Advertisement

A Methodology for a Probabilistic Security Analysis of Sharding-Based Blockchain Protocols

  • Abdelatif HafidEmail author
  • Abdelhakim Senhaji Hafid
  • Mustapha Samih
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1010)

Abstract

In the context of blockchain protocols, each node stores the entire state of the network and processes all transactions. This ensures high security but limits scalability. Sharding is one of the most promising solutions to scale blockchain. In this paper, we analyze the security of three Sharding-based protocols using tail inequalities. The key contribution of our paper is to upper bound the failure probability for one committee and so for each epoch using tail inequalities for sums of bounded hypergeometric and binomial distributions. Two tail inequalities are used: Hoeffding and Chvátal. The first tail (Hoeffding inequality) is much more precise bound. The second (Chvátal inequality) is an exponential bound; it is simple to compute but weaker bound compared to Hoeffding. Our contribution is an alternative solution when the failure probability simulations are impractical. To show the effectiveness of our analysis, we perform simulations of the exponential bound.

Keywords

Blockchain Sharding Failure probability Tail inequality Hypergeometric distribution Probabilistic security analysis Exponential bound 

References

  1. 1.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  2. 2.
    Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–32 (2014)Google Scholar
  3. 3.
    bloXroute Team: The scalability problem, (very) simply explained. https://medium.com/bloxroute/the-scalability-problem-very-simply-explained-5c0656f6e7e6. Accessed 28 Mar 2019
  4. 4.
    BitRewards: Blockchain scalability: the issues, and proposed solutions. https://medium.com/@bitrewards/blockchain-scalability-the-issues-and-proposed-solutions-2ec2c7ac98f0. Accessed 16 Mar 2019
  5. 5.
    Zhang, R.: Here’s The Deal on Sharding. https://medium.com/coinmonks/heres-the-deal-on-sharding-96d8591856c4. Accessed 28 Mar 2019
  6. 6.
    Wang, H.-W.: Ethereum sharding: Overview and finality. https://medium.com/@icebearhww/ethereum-sharding-and-finality-65248951f649. Accessed 10 Mar 2019
  7. 7.
    Gencer, A.E., van Renesse, R., Sirer, E.G.: Short paper: Service-oriented sharding for blockchains. In: International Conference on Financial Cryptography and Data Security, pp. 393–401. Springer (2017)Google Scholar
  8. 8.
    Garzik, J.: Block size increase to 2MB. In: Bitcoin Improvement Proposal, vol. 102 (2015)Google Scholar
  9. 9.
    Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016)Google Scholar
  10. 10.
    Raiden Network Review: Fast, cheap, scalable token transfers for ethereum (2018)Google Scholar
  11. 11.
    Poon, J., Buterin, V.: Plasma: scalable autonomous smart contracts, White paper, pp. 1–47 (2017)Google Scholar
  12. 12.
    Komodo: Advanced blockchain technology, focused on freedom (2018)Google Scholar
  13. 13.
    Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: “A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 17–30. ACM (2016)Google Scholar
  14. 14.
    Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: OmniLedger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583–598. IEEE (2018)Google Scholar
  15. 15.
    Zamani, M., Movahedi, M., Raykova, M.: Rapidchain: scaling blockchain via full sharding. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp. 931–948 (2018)Google Scholar
  16. 16.
    Team, Z., et al.: The zilliqa technical whitepaper (2017)Google Scholar
  17. 17.
    Li, S., Yu, M., Avestimehr, S., Kannan, S., Viswanath, P.: Polyshard: Coded sharding achieves linearly scaling efficiency and security simultaneously (2018). arXiv preprint arXiv:1809.10361
  18. 18.
    Danezis, G., Meiklejohn, S.: Centrally banked cryptocurrencies (2015). arXiv preprint arXiv:1505.06895
  19. 19.
    Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 16), pp. 279–296 (2016)Google Scholar
  20. 20.
    Skala, M.: Hypergeometric tail inequalities: ending the insanity (2013). arXiv preprint arXiv:1311.5939
  21. 21.
    Chvátal, V.: The tail of the hypergeometric distribution. Discrete Math. 25(3), 285–287 (1979)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Hoeffding, W.: Probability inequalities for sums of bounded random variables. In: The Collected Works of Wassily Hoeffding. pp. 409–426. Springer (1994)Google Scholar
  23. 23.
    Wroughton, J., Cole, T.: Distinguishing between binomial, hypergeometric and negative binomial distributions. J. Stat. Educ. 21(1) (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Abdelatif Hafid
    • 1
    Email author
  • Abdelhakim Senhaji Hafid
    • 2
  • Mustapha Samih
    • 1
  1. 1.Department of Mathematics, Faculty of SciencesUniversity Moulay IsmailMeknesMorocco
  2. 2.Department of Computer Science and Operations ResearchUniversity of MontrealMontrealCanada

Personalised recommendations