Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms 2020
DOI: 10.1137/1.9781611975994.69
|View full text |Cite
|
Sign up to set email alerts
|

The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains

Abstract: Blockchain data structures maintained via the longest-chain rule have emerged as a powerful algorithmic tool for consensus algorithms. e technique-popularized by the Bitcoin protocol-has proven to be remarkably flexible and now supports consensus algorithms in a wide variety of se ings. Despite such broad applicability and adoption, current analytic understanding of the technique is highly dependent on details of the protocol's leader election scheme. A particular challenge appears in the proof-of-stake se ing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 14 publications
4
18
0
Order By: Relevance
“…The analysis of our main security theorem, Theorem 6.1, draws from [21]. A more careful and improved analysis appears in [5], from which we may obtain the refined bound 1 − 𝑅𝐿(𝑒 −Ω (𝛿 3 𝜅) + 𝑒 −𝜆 ) for the statement of Theorem 6.1. In this section we analyze a private chain attack and show a corresponding lower bound.…”
Section: E2 Differences In Classic and Genesismentioning
confidence: 99%
“…The analysis of our main security theorem, Theorem 6.1, draws from [21]. A more careful and improved analysis appears in [5], from which we may obtain the refined bound 1 − 𝑅𝐿(𝑒 −Ω (𝛿 3 𝜅) + 𝑒 −𝜆 ) for the statement of Theorem 6.1. In this section we analyze a private chain attack and show a corresponding lower bound.…”
Section: E2 Differences In Classic and Genesismentioning
confidence: 99%
“…Previous works have proposed formal analyses of PoS blockchains based on PLEs [3,7,13]. In most of them, the proof revolves around finding a special block that guarantees security of the protocol and bounding the probability that this type of block does not appear in a sequence of 𝑛 consecutive blocks.…”
Section: Related Workmentioning
confidence: 99%
“…While this limits the generality of our work, we believe that, due to the conjecture above, studying the private attack alone gives a good proxy for the security of PoS longest-chain protocols. Furthermore, this simplifying assumption allows us to get exact bounds, as opposed to the loose bounds obtained by other analyses [3,7,11,13], usually based on Chebyshev's inequality or similar inequalities. Loose bounds on the probability of successful attacks would not be sufficient to meaningfully quantify the difference between SSLE and PLE in longest-chain PoS blockchains as even if one bound is smaller than the other, this does not say anything about how the exact probabilities compare.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another line of work [11,27] considers how the uniformly-at-random symmetry breaking strategy affects incentive-compatible selfish mining attacks; our analysis applies to general attacks. Random walks have been used to analyze the probability of consistency violations in proofs-of-stake protocols [3]; ours is the first work that uses coalescing random walks to analyze the common-prefix and chain quality of Bitcoin and other proof-of-work protocols.…”
Section: Introductionmentioning
confidence: 99%