Abstract
We propose an asynchronous, highly effective proof-of-stake protocol optimized for fast finality, while allowing for high throughputs via execution parallelization. It is a probabilistic protocol that achieves higher Byzantine fault tolerance than Nakamoto, BFT (including Hotstuff and AptosBFT), Solana, and other modern consensus protocols. Our protocol reaches consensus in two communication steps and has a total number of messages that are subquadratic to the number of nodes, with probabilistic, dynamically adjusted safety guarantees. We trade off deterministic consensus with theoretical constraints on message complexity and the number of Byzantine agreements, with probabilistic algorithms overtaking these boundaries. We further claim that because of the use of randomness and socioeconomics in blockchain designs, no real trade-off is actually present. One of the key ingredients of our approach is separating the verification of execution by a consensus committee from the attestation of block propagation by network participants. Our consensus committee is randomly selected for each block and is not predetermined, while the Leader is deterministic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A double-spend attack, in the context of blockchain and digital currencies, refers to a situation where a single set of digital tokens or currency is spent more than once. This type of attack exploits the digital nature of the currency, as digital information can be replicated.
- 2.
Because of this multithreaded property, Acki Nacki uses an Asynchronous Virtual Machine to execute transactions. This is beyond the scope of this paper, so we mention it here for future references.
- 3.
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
References
Ava Labs, Inc.: The avalanche documentation. avalanche consensus (2024). https://docs.avax.network/learn/avalanche/avalanche-consensus
Bach, L.M., Mihaljevic, B., Zagar, M.: Comparative analysis of blockchain consensus algorithms. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1545–1550. IEEE (2018). https://doi.org/10.23919/MIPRO.2018.8400278
Berrang, P., von Styp-Rekowsky, P., Wissfeld, M., França, B., Trinkler, R.: Albatross - an optimistic consensus algorithm. In: 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 39–42. IEEE (2019). https://doi.org/10.1109/CVCBT.2019.000-1
Boneh, D., Drijvers, M., Neven, G.: Bls multi-signatures with public-key aggregation. In: ASIACRYPT (2018). https://crypto.stanford.edu/~dabo/pubs/papers/BLSmultisig.html
Boneh, D., Shoup, V.: A graduate course in applied cryptography (2020). https://dlib.hust.edu.vn/bitstream/HUST/18098/3/OER000000253.pdf. draft 0.5
Buterin, V., et al.: Ethereum roadmap, what about sharding? (2022). https://ethereum.org/en/roadmap/#what-about-sharding
Buterin, V., et al.: Combining ghost and casper (2020). https://doi.org/10.48550/arXiv.2003.03052
Buterin, V., Wood, G.: A next generation smart contract and decentralized application platform. White Paper (2014). https://static.peng37.com/ethereum_whitepaper_laptop_3.pdf
Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI 1999), New Orleans, Louisiana, pp. 173–186. (1999). https://pmg.csail.mit.edu/papers/osdi99.pdf
Danezis, G., Kokoris-Kogias, L., Sonnino, A., Spiegelman, A.: Narwhal and tusk: a dag-based mempool and efficient bft consensus. In: Proceedings of the Seventeenth European Conference on Computer Systems, pp. 34–50 (2022). https://doi.org/10.5281/zenodo.6353717
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976). https://doi.org/10.1109/TIT.1976.1055638
Durov, N.: Telegram open network blockchain (2020). https://ton.org/tblkch.pdf. white Paper
Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984). https://mit6875.github.io/PAPERS/probabilistic_encryption.pdf
Grigg, I.: Eos-an introduction (2017). https://iang.org/papers/EOS_An_Introduction.pdf. white paper
King, S., Nadal, S.: Ppcoin: peer-to-peer crypto-currency with proof-of-stake (2012). https://decred.org/research/king2012.pdf
Ku, T.W., Chen, K.: No need for recovery: a simple two-step byzantine consensus (2019). https://doi.org/10.48550/arXiv.1911.10361
Martin, J.P., Alvisi, L.: Fast byzantine consensus. In: 2005 International Conference on Dependable Systems and Networks, DSN 2005, pp. 402–411 (2005). https://doi.org/10.1109/DSN.2005.48
Martin, J.P., Alvisi, L.: Fast byzantine consensus. IEEE Trans. Depend. Secure Comput. 3(3), 202–215 (2006). https://doi.org/10.1109/TDSC.2006.35
Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978). https://doi.org/10.1145/359460.359473
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Ozisik, A.P., Levine, B.N.: An explanation of nakamoto’s analysis of double-spend attacks. CoRR abs/1701.03977 (2017). https://doi.org/10.48550/arXiv.1701.03977
The NEAR White Paper (2021). https://near.org/papers/the-official-near-white-paper
Shoup, V.: Proof of history: what is it good for? (2022). https://www.shoup.net/papers/poh.pdf
Sun, Z., Chang, J., Zhu, N., et al.: Rangers protocol 2.0 (2022). https://rangersprotocol.obs.ap-southeast-1.myhuaweicloud.com/Navigation/RangersProtocolWhitepaper.pdf
Team Rocket: Snowflake to avalanche: a novel metastable consensus protocol family for cryptocurrencies (2018). https://knowen-production.s3.amazonaws.com/uploads/attachment/file/1922/Snowflake%2Bto%2BAvalanche%2B-%2BA%2BNovel%2BMetastable%2BConsensus%2BProtocol%2BFamily.pdf
Team Rocket, Yin, M., Sekniqi, K., van Renesse, R., Sirer, E.: Scalable and probabilistic leaderless bft consensus through metastability (2020). https://doi.org/10.48550/arXiv.1906.08936. Cornell University
The Diem Team: Diembft v4: State machine replication in the diem blockchain (2021). https://developers.diem.com/papers/diem-consensus-state-machine-replication-in-the-diem-blockchain/2021-08-17.pdf
The MultiversX Team: Multiversx, a highly scalable public blockchain via adaptive state sharding and secure proof of stake (2019). https://files.multiversx.com/multiversx-whitepaper.pdf. Technical whitepaper - release 2 - revision 2
The Zilliqa Team: The zilliqa technical whitepaper (2017). https://docs.zilliqa.com/whitepaper.pdf
Tse, S., Liu, M., et al.: Harmony technical whitepaper-version 2.0 (2023). https://harmony.one/whitepaper.pdf
Wood, G.: Ethereum: a secure decentralised generalised transaction ledger (2014), p. 32. https://ethereum.github.io/yellowpaper/paper.pdf. Ethereum project yellow paper 151.2014
Yakovenko, A.: Solana: a new architecture for a high performance blockchain v0. 8.13 (2018). https://solana.com/solana-whitepaper.pdf
Yin, M., Malkhi, D., Reiter, M., Gueta, G., Ittai, A.: Hotstuff: bft consensus with linearity and responsiveness. In: 38th ACM Symposium on Principles of Distributed Computing (PODC 2019), Toronto, ON, Canada, 29 July–2 August 2019 (2019). https://doi.org/10.1145/3293611.3331591
Zhong, W., et al.: Byzantine fault-tolerant consensus algorithms: a survey. Electronics 12(18), 3801 (2023). https://doi.org/10.3390/electronics12183801
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Goroshevsky, M., Sattarov, N., Trepacheva, A. (2024). Acki Nacki: A Probabilistic Proof-of-Stake Consensus Protocol with Fast Finality and Parallelisation. In: Andreoni, M. (eds) Applied Cryptography and Network Security Workshops. ACNS 2024. Lecture Notes in Computer Science, vol 14586. Springer, Cham. https://doi.org/10.1007/978-3-031-61486-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-61486-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61485-9
Online ISBN: 978-3-031-61486-6
eBook Packages: Computer ScienceComputer Science (R0)