-
A Confirmation Rule for the Ethereum Consensus Protocol
Authors:
Aditya Asgaonkar,
Francesco D'Amato,
Roberto Saltini,
Luca Zanolini,
Chenyi Zhang
Abstract:
A Confirmation Rule, within blockchain networks, refers to an algorithm implemented by network nodes that determines (either probabilistically or deterministically) the permanence of certain blocks on the blockchain. An example of Confirmation Rule is the Bitcoin's longest chain Confirmation Rule where a block is confirmed (with high probability) when it has a sufficiently long chain of successors…
▽ More
A Confirmation Rule, within blockchain networks, refers to an algorithm implemented by network nodes that determines (either probabilistically or deterministically) the permanence of certain blocks on the blockchain. An example of Confirmation Rule is the Bitcoin's longest chain Confirmation Rule where a block is confirmed (with high probability) when it has a sufficiently long chain of successors, its siblings have notably shorter successor chains, and network synchrony holds. In this work, we devise a Confirmation Rule for Ethereum's consensus protocol, Gasper. Initially, our focus is on develo** a rule specifically for LMD-GHOST, the component of Gasper responsible for ensuring dynamic availability. This is done independently of the influence of FFG-Casper, which is designed to finalize the blocks produced by LMD-GHOST. Subsequently, we build upon this rule to consider FFG-Casper's impact, aiming to achieve fast block confirmations through a heuristic that balances confirmation speed with a trade-off in safety guarantees. This refined Confirmation Rule could potentially standardize fast block confirmation within Gasper.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Formal Verification of the Ethereum 2.0 Beacon Chain
Authors:
Franck Cassez,
Joanne Fuller,
Aditya Asgaonkar
Abstract:
We report our experience in the formal verification of the reference implementation of the Beacon Chain. The Beacon Chain is the backbone component of the new Proof-of-Stake Ethereum 2.0 network: it is in charge of tracking information about the validators, their stakes, their attestations (votes) and if some validators are found to be dishonest, to slash them (they lose some of their stakes). The…
▽ More
We report our experience in the formal verification of the reference implementation of the Beacon Chain. The Beacon Chain is the backbone component of the new Proof-of-Stake Ethereum 2.0 network: it is in charge of tracking information about the validators, their stakes, their attestations (votes) and if some validators are found to be dishonest, to slash them (they lose some of their stakes). The Beacon Chain is mission-critical and any bug in it could compromise the whole network. The Beacon Chain reference implementation developed by the Ethereum Foundation is written in Python, and provides a detailed operational description of the state machine each Beacon Chain's network participant (node) must implement. We have formally specified and verified the absence of runtime errors in (a large and critical part of) the Beacon Chain reference implementation using the verification-friendly language Dafny. During the course of this work, we have uncovered several issues, proposed verified fixes. We have also synthesised functional correctness specifications that enable us to provide guarantees beyond runtime errors. Our software artefact is available at https://github.com/ConsenSys/eth2.0-dafny.
△ Less
Submitted 21 October, 2021;
originally announced October 2021.
-
Three Attacks on Proof-of-Stake Ethereum
Authors:
Caspar Schwarz-Schilling,
Joachim Neu,
Barnabé Monnot,
Aditya Asgaonkar,
Ertem Nusret Tas,
David Tse
Abstract:
Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators' profits and delay consensus decisions, and one where adversarial network delay is leveraged to stall consensus decisions indefinitely. We provide refined variants of these attacks, considerably relaxing the r…
▽ More
Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators' profits and delay consensus decisions, and one where adversarial network delay is leveraged to stall consensus decisions indefinitely. We provide refined variants of these attacks, considerably relaxing the requirements on adversarial stake and network timing, and thus rendering the attacks more severe. Combining techniques from both refined attacks, we obtain a third attack which allows an adversary with vanishingly small fraction of stake and no control over network message propagation (assuming instead probabilistic message propagation) to cause even long-range consensus chain reorganizations. Honest-but-rational or ideologically motivated validators could use this attack to increase their profits or stall the protocol, threatening incentive alignment and security of PoS Ethereum. The attack can also lead to destabilization of consensus from congestion in vote processing.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
Token Curated Registries - A Game Theoretic Approach
Authors:
Aditya Asgaonkar,
Bhaskar Krishnamachari
Abstract:
Token curated registries (TCRs) have been proposed recently as an approach to create and maintain high quality lists of resources or recommendations in a decentralized manner. Applications range from maintaining registries of web domains for advertising purposes (e.g., adChain) or restaurants, consumer products, etc. The registry is maintained through a combination of candidate applications requir…
▽ More
Token curated registries (TCRs) have been proposed recently as an approach to create and maintain high quality lists of resources or recommendations in a decentralized manner. Applications range from maintaining registries of web domains for advertising purposes (e.g., adChain) or restaurants, consumer products, etc. The registry is maintained through a combination of candidate applications requiring a token deposit, challenges based on token staking and token-weighted votes with a redistribution of tokens occurring as a consequence of the vote. We present a simplified mathematical model of a TCR and its challenge and voting process analyze it from a game-theoretic perspective. We derive some insights into conditions with respect to the quality of a candidate under which challenges occur, and under which the outcome is reject or accept. We also show that there are conditions under which the outcome may not be entirely predictable in the sense that everyone voting for accept and everyone voting for reject could both be Nash Equilibria outcomes. For such conditions, we also explore when a particular strategy profile may be payoff dominant. We identify ways in which our modeling can be extended and also some implications of our model with respect to the composition of TCRs.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
Solving the Buyer and Seller's Dilemma: A Dual-Deposit Escrow Smart Contract for Provably Cheat-Proof Delivery and Payment for a Digital Good without a Trusted Mediator
Authors:
Aditya Asgaonkar,
Bhaskar Krishnamachari
Abstract:
A fundamental problem for electronic commerce is the buying and selling of digital goods between individuals that may not know or trust each other. Traditionally, this problem has been addressed by the use of trusted third-parties such as credit-card companies, mediated escrows, legal adjudication, or reputation systems. Despite the rise of blockchain protocols as a way to send payments without tr…
▽ More
A fundamental problem for electronic commerce is the buying and selling of digital goods between individuals that may not know or trust each other. Traditionally, this problem has been addressed by the use of trusted third-parties such as credit-card companies, mediated escrows, legal adjudication, or reputation systems. Despite the rise of blockchain protocols as a way to send payments without trusted third parties, the important problem of exchanging a digital good for payment without trusted third parties has been paid much less attention. We refer to this problem as the Buyer and Seller's Dilemma and present for it a dual-deposit escrow trade protocol which uses double-sided payment deposits in conjunction with simple cryptographic primitives, and that can be implemented using a blockchain-based smart contract. We analyze our protocol as an extensive-form game and prove that the Sub-game Perfect Nash Equilibrium for this game is for both the buyer and seller to cooperate and behave honestly. We address this problem under the assumption that the digital good being traded is known and verifiable, with a fixed price known to both parties.
△ Less
Submitted 21 June, 2018;
originally announced June 2018.