fruitchains a fair bloc ockchain
play

FruitChains: A Fair Bloc ockchain Authors: Rafael Pass, Elaine Shi - PowerPoint PPT Presentation

FruitChains: A Fair Bloc ockchain Authors: Rafael Pass, Elaine Shi presented by Han Zhang Nakamotos Blockchain A sequence of (mined) blocks = Assumption: Majority of the computing power is controlled by ( %& , , ,


  1. FruitChains: A Fair Bloc ockchain Authors: Rafael Pass, Elaine Shi presented by Han Zhang

  2. Nakamoto’s Blockchain β€’ A sequence of (mined) blocks 𝑐 = β€’ Assumption: Majority of the computing power is controlled by (β„Ž %& , Ξ·, 𝑛, β„Ž) honest players β€’ 𝑛 : record β€’ Strong assumption β€’ β„Ž %& : pointer to the (record in) previous block β€’ β„Ž : pointer to the current record β€’ lots of work for solve the computational puzzles β€’ Ξ· : nonce β€’ Players are incentivized by β€’ proof-of-work, derived from the pair = β„Ž %& , 𝑛 β€’ mining rewards and transaction fees for every block

  3. Selfish Mining and Fairness β€’ Minority fraction ρ < & - ⁄ of computational power in the network can contribute a significantly larger fraction of blocks than it β€œfair share” ρ β€’ Assuming the adversary controls the delivery of messages on the network β€’ (1 βˆ’ ρ)π‘ˆ by hones players, Οπ‘ˆ blocks are replaced by adversarial blocks β€’ The expected fraction of adversarial blocks becomes N &%N N &%N =1 , twice its fair share of the rewards β€’ ρ = 1/2, β€’ Chain quality β€’ The chain contains a sufficient fraction of blocks contributed by honest players β€’ Ideally, we can have a fair blockchain protocol with a 1 βˆ’ ρ chain quality β€’ Honest players contributing a 𝜚 ≀ 1 βˆ’ ρ fraction of the computational sources get a 𝜚 fraction of the blocks and thus rewards in any sufficiently long window

  4. FruitChain β€’ FruitChain protocol satisfies β€œclose-to-optimal” fairness β€’ An adversary controls up to a ρ fraction of the computing power, and as a consequence the adversary coalition cannot get more than 1 + Ξ΄ ρ β€’ Ξ΄ < 0.3 β€’ Ξ΄ -approximately fair: honest players are guaranteed to get at least a 1 βˆ’ Ξ΄ (1 βˆ’ ρ) fraction of the blocks in every sufficiently long window

  5. Step 2: Step1: FruitChain Block 2 Block 1 Step 3: Fruit 1 hang from FruitChain Nakamoto Block 1 β€’ Fruit mining and Block mining: β€’ Nakamoto: 𝑐 = β„Ž %& , Ξ·, 𝑛, β„Ž β€’ Fruits: 𝑔 = β„Ž %& ; β„Ž _ ; Ξ·; 𝑒𝑗𝑕𝑓𝑑𝑒(𝐺); 𝑛; β„Ž β€’ The records are put inside β€œfruits” and these fruits themselves β€’ Nakamoto requires solving some proof of work β„Ž %& ; β„Ž _ ; Ξ·; 𝑒𝑗𝑕𝑓𝑑𝑒(𝐺); 𝑛; , 𝐺 β€’ Blocks look like fruits: 𝑐 = β€’ Pr 𝐼(β„Ž %& , Ξ·, 𝑐) < 𝐸 [ = π‘ž β€’ Digest of some fruit-set F to be included in the block later; β€’ β„Ž _ pointer that points to the block the fruit is hanging from β€’ Blocks by blocks β€’ Hardness parameter π‘ž g β€’ Fruit mining and block mining are piggybacked by each other β€’ A fruit is required to β€œhang” from a block which isn’t too far from the block which records the fruit β€’ Recency Parameter β€’ how far back a fruit is allowed to hang

  6. β€’ In each round, , check 𝓡 steps back FruitChain β€’ honest players simultaneously mine for a fruit and a block β€’ 𝐼 β„Ž %& ; β„Ž _ ; Ξ·; 𝑒𝑗𝑕𝑓𝑑𝑒(𝐺); 𝑛; β„Ž = β„Ž β€’ [β„Ž] %𝓡 denotes the last 𝓡 bits of β„Ž β€’ [β„Ž] 𝓡 denotes the first 𝓡 bits of β„Ž β€’ 𝓡 = 2, π‘‘β„Žπ‘π‘—π‘œ = 10) Block 8 Block 11: fruit is pointed in π‘‘β„Žπ‘π‘—π‘œ βˆ’ 𝓡 =10-2=8 th Block 10: block block Block 12: block with 𝐺 Block 13: block

  7. Selfish Mining β€’ Selfish mining fails in FruitChain β€’ Even if an adversary tries to β€œerase” some block mined by an honest player (which contains some honest fruits) β€’ An honest player will mine a new block which is stable and this honest player will include the fruit in it β€’ The time before such an β€œhonest block” arrives is short enough for the fruit to still be β€œrecent” at the time of the honest block arriving

  8. FruitChain β€’ Why we require fruits to be recent β€’ Without it, an attacker could withhold fruits, and suddenly release lots of them at the same time, thereby creating an very high fraction of adversarial fruit in some segment of the FruitChain. β€’ By requiring the fruits to be recent, we prevent the adversary from squirreling away (too many of) it’s fruits.

  9. Questions…

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend