Practical Provably Secure Flooding for Blockchains


Loading...

Date

2023-01

Publication Type

Conference Paper

ETH Bibliography

yes

Citations

Altmetric

Data

Abstract

In recent years, permisionless blockchains have received a lot of attention both from industry and academia, where substantial effort has been spent to develop consensus protocols that are secure under the assumption that less than half (or a third) of a given resource (e.g., stake or computing power) is controlled by corrupted parties. The security proofs of these consensus protocols usually assume the availability of a network functionality guaranteeing that a block sent by an honest party is received by all honest parties within some bounded time. To obtain an overall protocol that is secure under the same corruption assumption, it is therefore necessary to combine the consensus protocol with a network protocol that achieves this property under that assumption. In practice, however, the underlying network is typically implemented by flooding protocols that are not proven to be secure in the setting where a fraction of the considered total weight can be corrupted. This has led to many so-called eclipse attacks on existing protocols and tailor-made fixes against specific attacks. To close this apparent gap, we present the first practical flooding protocol that provably delivers sent messages to all honest parties after a logarithmic number of steps. We prove security in the setting where all parties are publicly assigned a positive weight and the adversary can corrupt parties accumulating up to a constant fraction of the total weight. This can directly be used in the proof-of-stake setting, but is not limited to it. To prove the security of our protocol, we combine known results about the diameter of Erdős–Rényi graphs with reductions between different types of random graphs. We further show that the efficiency of our protocol is asymptotically optimal. The practicality of our protocol is supported by extensive simulations for different numbers of parties, weight distributions, and corruption strategies. The simulations confirm our theoretical results and show that messages are delivered quickly regardless of the weight distribution, whereas protocols that are oblivious of the parties’ weights completely fail if the weights are unevenly distributed. Furthermore, the average message complexity per party of our protocol is within a small constant factor of such a protocol.

Publication status

published

Book title

Advances in Cryptology – ASIACRYPT 2022

Volume

13791

Pages / Article No.

774 - 805

Publisher

Springer

Event

28th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2022)

Edition / version

Methods

Software

Geographic location

Date collected

Date created

Subject

Flooding networks; Peer-to-peer networks; Blockchain; Network layer; Multicast

Organisational unit

03338 - Maurer, Ueli (emeritus) / Maurer, Ueli (emeritus) check_circle

Notes

Funding

Related publications and datasets