Proof-of-Stake Longest Chain Protocols: Security vs Predictability

2Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Nakamoto longest chain protocol is remarkably simple and has been proven to provide security against any adversary with less than 50% of the total hashing power. Proof-of-stake (PoS) protocols are an energy efficient alternative; however existing protocols adopting Nakamoto's longest chain design achieve provable security only by allowing long-term predictability, subjecting the system to serious bribery attacks. In this paper, we prove that a natural longest chain PoS protocol with similar predictability as Nakamoto's PoW protocol can achieve security against any adversary with less than 1/(1+e) fraction of the total stake. Moreover we propose a new family of longest chain PoS protocols with a formal proof of their security against a 50% adversary, while only requiring short-term predictability.

Cite

CITATION STYLE

APA

Bagaria, V., Dembo, A., Kannan, S., Oh, S., Tse, D., Viswanath, P., … Zeitouni, O. (2022). Proof-of-Stake Longest Chain Protocols: Security vs Predictability. In ConsensusDay 2022 - Proceedings of the 2022 ACM Workshop on Developments in Consensus, co-located with CCS 2022 (pp. 29–42). Association for Computing Machinery, Inc. https://doi.org/10.1145/3560829.3563559

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free