2019
DOI: 10.48550/arxiv.1912.02954
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Selfish Behavior in the Tezos Proof-of-Stake Protocol

Abstract: Proof-of-Stake consensus protocols give rise to complex modeling challenges. We analyze the recently-updated Tezos Proof-of-Stake protocol and demonstrate that, under certain conditions, rational participants are incentivized to behave dishonestly. In doing so, we provide a theoretical analysis of the feasibility and profitability of a block stealing attack that we call selfish endorsing, a concrete instance of an attack previously only theoretically considered. We propose and analyze a simple change to the Te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Instead, a purely digital asset is used as collateral for the network and the network can control its supply to provide the desired properties. For an introductory background on PoS protocols and their complex security models, please see [27,28,48,17,41]. In this paper, we show that these purported benefits do not come for free.…”
Section: Introductionmentioning
confidence: 80%
See 1 more Smart Citation
“…Instead, a purely digital asset is used as collateral for the network and the network can control its supply to provide the desired properties. For an introductory background on PoS protocols and their complex security models, please see [27,28,48,17,41]. In this paper, we show that these purported benefits do not come for free.…”
Section: Introductionmentioning
confidence: 80%
“…• Single validator per block: To simplify the model, we avoid using committees [22,47,25,23,10,15,44,41] and verifiers [5,6] as they add more variance and make both formal and simulation methods more difficult.…”
Section: Assumption 2 (Distributed Systems) All Communication Between...mentioning
confidence: 99%
“…The present paper builds on Neuder et al [17], who study selfish mining in Tezos and show that it is sometimes more profitable to create a length-2 reorg than to follow the honest protocol. This previous work considered only selfish mining and not the possibility of reorgs conducted for the purpose of double-spends.…”
Section: Related Workmentioning
confidence: 92%
“…subsequent block is published. This is a common assumption in the selfish mining literature [9,13,17,20].…”
Section: The Tezos Proof-of-stake Protocolmentioning
confidence: 99%
See 1 more Smart Citation