Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake. Ferreira, M. V. X., Hahn, Y. L. S., Weinberg, S. M., & Yu, C. In Proceedings of the 23rd ACM Conference on Economics and Computation, of EC '22, pages 89–114, New York, NY, USA, 2022. Association for Computing Machinery.
Paper
Video doi abstract bibtex 19 downloads Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols. In cryptographic self-selection, each round r has a seed Qr. In round r, each account owner is asked to digitally sign Qr, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round r, and their credential becomes the seed Qr+1. Such protocols leave open the possibility of manipulation: a user who owns multiple accounts that each produce low-scoring credentials in round r can selectively choose which ones to broadcast in order to influence the seed for round r+1. Indeed, the user can pre-compute their credentials for round r+1 for each potential seed, and broadcast only the credential (among those with low enough score to be leader) that produces the most favorable seed.We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than 3-5/2 38% of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.
@inproceedings{ferreira2022optimal,
author = {Ferreira, Matheus V. X. and Hahn, Ye Lin Sally and Weinberg, S. Matthew and Yu, Catherine},
title = {Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake},
year = {2022},
isbn = {9781450391504},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://arxiv.org/abs/2207.07996},
doi = {10.1145/3490486.3538337},
abstract = {Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols. In cryptographic self-selection, each round r has a seed Qr. In round r, each account owner is asked to digitally sign Qr, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round r, and their credential becomes the seed Qr+1. Such protocols leave open the possibility of manipulation: a user who owns multiple accounts that each produce low-scoring credentials in round r can selectively choose which ones to broadcast in order to influence the seed for round r+1. Indeed, the user can pre-compute their credentials for round r+1 for each potential seed, and broadcast only the credential (among those with low enough score to be leader) that produces the most favorable seed.We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than 3-5/2 ~38% of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.},
booktitle = {Proceedings of the 23rd ACM Conference on Economics and Computation},
pages = {89–114},
numpages = {26},
keywords = {leader election, cryptocurrency, blockchain, proof-of-stake, strategic mining},
location = {Boulder, CO, USA},
series = {EC '22},
url_Video = {https://youtu.be/SVdHKeycLZg}
}
Downloads: 19
{"_id":"6xv5txSi5j5Y8KFHj","bibbaseid":"ferreira-hahn-weinberg-yu-optimalstrategicminingagainstcryptographicselfselectioninproofofstake-2022","author_short":["Ferreira, M. V. X.","Hahn, Y. L. S.","Weinberg, S. M.","Yu, C."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Ferreira"],"firstnames":["Matheus","V.","X."],"suffixes":[]},{"propositions":[],"lastnames":["Hahn"],"firstnames":["Ye","Lin","Sally"],"suffixes":[]},{"propositions":[],"lastnames":["Weinberg"],"firstnames":["S.","Matthew"],"suffixes":[]},{"propositions":[],"lastnames":["Yu"],"firstnames":["Catherine"],"suffixes":[]}],"title":"Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake","year":"2022","isbn":"9781450391504","publisher":"Association for Computing Machinery","address":"New York, NY, USA","url":"https://arxiv.org/abs/2207.07996","doi":"10.1145/3490486.3538337","abstract":"Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols. In cryptographic self-selection, each round r has a seed Qr. In round r, each account owner is asked to digitally sign Qr, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round r, and their credential becomes the seed Qr+1. Such protocols leave open the possibility of manipulation: a user who owns multiple accounts that each produce low-scoring credentials in round r can selectively choose which ones to broadcast in order to influence the seed for round r+1. Indeed, the user can pre-compute their credentials for round r+1 for each potential seed, and broadcast only the credential (among those with low enough score to be leader) that produces the most favorable seed.We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than 3-5/2 38% of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.","booktitle":"Proceedings of the 23rd ACM Conference on Economics and Computation","pages":"89–114","numpages":"26","keywords":"leader election, cryptocurrency, blockchain, proof-of-stake, strategic mining","location":"Boulder, CO, USA","series":"EC '22","url_video":"https://youtu.be/SVdHKeycLZg","bibtex":"@inproceedings{ferreira2022optimal,\n author = {Ferreira, Matheus V. X. and Hahn, Ye Lin Sally and Weinberg, S. Matthew and Yu, Catherine},\n title = {Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake},\n year = {2022},\n isbn = {9781450391504},\n publisher = {Association for Computing Machinery},\n address = {New York, NY, USA},\n url = {https://arxiv.org/abs/2207.07996},\n doi = {10.1145/3490486.3538337},\n abstract = {Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols. In cryptographic self-selection, each round r has a seed Qr. In round r, each account owner is asked to digitally sign Qr, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round r, and their credential becomes the seed Qr+1. Such protocols leave open the possibility of manipulation: a user who owns multiple accounts that each produce low-scoring credentials in round r can selectively choose which ones to broadcast in order to influence the seed for round r+1. Indeed, the user can pre-compute their credentials for round r+1 for each potential seed, and broadcast only the credential (among those with low enough score to be leader) that produces the most favorable seed.We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than 3-5/2 ~38% of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.},\n booktitle = {Proceedings of the 23rd ACM Conference on Economics and Computation},\n pages = {89–114},\n numpages = {26},\n keywords = {leader election, cryptocurrency, blockchain, proof-of-stake, strategic mining},\n location = {Boulder, CO, USA},\n series = {EC '22},\n url_Video = {https://youtu.be/SVdHKeycLZg}\n}\n\n","author_short":["Ferreira, M. V. X.","Hahn, Y. L. S.","Weinberg, S. M.","Yu, C."],"key":"ferreira2022optimal","id":"ferreira2022optimal","bibbaseid":"ferreira-hahn-weinberg-yu-optimalstrategicminingagainstcryptographicselfselectioninproofofstake-2022","role":"author","urls":{"Paper":"https://arxiv.org/abs/2207.07996"," video":"https://youtu.be/SVdHKeycLZg"},"keyword":["leader election","cryptocurrency","blockchain","proof-of-stake","strategic mining"],"metadata":{"authorlinks":{}},"downloads":19,"html":""},"bibtype":"inproceedings","biburl":"https://www.dropbox.com/s/l1ow8tmixvi5lbe/publications.bib?dl=1","dataSources":["6amsKw6HCrQXQWi4y"],"keywords":["leader election","cryptocurrency","blockchain","proof-of-stake","strategic mining"],"search_terms":["optimal","strategic","mining","against","cryptographic","self","selection","proof","stake","ferreira","hahn","weinberg","yu"],"title":"Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake","year":2022,"downloads":19}