Abstract

In a sybil attack , an adversary creates many fake identities/nodes and have them join the system. Computational puzzles have long been investigated as a possible sybil defense: nodes that fail to solve the puzzle in time will no longer be accepted by other nodes. However, a malicious node can behave in such a way that it is accepted by some honest nodes but not other honest nodes. This results in different honest nodes having different views on which set of nodes constitute the system. Such view divergence , unfortunately, breaks the overarching assumption required by many existing security protocols. Partly spurred by the growing popularity of Bitcoin, researchers have recently formalized the above view divergence problem and proposed interesting solutions (which we call view reconciliation protocols ). All existing view reconciliation protocols so far have a similar $\Theta (N)$ time complexity, with $N$ being the number of honest nodes in the system. As this paper’s main contribution, we propose a novel view reconciliation protocol whose time complexity is only $\Theta ({\ln N}/{\ln \ln N})$ . To achieve such an exponential improvement, we aggressively exploit randomization. The hidden constant factor in the asymptotic complexity of our protocol, however, is considerably larger than in previous protocols. Concrete numerical comparisons show that our protocol is more suitable for large-scale systems, while existing protocols are better for smaller-scale systems.

Highlights

  • INTRODUCTIONAs one example of large-scale permissionless system, currently Bitcoin already has about 10k daily-active full nodes [20]–[22]

  • A preliminary conference version of this article is published in IEEE International Conference on Computer Communications (INFOCOM), April 2018. (The authors of this paper are alphabetically ordered.) (Corresponding author: Irvan Jahja.)

  • This paper proposes and analyzes a novel randomized view reconciliation protocol, called RandomizedViewReconciliation or RVR

Read more

Summary

INTRODUCTION

As one example of large-scale permissionless system, currently Bitcoin already has about 10k daily-active full nodes [20]–[22] As another reference point, Algorand [23] is a recently proposed Proofof-Stake cryptocurrency from MIT. HOU et al.: RANDOMIZED VIEW RECONCILIATION IN PERMISSIONLESS DISTRIBUTED SYSTEMS [19]) have a positive probability of error: For example, the adversary might correctly guess the private key. This means that strictly speaking, even those previous protocols [18], [19].

RELATED WORK
PROBLEM FORMULATION
OUR PROTOCOL
PROBABILISTIC LEADER ELECTION
VIII. PUT EVERYTHING TOGETHER
NUMERICAL COMPARISONS
Findings
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.