Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoWusing Taproot

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Blockchain systems based on a reusable resource, such as proof-of-stake (PoS), provide weaker security guarantees than those based on proof-of-work. Specifically, they are vulnerable to long-range attacks, where an adversary can corrupt prior participants in order to rewrite the full history of the chain. To prevent this attack on a PoS chain, we propose a protocol that checkpoints the state of the PoS chain to a proof-of-work blockchain such as Bitcoin. Our checkpointing protocol hence does not rely on any central authority. Our work uses Schnorr signatures and leverages Bitcoin recent Taproot upgrade, allowing us to create a checkpointing transaction of constant size. We argue for the security of our protocol and present an open-source implementation that was tested on the Bitcoin testnet.

Cite

CITATION STYLE

APA

Azouvi, S., & Vukolić, M. (2022). Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoWusing Taproot. In ConsensusDay 2022 - Proceedings of the 2022 ACM Workshop on Developments in Consensus, co-located with CCS 2022 (pp. 63–65). Association for Computing Machinery, Inc. https://doi.org/10.1145/3560829.3563563

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free