论文标题
区块链协议安全分析的一般框架
A General Framework for the Security Analysis of Blockchain Protocols
论文作者
论文摘要
区块链协议的基本方式有所不同,包括选择用户生产区块的机制(例如,工作证明与二手证明)以及建立共识的方法(例如,最长的链条规则与拜占庭缺陷耐受性(BFT)启发的协议)。这些基本差异阻碍了不同类别的区块链协议之间的“苹果到苹果”的比较,进而,理论的发展以正式讨论其相对优点。 本文提出了一个足以捕获和比较许多众所周知的无许可区块链方案的特性的简约抽象,同时捕获了工作证明(POW)和持有证明(POS)协议(POS)协议以及最长的链型和BFT-type协议的基本特性。我们的框架Blackbox是用户选择过程的精确机制,使我们能够隔离选择过程对协议设计重要的属性。 我们通过几个具体的结果证明了我们的一般框架的实用性: 1。我们证明了一个不可能的定理,该定理断言,在部分同步设置中,参与级别不明的能力排除了安全性。 2。深入研究部分同步设置,我们证明安全性的必要条件是生产“证书”,这意味着独立的块确认证明。 3。限制同步设置,我们证明,具有已知级别参与水平的典型协议(包括最长的链型POS协议)可以适应证书,但是那些参与度未知的人不能。 4.最后,我们使用框架来阐明模块化的两步方法来区块链安全分析,从而有效地将无许可案件减少到许可案例中。
Blockchain protocols differ in fundamental ways, including the mechanics of selecting users to produce blocks (e.g., proof-of-work vs. proof-of-stake) and the method to establish consensus (e.g., longest chain rules vs. Byzantine fault-tolerant (BFT) inspired protocols). These fundamental differences have hindered "apples-to-apples" comparisons between different categories of blockchain protocols and, in turn, the development of theory to formally discuss their relative merits. This paper presents a parsimonious abstraction sufficient for capturing and comparing properties of many well-known permissionless blockchain protocols, simultaneously capturing essential properties of both proof-of-work (PoW) and proof-of-stake (PoS) protocols, and of both longest-chain-type and BFT-type protocols. Our framework blackboxes the precise mechanics of the user selection process, allowing us to isolate the properties of the selection process that are significant for protocol design. We demonstrate the utility of our general framework with several concrete results: 1. We prove a CAP-type impossibility theorem asserting that liveness with an unknown level of participation rules out security in a partially synchronous setting. 2. Delving deeper into the partially synchronous setting, we prove that a necessary and sufficient condition for security is the production of "certificates," meaning stand-alone proofs of block confirmation. 3. Restricting to synchronous settings, we prove that typical protocols with a known level of participation (including longest chain-type PoS protocols) can be adapted to provide certificates, but those with an unknown level of participation cannot. 4. Finally, we use our framework to articulate a modular two-step approach to blockchain security analysis that effectively reduces the permissionless case to the permissioned case.