A Circuit Approach to Constructing Blockchains on Blockchains
- URL: http://arxiv.org/abs/2402.00220v4
- Date: Tue, 20 Aug 2024 07:18:25 GMT
- Title: A Circuit Approach to Constructing Blockchains on Blockchains
- Authors: Ertem Nusret Tas, David Tse, Yifei Wang,
- Abstract summary: We show how to build a more secure overlay blockchain by reading from and writing to a given set of blockchains.
Under the partially synchronous setting, we have the following results: 1) the serial composition, between two blockchains, yields an overlay blockchain that is safe if at least one of the two underlay blockchains is safe and that is live if both of them are live.
The results are also extended to the synchronous setting.
- Score: 21.354762805616875
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Since the creation of Bitcoin 15 years ago, there has been an explosion in the number of permissionless blockchains. Each of these blockchains provides an open ledger that anyone can read from and write to. In this multi-chain world, an important question emerges: how can we build a more secure overlay blockchain by reading from and writing to a given set of blockchains? Drawing an analogy with switching circuits, we approach the problem by defining two basic compositional operations between blockchains, serial and triangular compositions, and use these operations as building blocks to construct general overlay blockchains. Under the partially synchronous setting, we have the following results: 1) the serial composition, between two blockchains, yields an overlay blockchain that is safe if at least one of the two underlay blockchains is safe and that is live if both of them are live; 2) the triangular composition between three blockchains, akin to parallel composition of switching circuits, yields an overlay blockchain that is safe if all underlay blockchains are safe and that is live if over half of them are live; 3) repeated composition of these two basic operations can yield all possible tradeoffs of safety and liveness for an overlay blockchain built on arbitrary number of underlay chains. The results are also extended to the synchronous setting.
Related papers
- Zaptos: Towards Optimal Blockchain Latency [52.30047458198369]
We introduce Zaptos, a parallel pipelined architecture designed to minimize end-to-end latency.
Zaptos achieves a throughput of 20,000 transactions per second with sub-second latency.
arXiv Detail & Related papers (2025-01-18T00:22:22Z) - Towards the Blockchain Massive Adoption with Permissionless Storage [0.0]
In my thesis, new approaches are applied to solve the issues above.
The key contribution is the discovery of the useful PoW.
Based on this theory, a permissionless storage network is proposed as the new security engine for the blockchain.
arXiv Detail & Related papers (2024-07-25T04:28:52Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation [27.384225875585805]
We unveil a novel attack surface, i.e., the state storage, in blockchains.
Nurgle is the first Denial-of-Service attack targeting the state storage.
Nurgle forces blockchains to expend additional resources on state maintenance and verification, impairing their performance.
arXiv Detail & Related papers (2024-06-15T16:47:39Z) - Aegis: Tethering a Blockchain with Primary-Chain Stake [9.499962065972483]
We present a tethered-chain protocol called Aegis.
Aegis uses references from its blocks to primary blocks to define committees, checkpoints on the primary chain to perpetuate decisions, and resets to establish new committees when previous ones become obsolete.
arXiv Detail & Related papers (2024-06-09T19:53:48Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z) - BlockChain I/O: Enabling Cross-Chain Commerce [2.391161450948918]
We present BlockChain I/O, a framework for cross-chain commerce.
We show how to use BlockChain I/O to implement a cross-chain marketplace.
We also discuss how its desirable properties continue to hold in the end-to-end system.
arXiv Detail & Related papers (2023-08-04T06:51:50Z) - Novel Architecture to Create and Maintain Personal Blockchains [0.685316573653194]
We outline a potential blockchain use case for tracking financial transactions across multiple financial institutions.
We show the downsides of traditional centralized approaches and that blockchain approaches fail to give all the privacy and accessibility required for this use case.
This novel architecture combines the ease of use of public blockchains with the privacy of private blockchains by allowing users to create personal blockchains.
arXiv Detail & Related papers (2022-12-12T02:05:59Z) - Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities [45.90740335615872]
Bitcoin is the most secure blockchain in the world, supported by the immense hash power of its Proof-of-Work miners.
Proof-of-Stake chains are energy-efficient, have fast finality but face several security issues.
We show that these security issues are inherent in any PoS chain without an external trusted source.
We propose a new protocol, Babylon, where an off-the-shelf PoS protocol checkpoints onto Bitcoin to resolve these issues.
arXiv Detail & Related papers (2022-07-18T06:01:25Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Selective Deletion in a Blockchain [0.0]
We present the first concept for the selective deletion of single entries in a blockchain.
The general consensus algorithm is extended by the functionality of regularly creating summary blocks.
With a shifting marker of the Genesis Block, data can be deleted from the beginning of a blockchain.
arXiv Detail & Related papers (2021-01-14T08:06:37Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.