but why does it work
play

But Why Does it Work? A Rational Protocol Design Treatment of - PowerPoint PPT Presentation

But Why Does it Work? A Rational Protocol Design Treatment of Bitcoin Christian Badertscher Juan Garay Ueli Maurer Daniel Tschudi ETH Zurich Texas A&M ETH Zurich ETH Zurich Vassilis Zikas University of Edinburgh & IOHK EUROCRYPT


  1. But Why Does it Work? A Rational Protocol Design Treatment of Bitcoin Christian Badertscher Juan Garay Ueli Maurer Daniel Tschudi ETH Zurich Texas A&M ETH Zurich ETH Zurich Vassilis Zikas University of Edinburgh & IOHK EUROCRYPT 2018

  2. The Evolution of Bitcoin: A Partial View Time

  3. The Evolution of Bitcoin: A Partial View Time And Nakamoto said: 2008/09 White Paper & Genesis Let there be Bitcoin…

  4. The Evolution of Bitcoin: A Partial View Time And Nakamoto said: 2008/09 White Paper & Genesis Let there be Bitcoin… The Bitcoin community

  5. The Evolution of Bitcoin: A Partial View Time And Nakamoto said: 2008/09 White Paper & Genesis Let there be Bitcoin… The Bitcoin community Rational analysis and attacks • Selfish Mining: Bitcoin is not an equilibrium strategy [ES14] • ….

  6. The Evolution of Bitcoin: A Partial View Time And Nakamoto said: 2008/09 White Paper & Genesis Let there be Bitcoin… The Bitcoin community Rational analysis and attacks • Selfish Mining: Bitcoin is not an equilibrium strategy [ES14] • …. Cryptographic analysis: Backbone (consensus layer) is secure if and only if the computing power of adversarial nodes does not form a majority [GKL15, PSS17 ]

  7. The Evolution of Bitcoin: A Partial View Time And Nakamoto said: 2008/09 White Paper & Genesis Let there be Bitcoin… The Bitcoin community Rational analysis and attacks • Selfish Mining: Bitcoin is not an equilibrium strategy [ES14] • …. Cryptographic analysis: Backbone (consensus layer) is secure if and only if the computing power of adversarial nodes does not form a majority [GKL15, PSS17 ]

  8. The Evolution of Bitcoin: A Partial View Time And Nakamoto said: 2008/09 White Paper & Genesis Let there be Bitcoin… The Bitcoin community Rational analysis and attacks • Selfish Mining: Bitcoin is not an equilibrium strategy [ES14] • …. Cryptographic analysis: Backbone (consensus layer) is secure if and only if the computing power of adversarial nodes does not form a majority [GKL15, PSS17 ] 2018 Bitcoin still works and no attack on its “backbone” has been observed!

  9. Why Does it Work? Why don’t the predicted attacks occur and entirely break it? Nostradamus

  10. Why Does it Work? Why don’t the predicted attacks occur and entirely break it? Nostradamus It doesn’t! Not an equilibrium. Just a temporary anomaly.

  11. Why Does it Work? Why don’t the predicted attacks occur and entirely break it? Nostradamus Because the majority of computing It doesn’t! Not an equilibrium. power is controlled by honest miners Just a temporary anomaly.

  12. Why Does it Work? Why don’t the predicted attacks occur and entirely break it? Nostradamus Because the majority of computing It doesn’t! Not an equilibrium. power is controlled by honest miners Just a temporary anomaly. In game-theoretic analysis • Utilities = assumptions to explain/predict players behavior • If predictions ≠ observable then utilities (and game?) can (should?) be rethought.

  13. Why Does it Work? Why don’t the predicted attacks occur and entirely break it? Nostradamus Because the majority of computing It doesn’t! Not an equilibrium. power is controlled by honest miners Just a temporary anomaly. but … why … ? In game-theoretic analysis • Utilities = assumptions to explain/predict players behavior • If predictions ≠ observable then utilities (and game?) can (should?) be rethought.

  14. Why Does it Work? Why don’t the predicted attacks occur and entirely break it? Nostradamus Because the majority of computing It doesn’t! Not an equilibrium. power is controlled by honest miners Just a temporary anomaly. but … why … ? In game-theoretic analysis • Utilities = assumptions to Can we back this up by a rational explain/predict players behavior assumption? • If predictions ≠ observable then • Because the adversary has no utilities (and game?) can incentive to break it (either by (should?) be rethought. corrupting majority or otherwise)

  15. Why Does it Work? Why don’t the predicted attacks occur and entirely break it? Nostradamus Because the majority of computing It doesn’t! Not an equilibrium. power is controlled by honest miners Just a temporary anomaly. but … why … ? In game-theoretic analysis • Utilities = assumptions to Can we back this up by a rational explain/predict players behavior assumption? • If predictions ≠ observable then • Because the adversary has no utilities (and game?) can incentive to break it (either by (should?) be rethought. corrupting majority or otherwise) Calls for an alternative rational treatment

  16. Our Contributions • A new model for rational analysis of Bitcoin • Applying the framework to analyze the Bitcoin backbone • A class of utilities reflecting “minimal” assumptions about the Bitcoin miners’ incentives. • Deriving predictions that match the observable.

  17. Our Contributions Blockchains • A new model for rational analysis of Bitcoin • Applying the framework to analyze the Bitcoin backbone • A class of utilities reflecting “minimal” assumptions about the Bitcoin miners’ incentives. • Deriving predictions that match the observable.

  18. Our Contributions Blockchains • A new model for rational analysis of Bitcoin • Applying the framework to analyze the Bitcoin backbone • A class of utilities reflecting “minimal” assumptions about the Bitcoin miners’ incentives. • Deriving predictions that match the observable.

  19. Rational Protocol Design (RPD) [ GKMT Z 13] Securely implementing a task against an incentive-driven adversary

  20. Rational Protocol Design (RPD) [ GKMT Z 13] Securely implementing a task against an incentive-driven adversary The Attack Game (n-party) task as an ideal functionality F Protocol Protocol Designer Attacker u D u A

  21. Rational Protocol Design (RPD) [ GKMT Z 13] Securely implementing a task against an incentive-driven adversary The Attack Game (n-party) task as an ideal functionality F Protocol Protocol Designer Attacker u D u A (n-party) protocol π for F

  22. Rational Protocol Design (RPD) [ GKMT Z 13] Securely implementing a task against an incentive-driven adversary The Attack Game (n-party) task as an ideal functionality F Protocol Protocol Designer Attacker u D u A (n-party) protocol π for F Adversary A for attacking π

  23. Rational Protocol Design (RPD) [ GKMT Z 13] Securely implementing a task against an incentive-driven adversary The Attack Game (n-party) task as an ideal functionality F Protocol Protocol Designer Attacker u D u A (n-party) protocol π for F Adversary A for attacking π • Utilities are defined in the ideal world as payoffs of explicit “breaks” of F • zero-sum game (i.e., u D := - u A )

  24. Rational Protocol Design (RPD) [GKMT Z 13] Flavors of Protocol Quality (security / stability) • π is (u D , u A, ℿ )- attack-payoff optimal for F if any other protocol in ℿ allows for more rewarding attacks • π is a best-response strategy among protocols in ℿ • π is (u D , u A, 𝔹 )- attack-payoff secure for F if the best the attacker can do is play an adversary in 𝔹 • an 𝔹 - adversary is best response to π In [GKMTZ13] : ✴ ℿ = The class of all poly-time protocols ✴ 𝔹 = The class of all adversaries that honestly execute the protocol

  25. Rational Protocol Design (RPD) [GKMT Z 13] Flavors of Protocol Quality (security / stability) • π is (u D , u A, ℿ )- attack-payoff optimal for F if any other protocol in ℿ allows for more rewarding attacks • π is a best-response strategy among protocols in ℿ • π is (u D , u A, 𝔹 )- attack-payoff secure for F if the best the attacker can do is play an adversary in 𝔹 • an 𝔹 - adversary is best response to π

  26. Rational Protocol Design (RPD)++ Flavors of Protocol Quality (security / stability) • π is (u D , u A, ℿ )- attack-payoff optimal for F if any other protocol in ℿ allows for more rewarding attacks • π is a best-response strategy among protocols in ℿ • π is (u D , u A, 𝔹 )- attack-payoff secure for F if the best the attacker can do is play an adversary in 𝔹 • an 𝔹 - adversary is best response to π

  27. Rational Protocol Design (RPD)++ Flavors of Protocol Quality (security / stability) • π is (u D , u A, ℿ )- attack-payoff optimal for F if any other protocol in ℿ allows for more rewarding attacks • π is a best-response strategy among protocols in ℿ • π is (u D , u A, 𝔹 )- attack-payoff secure for F if the best the attacker can do is play an adversary in 𝔹 • an 𝔹 - adversary is best response to π • π is (u D , u A, ( 𝔹 , ℿ ) )- incentive compatible for F if it is (u D , u A, 𝔹 ) - attack-payoff secure AND (u D , u A, ℿ )- attack-payoff optimal

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend