Remote Staking with Optimal Economic Safety
- URL: http://arxiv.org/abs/2408.01896v4
- Date: Wed, 30 Apr 2025 02:55:26 GMT
- Title: Remote Staking with Optimal Economic Safety
- Authors: Xinshu Dong, Orfeas Stefanos Thyfronitis Litos, Ertem Nusret Tas, David Tse, Robin Linus Woll, Lei Yang, Mingchao Yu,
- Abstract summary: We introduce remote staking as a technique that allows Bitcoin holders to use their idle assets to secure PoS chains.<n>In the event of a safety violation on the PoS chain, at least one-third of the Bitcoin stake securing the chain is slashed.<n>A version of this protocol was deployed to mainnet in August 2024 and has since accumulated over 4.1 billion USD worth of staked bitcoins.
- Score: 9.685926828113631
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The idea of security sharing traces back to Nakamoto's introduction of merge mining, a technique that enables Bitcoin miners to reuse their hash power to bootstrap and secure other Proof-of-Work (PoW) blockchains. However, with the rise of Proof-of-Stake (PoS) chains (where merge mining is inapplicable) there is a need for new methods of Bitcoin security sharing. In this paper, we introduce remote staking as a technique that allows Bitcoin holders to use their idle assets to secure PoS chains. Our remote staking protocol achieves optimal economic safety: in the event of a safety violation on the PoS chain, at least one-third of the Bitcoin stake securing the chain is slashed. We make two key technical contributions to enable this: 1) A cryptographic protocol that enables slashing of Bitcoin stake despite the absence of smart contracts on Bitcoin; 2) A secure unbonding mechanism that guarantees slashing can occur before the stake is withdrawn from Bitcoin if a safety violation occurs on the PoS chain. Our design is entirely modular and can be integrated with any PoS chain as the security consumer and any chain (including Bitcoin) as the security provider. A version of this protocol was deployed to mainnet in August 2024 and has since accumulated over 4.1 billion USD worth of staked bitcoins.
Related papers
- A Multi-Layered Security Analysis of Blockchain Systems: From Attack Vectors to Defense and System Hardening [1.0683698080190929]
The application of Bitcoin enables people to understand blockchain technology gradually.
With the initial application of blockchain technology on the Internet, the security of blockchain technology has also been widely concerned.
This paper first analyzes the security threats faced by the application digital currency trading platform of the blockchain system.
Then analyzes the security problems of smart contract closely related to blockchain 2.0, and then analyzes and studies the security threats of blockchain public chain, consensus mechanism, and P2P.
arXiv Detail & Related papers (2025-04-12T11:23:47Z) - Union: A Trust-minimized Bridge for Rootstock [0.3374875022248865]
We present Union, a trust-minimized bridge protocol that enables secure transfer of BTC between Bitcoin and a secondary blockchain.
Union employs a multi-party variant of BitVMX, an optimistic proving system on Bitcoin, to create a bridge that operates securely under the assumption that at least one participant remains honest.
arXiv Detail & Related papers (2025-01-13T16:03:51Z) - SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection [46.68279506084277]
This work proposes SPOQchain, a novel blockchain-based platform that provides comprehensive traceability and originality verification.
It provides an analysis of privacy and security aspects, demonstrating the need and qualification of SPOQchain for the future of supply chain tracing.
arXiv Detail & Related papers (2024-08-30T07:15:43Z) - Validation of the Results of Cross-chain Smart Contract Based on Confirmation Method [0.3807314298073301]
We propose a method for validating cross-chain smart contract results.
Our approach emphasizes consumer blockchain execution of cross-chain smart contracts of producer blockchain.
Our verification results highlight the feasibility of cross-chain validation at the smart contract level.
arXiv Detail & Related papers (2024-08-19T13:05:32Z) - Towards the Blockchain Massive Adoption with Permissionless Storage [0.0]
In my thesis, new approaches are applied to solve the issues above.
The key contribution is the discovery of the useful PoW.
Based on this theory, a permissionless storage network is proposed as the new security engine for the blockchain.
arXiv Detail & Related papers (2024-07-25T04:28:52Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - S3C2 Summit 2024-03: Industry Secure Supply Chain Summit [51.12259456590232]
Supply chain security has become a very important vector to consider when defending against adversary attacks.
On March 7th, 2024 researchers from the Secure Software Supply Chain Center (S3C2) gathered 14 industry leaders, developers and consumers of the open source ecosystem to discuss the state of supply chain security.
The goal of the summit is to share insights between companies and developers alike to foster new collaborations and ideas moving forward.
arXiv Detail & Related papers (2024-05-14T16:53:14Z) - Model Supply Chain Poisoning: Backdooring Pre-trained Models via Embedding Indistinguishability [61.549465258257115]
We propose a novel and severer backdoor attack, TransTroj, which enables the backdoors embedded in PTMs to efficiently transfer in the model supply chain.
Experimental results show that our method significantly outperforms SOTA task-agnostic backdoor attacks.
arXiv Detail & Related papers (2024-01-29T04:35:48Z) - STAKESURE: Proof of Stake Mechanisms with Strong Cryptoeconomic Safety [6.787433978322371]
As of July 15, 2023, Ethererum, which is a Proof-of-Stake (PoS) blockchain, has around 410 Billion USD in total assets on chain.
As the amount staked is far less (11x less) than the value secured, the blockchain is insecure "over-leveraged" in a cryptoeconomic sense.
We formalize a model for analyzing the cryptoeconomic safety of PoS blockchain, which separately analyzes the cost-of-corruption, the cost incurred by an attacker, and the profit-from-corruption.
arXiv Detail & Related papers (2024-01-11T10:03:00Z) - The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web [39.96427593096699]
We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
arXiv Detail & Related papers (2024-01-09T16:35:25Z) - Better Safe than Sorry: Recovering after Adversarial Majority [8.804839990789967]
In a synchronous network, it is possible to maintain safety for all clients even during adversarial majority, and recover liveness after honest majority is restored.
Our solution takes the form of a recovery gadget that can be applied to any protocol with certificates.
arXiv Detail & Related papers (2023-10-10T06:15:30Z) - Resilient Consensus Sustained Collaboratively [6.090550359575682]
We present the design of our Power-of-Collaboration protocol, which guards existing PoS/BFT blockchains against long-range attacks.
PoC guarantees fairness and accountability and only marginally degrades the throughput of the underlying system.
arXiv Detail & Related papers (2023-02-05T07:33:57Z) - Refined Bitcoin Security-Latency Under Network Delay [35.16231062731263]
We study how secure a block is after it becomes $k$-deep in the chain.
We analyze the race between adversarial and honest chains in three different phases.
We find the probability distribution of the growth of the adversarial chains under models similar to those in [Guo, Ren; AFT 2022] when a target block becomes $k$-deep in the chain.
arXiv Detail & Related papers (2022-12-02T18:54:30Z) - Towards Security Enhancement of Blockchain-based Supply Chain Management [0.0]
The cybersecurity of modern systems has dramatically increased attention from both industrial and academia perspectives.
This paper shed the light on the blockchain and specifically on a smart contract technology which been used to handle the process of creation, verification and checking data over the supply chain management process.
arXiv Detail & Related papers (2022-09-11T18:52:11Z) - Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities [45.90740335615872]
Bitcoin is the most secure blockchain in the world, supported by the immense hash power of its Proof-of-Work miners.
Proof-of-Stake chains are energy-efficient, have fast finality but face several security issues.
We show that these security issues are inherent in any PoS chain without an external trusted source.
We propose a new protocol, Babylon, where an off-the-shelf PoS protocol checkpoints onto Bitcoin to resolve these issues.
arXiv Detail & Related papers (2022-07-18T06:01:25Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Short Paper: Design and Evaluation of Privacy-preserved Supply Chain
System based on Public Blockchain [1.2495265936084994]
We propose a method for preserving privacy while securing traceability in a supply chain system using public blockchain (PBC)
The proposed method preserves privacy by concealing the distribution information via encryption.
We implement the proposed method on smart contracts and evaluate cost performance based on transaction fees.
arXiv Detail & Related papers (2020-04-16T11:30:39Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.