Censorship Resistance in On-Chain Auctions (2301.13321v2)
Abstract: Modern blockchains guarantee that submitted transactions will be included eventually; a property formally known as liveness. But financial activity requires transactions to be included in a timely manner. Unfortunately, classical liveness is not strong enough to guarantee this, particularly in the presence of a motivated adversary who benefits from censoring transactions. We define censorship resistance as the amount it would cost the adversary to censor a transaction for a fixed interval of time as a function of the associated tip. This definition has two advantages, first it captures the fact that transactions with a higher miner tip can be more costly to censor, and therefore are more likely to swiftly make their way onto the chain. Second, it applies to a finite time window, so it can be used to assess whether a blockchain is capable of hosting financial activity that relies on timely inclusion. We apply this definition in the context of auctions. Auctions are a building block for many financial applications, and censoring competing bids offers an easy-to-model motivation for our adversary. Traditional proof-of-stake blockchains have poor enough censorship resistance that it is difficult to retain the integrity of an auction when bids can only be submitted in a single block. As the number of bidders $n$ in a single block auction increases, the probability that the winner is not the adversary, and the economic efficiency of the auction, both decrease faster than $1/n$. Running the auction over multiple blocks, each with a different proposer, alleviates the problem only if the number of blocks grows faster than the number of bidders. We argue that blockchains with more than one concurrent proposer have can have strong censorship resistance. We achieve this by setting up a prisoner's dilemma among the proposers using conditional tips.
- Akbarpour, Mohammad and Shengwu Li, “Credible Mechanisms.,” in “EC” 2018, p. 371.
- by same author and by same author, “Credible auctions: A trilemma,” Econometrica, 2020, 88 (2), 425–467.
- Blass, Erik-Oliver and Florian Kerschbaum, “Strain: A secure auction for blockchains,” in “European Symposium on Research in Computer Security” Springer 2018, pp. 87–110.
- Budish, Eric, Peter Cramton, and John Shim, “The high-frequency trading arms race: Frequent batch auctions as a market design response,” The Quarterly Journal of Economics, 2015, 130 (4), 1547–1621.
- Buterin, Vitalik, “The Problem of Censorship,” https://blog.ethereum.org/2015/06/06/the-problem-of-censorship Jun 2015.
- by same author, “State of research: increasing censorship resistance of transactions under proposer/builder separation (PBS),” https://notes.ethereum.org/@vbuterin/pbs_censorship_resistance Jun 2021.
- Choudhuri, Arka Rai, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, and Ian Miers, “Fairness in an unfair world: Fair multiparty computation from public bulletin boards,” in “Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security” 2017, pp. 719–728.
- Daian, Philip, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels, “Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability,” in “2020 IEEE Symposium on Security and Privacy (SP)” IEEE 2020, pp. 910–927.
- Elkind, Edith and Helger Lipmaa, “Interleaving cryptography and mechanism design: The case of online auctions,” in “Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers 8” Springer 2004, pp. 117–131.
- Ferreira, Matheus VX and David C Parkes, “Credible Decentralized Exchange Design via Verifiable Sequencing Rules,” arXiv preprint arXiv:2209.15569, 2022.
- by same author and S Matthew Weinberg, “Credible, truthful, and two-round (optimal) auctions via cryptographic commitments,” in “Proceedings of the 21st ACM Conference on Economics and Computation” 2020, pp. 683–712.
- Flashbots, “The future of MeV is suave: Flashbots,” Nov 2022.
- Frankie, Dan Robinson, Dave White, and andy8052, “Gradual Dutch Auctions,” Apr 2022.
- Galal, Hisham S and Amr M Youssef, “Verifiable sealed-bid auction on the ethereum blockchain,” in “Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers 22” Springer 2019, pp. 265–278.
- Johnson, Nicholas AG, Theo Diamandis, Alex Evans, Henry de Valence, and Guillermo Angeris, “Concave Pro-rata Games,” 2022.
- Kelkar, Mahimna, Fan Zhang, Steven Goldfeder, and Ari Juels, “Order-fairness for byzantine consensus,” in “Annual International Cryptology Conference” Springer 2020, pp. 451–480.
- by same author, Soubhik Deb, Sishan Long, Ari Juels, and Sreeram Kannan, “Themis: Fast, strong order-fairness in byzantine consensus,” Cryptology ePrint Archive, 2021.
- Kulkarni, Kshitij, Matheus VX Ferreira, and Tarun Chitra, “Credibility and Incentives in Gradual Dutch Auctions,” arXiv, 2023.
- by same author, Theo Diamandis, and Tarun Chitra, “Towards a theory of maximal extractable value i: Constant function market makers,” arXiv preprint arXiv:2207.11835, 2022.
- Lee, Byoungcheon, Kwangjo Kim, and Joongsoo Ma, “Efficient public auction with one-time registration and public verifiability,” in “Progress in Cryptology—INDOCRYPT 2001: Second International Conference on Cryptology in India Chennai, India, December 16–20, 2001 Proceedings 2” Springer 2001, pp. 162–174.
- Milionis, Jason, Dean Hirsch, Andy Arditi, and Pranav Garimidi, “A Framework for Single-Item NFT Auction Mechanism Design,” in “Proceedings of the 2022 ACM CCS Workshop on Decentralized Finance and Security” 2022, pp. 31–38.
- Monnot, Barnabe, “Unbundling PBS: Towards protocol-enforced proposer commitments (PEPC),” https://ethresear.ch/t/unbundling-pbs-towards-protocol-enforced-proposer-commitments-pepc/13879?u=barnabe Oct 2022.
- Suzuki, Koutarou and Makoto Yokoo, “Secure generalized vickrey auction using homomorphic encryption,” in “Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003. Revised Papers 7” Springer 2003, pp. 239–249.
- Szabo, Nick, “Formalizing and securing relationships on public networks,” First monday, 1997.
- Wahrstätter, Anton, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz et al., “Blockchain Censorship,” arXiv preprint arXiv:2305.18545, 2023.