The Economic Limits of Permissionless Consensus (2405.09173v2)
Abstract: The purpose of a consensus protocol is to keep a distributed network of nodes "in sync," even in the presence of an unpredictable communication network and adversarial behavior by some of the participating nodes. In the permissionless setting, these nodes may be operated by unknown players, with each player free to use multiple identifiers and to start or stop running the protocol at any time. Establishing that a permissionless consensus protocol is "secure" thus requires both a distributed computing argument (that the protocol guarantees consistency and liveness unless the fraction of adversarial participation is sufficiently large) and an economic argument (that carrying out an attack would be prohibitively expensive for an attacker). There is a mature toolbox for assembling arguments of the former type; the goal of this paper is to lay the foundations for arguments of the latter type. An ideal permissionless consensus protocol would, in addition to satisfying standard consistency and liveness guarantees, render consistency violations prohibitively expensive for the attacker without collateral damage to honest participants. We make this idea precise with our notion of the EAAC (expensive to attack in the absence of collapse) property, and prove the following results: 1. In the synchronous and dynamically available setting, with an adversary that controls at least one-half of the overall resources, no protocol can be EAAC. 2. In the partially synchronous and quasi-permissionless setting, with an adversary that controls at least one-third of the overall resources, no protocol can be EAAC. 3. In the synchronous and quasi-permissionless setting, there is a proof-of-stake protocol that, provided the adversary controls less than two-thirds of the overall stake, satisfies the EAAC property. All three results are optimal with respect to the size of the adversary.
- Joseph Bonneau. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus. In Financial Cryptography and Data Security: 20th International Conference, pages 19–26. Springer, 2016.
- Ethan Buchman. Tendermint: Byzantine fault tolerance in the age of blockchains. PhD thesis, 2016.
- Ethan Buchman and Jae Kwon and Zarko Milosevic. The latest gossip on BFT consensus. arXiv preprint arXiv:1807.04938, 2018.
- Eric Budish. The economic limits of bitcoin and the blockchain. Technical report, National Bureau of Economic Research, 2018.
- Eric Budish. Trust at scale: The economic limits of cryptocurrencies and blockchains. Technical report, Becker Friedman Institute, 2023.
- Vitalik Buterin. Slasher: A Punitive Proof-of-Stake Algorithm, 2014. Accessed on 4th April, 2024. URL: https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-stake-algorithm.
- Vitalik Buterin. Proof-of-stake: How I learned to love weak subjectivity, 2014. Accessed on 8th February, 2024. URL: https://blog.ethereum.org/2014/11/25/proof-stake-learned-love-weak-subjectivity.
- Vitalik Buterin. A proof of stake design philosophy, 2016. Accessed on 12th February, 2024. URL: https://medium.com/@VitalikButerin/a-proof-of-stake-design-philosophy-506585978d51.
- Vitalik Buterin. Minimal slashing conditions, 2017. Accessed on 12th February, 2024. URL: https://medium.com/@VitalikButerin/minimal-slashing-conditions-20f0b500fc6c.
- Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437, 2017.
- Introduction to reliable and secure distributed programming. Springer Science & Business Media, 2011.
- Practical byzantine fault tolerance. In OsDI, volume 99, pages 173–186, 1999.
- Algorand agreement: Super fast and partition resilient byzantine agreement. IACR Cryptol. ePrint Arch., 2018:377, 2018.
- Algorand. arXiv preprint arXiv:1607.01341, 2016.
- Polygraph: Accountable byzantine agreement. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), pages 403–413. IEEE, 2021.
- As easy as abc: Optimal (a) ccountable (b) yzantine (c) onsensus is easy! Journal of Parallel and Distributed Computing, 181:104743, 2023.
- Crime and punishment in distributed byzantine decision tasks. In 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), pages 34–44. IEEE, 2022.
- The chia network blockchain. 2019.
- Snow white: Robustly reconfigurable consensus and applications to provably secure proof of stake. In Financial Cryptography and Data Security: 23rd International Conference, pages 23–41. Springer, 2019.
- STAKESURE: Proof of Stake Mechanisms with Strong Cryptoeconomic Safety. arXiv preprint arXiv:2401.05797, 2024.
- Authenticated algorithms for Byzantine agreement. In SIAM Journal on Computing, vol 12, 4, pages 656-666, SIAM, 1983.
- Consensus in the presence of partial synchrony. Journal of the ACM, 35(2):288–323, 1988.
- Joshua S. Gans and Hanna Halaburda. “Zero cost” majority attacks on permissionless blockchains. SSRN preprint 4505460, 2023.
- The bitcoin backbone protocol: Analysis and applications. 2018.
- The microeconomics of cryptocurrencies. Journal of Economic Literature, 60(3):971–1013, 2022.
- Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference, pages 357–388. Springer, 2017.
- Jae Kwon. Tendermint: Consensus without Mining. 2014.
- The Byzantine generals problem. In Concurrency: the works of Leslie Lamport, pages 203–226, 2019.
- Can open decentralized ledgers be economically secure? IACR Cryptol. ePrint Arch., 2023:1516, 2023.
- Permissionless consensus. arXiv preprint arXiv:2304.14701, 2023.
- Nancy A Lynch. Distributed algorithms. Elsevier, 1996.
- Satoshi Nakamoto et al. Bitcoin: A peer-to-peer electronic cash system.(2008), 2008.
- Cogsworth: Byzantine view synchronization. 2021.
- The availability-accountability dilemma and its resolution via accountability gadgets. In International Conference on Financial Cryptography and Data Security, pages 541–559. Springer, 2022.
- Zlb: A blockchain to tolerate colluding majorities. arXiv preprint arXiv:2007.10541, 2020.
- {{\{{IA-CCF}}\}}: Individual accountability for permissioned ledgers. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pages 467–491, 2022.
- Bft protocol forensics. In Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pages 1722–1743, 2021.
- Better safe than sorry: Recovering after adversarial majority. arXiv preprint arXiv:2310.06338, 2023.
- Bitcoin-enhanced proof-of-stake security: Possibilities and impossibilities. In 2023 IEEE Symposium on Security and Privacy (SP), pages 126–145. IEEE, 2023.
- Babylon: Reusing bitcoin mining to enhance proof-of-stake security. arXiv preprint arXiv:2201.07946, 2022.
- HotStuff: Bft consensus with linearity and responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, pages 347–356, 2019.