Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake

Matheus V. X. Ferreira, Ye Lin, Sally Hahn, S. Weinberg, Catherine Yu
{"title":"Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake","authors":"Matheus V. X. Ferreira, Ye Lin, Sally Hahn, S. Weinberg, Catherine Yu","doi":"10.1145/3490486.3538337","DOIUrl":null,"url":null,"abstract":"Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols. In cryptographic self-selection, each round r has a seed Qr. In round r, each account owner is asked to digitally sign Qr, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round r, and their credential becomes the seed Qr+1. Such protocols leave open the possibility of manipulation: a user who owns multiple accounts that each produce low-scoring credentials in round r can selectively choose which ones to broadcast in order to influence the seed for round r+1. Indeed, the user can pre-compute their credentials for round r+1 for each potential seed, and broadcast only the credential (among those with low enough score to be leader) that produces the most favorable seed. We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than 3-5/2 ~38% of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.","PeriodicalId":209859,"journal":{"name":"Proceedings of the 23rd ACM Conference on Economics and Computation","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 23rd ACM Conference on Economics and Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3490486.3538337","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols. In cryptographic self-selection, each round r has a seed Qr. In round r, each account owner is asked to digitally sign Qr, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round r, and their credential becomes the seed Qr+1. Such protocols leave open the possibility of manipulation: a user who owns multiple accounts that each produce low-scoring credentials in round r can selectively choose which ones to broadcast in order to influence the seed for round r+1. Indeed, the user can pre-compute their credentials for round r+1 for each potential seed, and broadcast only the credential (among those with low enough score to be leader) that produces the most favorable seed. We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than 3-5/2 ~38% of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
权益证明中针对密码自选择的最优策略挖掘
加密自选择是一种用于选择现代权益证明共识协议领导者的子程序。在密码学自选择中,每轮r都有一个种子Qr。在r轮中,每个帐户所有者被要求对Qr进行数字签名,散列他们的数字签名以生成凭据,然后将此凭据广播到整个网络。一个公开的函数以某种方式对每个凭据进行评分,以便最低评分凭据的分布与每个帐户拥有的权益的分布相同。广播得分最低的凭据的用户是r轮的领先者,他们的凭据成为种子Qr+1。这样的协议留下了操纵的可能性:拥有多个帐户的用户,每个帐户在第r轮中产生低得分凭据,可以选择性地选择广播哪些帐户,以影响第r+1轮的种子。实际上,用户可以为每个潜在种子预先计算r+1轮的凭据,并只广播产生最有利种子的凭据(在那些得分低到足以成为领导者的凭据中)。我们考虑一个对手,他希望最大化他们所拥有的账户领先的预期回合数。我们表明,这样的对手总是从偏离预期协议中获益,而不管所控制的股份的比例是多少。我们描述最优策略;首先,通过证明存在最优的正循环策略,当对手拥有超过3-5/2 ~38%的股权。然后,我们给出了一个马尔可夫决策过程公式来计算最优策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On Two-sided Matching in Infinite Markets Herd Design Efficient Capacity Provisioning for Firms with Multiple Locations: The Case of the Public Cloud Tight Incentive Analysis on Sybil Attacks to Market Equilibrium of Resource Exchange over General Networks General Graphs are Easier than Bipartite Graphs: Tight Bounds for Secretary Matching
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1