A methodology for a probabilistic security analysis of sharding-based blockchain protocols

13Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the context of blockchain protocols, each node stores the entire state of the network and processes all transactions. This ensures high security but limits scalability. Sharding is one of the most promising solutions to scale blockchain. In this paper, we analyze the security of three Sharding-based protocols using tail inequalities. The key contribution of our paper is to upper bound the failure probability for one committee and so for each epoch using tail inequalities for sums of bounded hypergeometric and binomial distributions. Two tail inequalities are used: Hoeffding and Chvátal. The first tail (Hoeffding inequality) is much more precise bound. The second (Chvátal inequality) is an exponential bound; it is simple to compute but weaker bound compared to Hoeffding. Our contribution is an alternative solution when the failure probability simulations are impractical. To show the effectiveness of our analysis, we perform simulations of the exponential bound.

Cite

CITATION STYLE

APA

Hafid, A., Hafid, A. S., & Samih, M. (2020). A methodology for a probabilistic security analysis of sharding-based blockchain protocols. In Advances in Intelligent Systems and Computing (Vol. 1010, pp. 101–109). Springer Verlag. https://doi.org/10.1007/978-3-030-23813-1_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free