论文标题
防御特佐斯的恶意重复证明
Defending Against Malicious Reorgs in Tezos Proof-of-Stake
论文作者
论文摘要
区块链的意图是不可变的,因此能够通过链重组删除交易的攻击者(恶意的reorg)可以执行有利可图的双重攻击。我们研究攻击者可以在TEZOS验证方案方案中执行Reorgs的速度。例如,拥有40%占有力的攻击者能够以每天平均每天一次的一次恶意重复执行恶意重复,并且随着Stateking Power的增长超过40%,攻击概率超级线性增加。此外,Tezos协议的攻击者事先知道何时出现攻击机会,并可以使用这些知识来安排交易以双重元素。我们表明,在特定情况下,可以调整TEZOS协议以防止深度重新构造。例如,我们演示了协议参数,这些参数降低了40%攻击者的长度-20 reorg机会的速率,将其降低了两个数量级。我们还观察到优化对深度重新核心的鲁棒性(可能是净盈利的昂贵偏差,因为它们能够使双重元素具有净收入)与自私采矿的稳健性(挖掘偏差,即使没有双重支出也会有利可图的较短的偏差)。也就是说,最佳保护的参数使另一个攻击变得容易。最后,我们开发了一种仅使用公开可用信息来监视Tezos区块链健康的方法。
Blockchains are intended to be immutable, so an attacker who is able to delete transactions through a chain reorganization (a malicious reorg) can perform a profitable double-spend attack. We study the rate at which an attacker can execute reorgs in the Tezos Proof-of-Stake protocol. As an example, an attacker with 40% of the staking power is able to execute a 20-block malicious reorg at an average rate of once per day, and the attack probability increases super-linearly as the staking power grows beyond 40%. Moreover, an attacker of the Tezos protocol knows in advance when an attack opportunity will arise, and can use this knowledge to arrange transactions to double-spend. We show that in particular cases, the Tezos protocol can be adjusted to protect against deep reorgs. For instance, we demonstrate protocol parameters that reduce the rate of length-20 reorg opportunities for a 40% attacker by two orders of magnitude. We also observe a trade-off between optimizing for robustness to deep reorgs (costly deviations that may be net profitable because they enable double-spends) and robustness to selfish mining (mining deviations that result in typically short reorgs that are profitable even without double-spends). That is, the parameters that optimally protect against one make the other attack easy. Finally, we develop a method that monitors the Tezos blockchain health with respect to malicious reorgs using only publicly available information.