Withdraw
Loading…
An alternative paradigm to analyze proof-of-stake protocols
Tran, Hung
Loading…
Permalink
https://hdl.handle.net/2142/110584
Description
- Title
- An alternative paradigm to analyze proof-of-stake protocols
- Author(s)
- Tran, Hung
- Issue Date
- 2021-04-27
- Director of Research (if dissertation) or Advisor (if thesis)
- Ren, Ling
- Department of Study
- Computer Science
- Discipline
- Computer Science
- Degree Granting Institution
- University of Illinois at Urbana-Champaign
- Degree Name
- M.S.
- Degree Level
- Thesis
- Keyword(s)
- Blockchain
- Proof of Stake
- Proof of Work
- Double-Spend
- Metric
- Paradigm
- Abstract
- In applications that use blockchains, Proof of Stake (PoS) chains have become an attractive alternative to more classical Proof of Work (PoW) chains due to their low transaction latency and cheap hardware requirements. Correct implementations of both types of chains provide security against the “double-spend” attack referenced in the original Bitcoin protocol. However, while PoW chains use cryptographic puzzle “mining” as a mechanism for block extension, PoS chains must utilize alternate methods of proposing blocks. As a result, when it is able to participate, an adversary targeting PoS chains can extend multiple blocks without making sacrifices in the strength of its attack. This extension of multiple blocks allows for the adversary to create forks of non-trivial length, which is not explored in PoW analysis. Such forks allow for additional adversarial strategies, and alter the random walk governing the security of the chain in ways that are difficult to monitor. In this paper, we will present a pair of metrics designed to accurately track the advantage gained by an adversary in a reasonable PoS setting. This pair of metrics, determined by the hidden progress of the adversary against publicly released chains, directly map to the adversary’s ability to remove committed blocks from the chain, and behave naturally in a walk detailing the lifetime of a chain. We offer these metrics for the simplification of further analysis of PoS chains and applications. Finally, we confirm previous results regarding the security of PoS chains. Through an analysis of our metric, we show that, like PoW chains, PoS chains are secure against double-spend attacks except for probability which decays exponentially with respect to chain length.
- Graduation Semester
- 2021-05
- Type of Resource
- Thesis
- Permalink
- http://hdl.handle.net/2142/110584
- Copyright and License Information
- Copyright 2021 Hung Tran
Owning Collections
Graduate Dissertations and Theses at Illinois PRIMARY
Graduate Theses and Dissertations at IllinoisDissertations and Theses - Computer Science
Dissertations and Theses from the Dept. of Computer ScienceManage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…