SybilQuorum: Open Distributed Ledgers through Trust Networks - - PowerPoint PPT Presentation

sybilquorum open distributed ledgers through trust
SMART_READER_LITE
LIVE PREVIEW

SybilQuorum: Open Distributed Ledgers through Trust Networks - - PowerPoint PPT Presentation

SybilQuorum: Open Distributed Ledgers through Trust Networks Authors Alberto Sonnino * George Danezis * * University College London and chainspace.io January 2019 The Authors Alberto Sonnino George Danezis 2 Many challenges in


slide-1
SLIDE 1

SybilQuorum: Open Distributed Ledgers through Trust Networks

Authors Alberto Sonnino* George Danezis*

and chainspace.io

January 2019

* University College London

slide-2
SLIDE 2

The Authors

2

George Danezis Alberto Sonnino

slide-3
SLIDE 3

Many challenges in blockchains

3

send it to the blockchain anyone can verify write the contract

Poor privacy Scalability Security Governance

slide-4
SLIDE 4

Many challenges in blockchains

Poor privacy Scalability Security Governance

Open systems need strong sybil defences

slide-5
SLIDE 5

5

Our focus: bootstrapping an FBAS

Nodes do not have to be known ahead of time

slide-6
SLIDE 6

6

Nodes choose whom they trust

Our focus: bootstrapping an FBAS

slide-7
SLIDE 7

7

How to achieve this with strong sybil resistance?

Our focus: bootstrapping an FBAS

slide-8
SLIDE 8

8

  • Attacker creates multiple fake identities

What are sybil attacks?

slide-9
SLIDE 9

9

  • Attacker creates multiple fake identities

… and takes over the system

What are sybil attacks?

slide-10
SLIDE 10

10

What should we do?

Cap the ability of the adversary to create multiple identities

slide-11
SLIDE 11

11

  • Traditional defences

Proof-of-Work Proof-of-Stake

What are sybil attacks?

$ $

slide-12
SLIDE 12

12

  • Traditional defences

Leverage scarce resources: Proof-of-Work Proof-of-Stake Money — by forcing to burn/lock it

What are sybil attacks?

$ $

slide-13
SLIDE 13

13

  • Traditional defences

What are sybil attacks?

extra money extra money extra money

The adversary needs to be rich

slide-14
SLIDE 14

14

  • Sometimes it is not enough…

Decentralised trading of financial products ( potentially worth $$$ )

What are sybil attacks?

slide-15
SLIDE 15

15

  • Sometimes it is not enough…
  • 1. borrow a lot of money
  • 2. turn it into tokens
  • 4. payback the bank
  • 3. subvert the system

exchange

What are sybil attacks?

slide-16
SLIDE 16

16

  • Can we strengthen existing mechanisms?

Leverage scare resources: Money — by forcing to burn/lock it

What are sybil attacks?

slide-17
SLIDE 17

What are sybil attacks?

17

  • Can we strengthen existing mechanisms?

Leverage scare resources: Money — by forcing to burn/lock it Trust — by penalising poor judgements

slide-18
SLIDE 18

An open system needs strong Sybil defences. Proof of Stake protocols: attackers can simply borrow a lot of money, turn it into tokens, and subvert the system. To defend against this, we use two-way stake wagers between entities, to build a social network of stake-weighted trust relationships. (Academic paper ‘Buffy’ coming soon)

We use social network theory to assess whether an entity is a sybil Poorly connected nodes to the main network see their stake attenuated.

4 OPEN SYSTEM WITH PROOF OF STAKE

How do we make that happen?

18

Proof of Stake Social network analysis

SybilQuorum

Lock stake on particular social links Statistical analysis of nodes relationships

An open system needs strong Sybil defences. Proof of Stake protocols: attackers can simply borrow a lot of money, turn it into tokens, and subvert the system. To defend against this, we use two-way stake wagers between entities, to build a social network of stake-weighted trust relationships. (Academic paper ‘Buffy’ coming soon)

We use social network theory to assess whether an entity is a sybil Poorly connected nodes to the main network see their stake attenuated.

4 OPEN SYSTEM WITH PROOF OF STAKE

slide-19
SLIDE 19

How to bootstrap an FBAS?

19

Attribute weights to people you trust Step 1

slide-20
SLIDE 20

An open system needs strong Sybil defences. Proof of Stake protocols: attackers can simply borrow a lot of money, turn it into tokens, and subvert the system. To defend against this, we use two-way stake wagers between entities, to build a social network of stake-weighted trust relationships. (Academic paper ‘Buffy’ coming soon)

We use social network theory to assess whether an entity is a sybil Poorly connected nodes to the main network see their stake attenuated.

4 OPEN SYSTEM WITH PROOF OF STAKE

SybilQuorum: Step 1

20

  • Stake-weighted trust relationships
slide-21
SLIDE 21

21

  • Stake-weighted trust relationships

Put money on links!

Both vertices can withdraw the money on the link

SybilQuorum: Step 1

slide-22
SLIDE 22

22

  • Stake-weighted trust relationships

Fraudsters can take the money and disappear Poor judgement is penalised

SybilQuorum: Step 1

slide-23
SLIDE 23

23

  • Stake-weighted trust relationships

Bulk dishonesty protects against strategic dishonesty

SybilQuorum: Step 1

slide-24
SLIDE 24

How to bootstrap an FBAS?

24

Attribute weights to people you trust Step 1 Run social network analysis Step 2

slide-25
SLIDE 25

An open system needs strong Sybil defences. Proof of Stake protocols: attackers can simply borrow a lot of money, turn it into tokens, and subvert the system. To defend against this, we use two-way stake wagers between entities, to build a social network of stake-weighted trust relationships. (Academic paper ‘Buffy’ coming soon)

We use social network theory to assess whether an entity is a sybil Poorly connected nodes to the main network see their stake attenuated.

4 OPEN SYSTEM WITH PROOF OF STAKE

25

  • Fast mixing assumption

SybilQuorum: Step 2

slide-26
SLIDE 26

An open system needs strong Sybil defences. Proof of Stake protocols: attackers can simply borrow a lot of money, turn it into tokens, and subvert the system. To defend against this, we use two-way stake wagers between entities, to build a social network of stake-weighted trust relationships. (Academic paper ‘Buffy’ coming soon)

We use social network theory to assess whether an entity is a sybil Poorly connected nodes to the main network see their stake attenuated.

4 OPEN SYSTEM WITH PROOF OF STAKE

26

  • 1. Fast integration of

nodes into the network

  • Fast mixing assumption

SybilQuorum: Step 2

slide-27
SLIDE 27

An open system needs strong Sybil defences. Proof of Stake protocols: attackers can simply borrow a lot of money, turn it into tokens, and subvert the system. To defend against this, we use two-way stake wagers between entities, to build a social network of stake-weighted trust relationships. (Academic paper ‘Buffy’ coming soon)

We use social network theory to assess whether an entity is a sybil Poorly connected nodes to the main network see their stake attenuated.

4 OPEN SYSTEM WITH PROOF OF STAKE

27

  • 1. Fast integration of

nodes into the network

  • 2. Slow integration of

sybils into the network

  • Fast mixing assumption

SybilQuorum: Step 2

slide-28
SLIDE 28

28

  • Each node performs a local judgement

Node’s view of the network

SybilQuorum: Step 2

slide-29
SLIDE 29

29

  • Each node performs a local judgement

Black Box

Node’s view of the network

SybilQuorum: Step 2

slide-30
SLIDE 30

30

  • Each node performs a local judgement

Black Box

Node’s view of the network Map nodes to weights

1/3 1/8

SybilQuorum: Step 2

slide-31
SLIDE 31

31

= SybilInfer, SybilGuard, SybilLimit, …

  • Each node performs a local judgement

Black Box

Node’s view of the network

Black Box

Map pk to weights

1/3 1/8

SybilQuorum: Step 2

slide-32
SLIDE 32

How to bootstrap an FBAS?

32

Attribute weights to people you trust Step 1 Determine the quorum slices Step 3 Run social network analysis Step 2

slide-33
SLIDE 33

33

SybilQuorum: Step 3

  • Specify quorum slice for each node

> y

H

slide-34
SLIDE 34

34

SybilQuorum: Step 3

  • Specify quorum slice for each node

> y all subsets > 2/3 |H|

H

slide-35
SLIDE 35

35

SybilQuorum: Step 3

  • Specify quorum slice for each node

> y all subsets > 2/3 |H|

H

slide-36
SLIDE 36

How to bootstrap an FBAS?

36

Attribute weights to people you trust Step 1 Determine the quorum slices Step 3 Run social network analysis Step 2

slide-37
SLIDE 37

An open system needs strong Sybil defences. Proof of Stake protocols: attackers can simply borrow a lot of money, turn it into tokens, and subvert the system. To defend against this, we use two-way stake wagers between entities, to build a social network of stake-weighted trust relationships. (Academic paper ‘Buffy’ coming soon)

We use social network theory to assess whether an entity is a sybil Poorly connected nodes to the main network see their stake attenuated.

4 OPEN SYSTEM WITH PROOF OF STAKE

Experimental evaluation

37

  • 1. Number of sybil nodes?
  • 2. Number of links/stake

between sybils?

  • 3. Number of links/stake

between nodes and sybils?

  • 4. Fraction of naïve nodes?
  • What to evaluate?
slide-38
SLIDE 38

Conclusion

38

SybilQuorum: Sybil resistance mechanism

slide-39
SLIDE 39

Conclusion

39

  • What?

Leverage Money by forcing to burn/lock it Leverage Trust by penalising poor judgement

SybilQuorum: Sybil resistance mechanism

slide-40
SLIDE 40

Conclusion

40

  • What?
  • How?

Proof-of-Stake: build a stake-weighted graph Social network analysis: determine sybil regions Leverage Money by forcing to burn/lock it Leverage Trust by penalising poor judgement

SybilQuorum: Sybil resistance mechanism

slide-41
SLIDE 41

This work is supported in part by EPSRC Grant EP/M013286/1, the EU H2020 DECODE project (grant agreement number 732546), and chainspace.io

Alberto Sonnino http://sonnino.com

Thank you for your attention Questions?