Blockchain protocols implement total-order broadcast in a permissionless setting, where processes can freely join and leave. In such a setting, to safeguard against Sybil attacks, correct processes rely on cryptographic proofs tied to a particular type of resource to make them eligible to order transactions. For example, in the case of Proof-of-Work (PoW), this resource is computation, and the proof is a solution to a computationally hard puzzle. Conversely, in Proof-of-Stake (PoS), the resource corresponds to the number of coins that every process in the system owns, and a secure lottery selects a process for participation proportionally to its coin holdings. Although many resource-based blockchain protocols are formally proven secure in the literature, the existing security proofs fail to demonstrate why particular types of resources cause the blockchain protocols to be vulnerable to distinct classes of attacks. For instance, PoS systems are more vulnerable to long-range attacks, where an adversary corrupts past processes to re-write the history, than Proof-of-Work and Proof-of-Storage systems. Proof-of-Storage-based and Proof-of-Stake-based protocols are both more susceptible to private double-spending attacks than Proof-of-Work-based protocols; in this case, an adversary mines its chain in secret without sharing its blocks with the rest of the processes until the end of the attack. In this paper, we formally characterize the properties of resources through an abstraction called resource allocator and give a framework for understanding longest-chain consensus protocols based on different underlying resources. In addition, we use this resource allocator to demonstrate security trade-offs between various resources focusing on well-known attacks (e.g., the long-range attack and nothing-at-stake attacks).
翻译:在这种环境下,为了防范Sybil袭击,纠正程序依赖于与某类资源挂钩的加密证据,以使他们有资格下令交易。例如,在“工作证明”中,这种资源是计算,而证据则是计算困难的解答。相反,在“获取证明”(POS)中,资源与系统内部每个程序都可以自由加入和自由离开的硬币数量相对应。在这种环境下,为了防范Sybil袭击,纠正程序依赖于与某类资源挂钩的加密证据。尽管许多基于资源的链条协议在文献中被正式证明是安全的,但现有的安全证据无法证明为什么某些类型的资源使得链条协议容易受到不同种类的攻击。例如,Pos系统更容易受到远程袭击的解决方案。在“获取证明”(POS)中,长期腐败者让历史重现的过程,而不是系统内部所有攻击的“测试”和“证据”系统选择了参与过程。在文献中,基于资源链条协议中,以“基于资源链路”的验证,在纸质交易中显示其内部资源共享中,在纸质协议中,这种基于安全攻击的系统之间,在纸质协议中,以安全交易中,在纸质交易中,以安全交易中,以安全交易中,在纸质交易中,以交易中以交易中,在纸质交易中,以交易中,在交易中,在纸质交易中,在纸质交易中,在纸面协议中,在纸面交易中,在交易中,在交易中,在纸面协议以交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在纸面交易中,在纸面协议中,在纸面交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在纸面上,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在交易中,在纸面交易中,在纸面交易中,在交易中,在交易中,在交易中,