论文标题
在无许可的最长链总订单广播中对资源进行建模
Modeling Resources in Permissionless Longest-chain Total-order Broadcast
论文作者
论文摘要
区块链协议在无许可的设置中实现总订单广播,过程可以自由地加入并离开。在这种情况下,为了保护Sybil攻击,正确的过程依赖于与特定类型的资源相关的加密证明,以使其有资格订购交易。例如,在工作证明(POW)的情况下,此资源是计算,并且证明是对计算上难题的解决方案。相反,在验证证明(POS)中,资源对应于系统中每个过程的硬币数量,并且安全的彩票选择与其硬币持有成比例地参与的过程。 尽管许多基于资源的区块链协议在文献中被正式证明是安全的,但现有的安全证明无法证明为什么特定类型的资源导致区块链协议容易受到不同攻击类别的影响。例如,POS系统更容易受到远程攻击的影响,在这种攻击中,对手比工作证明和存储证明系统损坏过去的过程以重写历史记录。基于存储证明的基于存储证明和基于验证的协议都比基于工作证明的协议更容易受到私人双重支出攻击。在这种情况下,对手将其链条秘密地挖掘出来,而没有与其余过程共享块,直到攻击结束为止。 在本文中,我们通过称为资源分配器的抽象正式表征资源的属性,并为理解基于不同基础资源的最长链共识协议提供了一个框架。此外,我们使用此资源分配器来证明针对众所周知攻击的各种资源之间的安全权衡(例如,远程攻击和销售攻击无关)。
Blockchain protocols implement total-order broadcast in a permissionless setting, where processes can freely join and leave. In such a setting, to safeguard against Sybil attacks, correct processes rely on cryptographic proofs tied to a particular type of resource to make them eligible to order transactions. For example, in the case of Proof-of-Work (PoW), this resource is computation, and the proof is a solution to a computationally hard puzzle. Conversely, in Proof-of-Stake (PoS), the resource corresponds to the number of coins that every process in the system owns, and a secure lottery selects a process for participation proportionally to its coin holdings. Although many resource-based blockchain protocols are formally proven secure in the literature, the existing security proofs fail to demonstrate why particular types of resources cause the blockchain protocols to be vulnerable to distinct classes of attacks. For instance, PoS systems are more vulnerable to long-range attacks, where an adversary corrupts past processes to re-write the history, than Proof-of-Work and Proof-of-Storage systems. Proof-of-Storage-based and Proof-of-Stake-based protocols are both more susceptible to private double-spending attacks than Proof-of-Work-based protocols; in this case, an adversary mines its chain in secret without sharing its blocks with the rest of the processes until the end of the attack. In this paper, we formally characterize the properties of resources through an abstraction called resource allocator and give a framework for understanding longest-chain consensus protocols based on different underlying resources. In addition, we use this resource allocator to demonstrate security trade-offs between various resources focusing on well-known attacks (e.g., the long-range attack and nothing-at-stake attacks).