blockchains

Sharding, i.e. splitting the miners or validators to form and run several subchains in parallel, is known as one of the main solutions to the scalability problem of blockchains. The drawback is that as the number of miners expanding each subchain becomes small, it becomes vulnerable to security attacks. To solve this problem, a framework, named as Polyshard, has been proposed in which each validator verifies a coded combination of the blocks introduced by different subchains, thus helping to protect the security of all subchains. In this paper, we introduce an attack on Polyshard, called the discrepancy attack, which is the result of malicious nodes controlling a few subchains and dispersing different blocks to different nodes. We show that this attack undermines the security of Polyshard and is undetectable in its current setting.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2022

Scaling Blockchains with Error Correction Codes: A Survey on Coded Blockchains

This paper reviews and highlights how coding schemes have been used to s...
research
08/11/2020

Security Analysis on Tangle-based Blockchain through Simulation

The Tangle-based structure becomes one of the most promising solutions w...
research
10/08/2020

Using Homomorphic hashes in coded blockchains

One of the scalability issues of blockchains is the increase of their si...
research
04/13/2023

An attack resilient policy on the tip pool for DAG-based distributed ledgers

This paper discusses congestion control and inconsistency problems in DA...
research
12/20/2021

Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature

Over-provisioning technology is typically introduced as a means to impro...
research
09/17/2021

Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation

In this paper we describe LUNES-Blockchain, an agent-based simulator of ...
research
05/12/2022

Stalloris: RPKI Downgrade Attack

We demonstrate the first downgrade attacks against RPKI. The key design ...

Please sign up or login with your details

Forgot password? Click here to reset