Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis

被引:5
作者
Hafid, Abdelatif [1 ]
Hafid, Abdelhakim Senhaji [1 ]
Makrakis, Dimitrios [2 ]
机构
[1] Univ Montreal, Dept Comp Sci & Operat Res, Montreal, PQ H3T 1J4, Canada
[2] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON K1N 6N5, Canada
关键词
security analysis; blockchain; probabilistic analysis; sharding-based blockchain protocols; malicious nodes; proof of stake; practical Byzantine fault tolerance;
D O I
10.3390/s23052819
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Blockchain technology has been gaining great interest from a variety of sectors including healthcare, supply chain, and cryptocurrencies. However, Blockchain suffers from a limited ability to scale (i.e., low throughput and high latency). Several solutions have been proposed to tackle this. In particular, sharding has proved to be one of the most promising solutions to Blockchain's scalability issue. Sharding can be divided into two major categories: (1) Sharding-based Proof-of-Work (PoW) Blockchain protocols, and (2) Sharding-based Proof-of-Stake (PoS) Blockchain protocols. The two categories achieve good performances (i.e., good throughput with a reasonable latency), but raise security issues. This article focuses on the second category. In this paper, we start by introducing the key components of sharding-based PoS Blockchain protocols. We then briefly introduce two consensus mechanisms, namely PoS and practical Byzantine Fault Tolerance (pBFT), and discuss their use and limitations in the context of sharding-based Blockchain protocols. Next, we provide a probabilistic model to analyze the security of these protocols. More specifically, we compute the probability of committing a faulty block and measure the security by computing the number of years to fail. We achieve a number of years to fail of approximately 4000 in a network of 4000 nodes, 10 shards, and a shard resiliency of 33%.
引用
收藏
页数:11
相关论文
共 24 条
[1]   Blockchain Applications - Usage in Different Domains [J].
Abou Jaoude, Joe ;
Saade, Raafat George .
IEEE ACCESS, 2019, 7 :45360-45381
[2]  
Almaiah MA, 2022, SENSORS-BASEL, V22, DOI 10.3390/s22041448
[3]  
[Anonymous], About Us
[4]  
[Anonymous], NXT NXT PEER PEER DI
[5]  
[Anonymous], Harmony: Technical whitepaper
[6]  
[Anonymous], SHARDUS WHITE PAPER
[7]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[8]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[9]  
Hafid A., 2022, P 4 INT C BLOCKCHAIN
[10]   A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols [J].
Hafid, Abdelatif ;
Hafid, Abdelhakim Senhaji ;
Samih, Mustapha .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) :126-136