TY - GEN
T1 - Blockchain Security when Messages are Lost
AU - Ameen, Taha
AU - Sankagiri, Suryanarayana
AU - Hajek, Bruce
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/11/7
Y1 - 2022/11/7
N2 - Security analyses for consensus protocols in blockchain research have primarily focused on the synchronous model, where point-to-point communication delays are upper bounded by a known finite constant. These models are unrealistic in noisy settings, where messages may be lost (i.e. incur infinite delay). In this work, we study the impact of message losses on the security of the proof-of-work longest-chain protocol. We introduce a new communication model to capture the impact of message loss called the 0-∞ model, and derive a region of tolerable adversarial power under which the consensus protocol is secure. The guarantees are derived as a simple bound for the probability that a transaction violates desired security properties. Specifically, we show that this violation probability decays almost exponentially in the security parameter. Our approach involves constructing combinatorial objects from blocktrees, and identifying random variables associated with them that are amenable to analysis. This approach improves existing bounds and extends the known regime for tolerable adversarial threshold in settings where messages may be lost.
AB - Security analyses for consensus protocols in blockchain research have primarily focused on the synchronous model, where point-to-point communication delays are upper bounded by a known finite constant. These models are unrealistic in noisy settings, where messages may be lost (i.e. incur infinite delay). In this work, we study the impact of message losses on the security of the proof-of-work longest-chain protocol. We introduce a new communication model to capture the impact of message loss called the 0-∞ model, and derive a region of tolerable adversarial power under which the consensus protocol is secure. The guarantees are derived as a simple bound for the probability that a transaction violates desired security properties. Specifically, we show that this violation probability decays almost exponentially in the security parameter. Our approach involves constructing combinatorial objects from blocktrees, and identifying random variables associated with them that are amenable to analysis. This approach improves existing bounds and extends the known regime for tolerable adversarial threshold in settings where messages may be lost.
KW - blockchain security
KW - consensus
KW - longest-chain protocol
KW - proof-of-work
UR - http://www.scopus.com/inward/record.url?scp=85144829007&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85144829007&partnerID=8YFLogxK
U2 - 10.1145/3560829.3563557
DO - 10.1145/3560829.3563557
M3 - Conference contribution
AN - SCOPUS:85144829007
T3 - ConsensusDay 2022 - Proceedings of the 2022 ACM Workshop on Developments in Consensus, co-located with CCS 2022
SP - 1
EP - 14
BT - ConsensusDay 2022 - Proceedings of the 2022 ACM Workshop on Developments in Consensus, co-located with CCS 2022
PB - Association for Computing Machinery
T2 - 2022 ACM Workshop on Developments in Consensus, ConsensusDay 2022 - Co-located with CCS 2022
Y2 - 7 November 2022
ER -