Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis †
Abstract
:1. Introduction
2. Key Components of Sharding-Based PoS Blockchain Protocols
2.1. Key Components
- Validator: A node (can be malicious or honest) that competes to produce and add blocks to the blockchain.
- Consensus mechanism: Most of the sharding-based PoS Blockchain protocols use pPFT alongside PoS. PoS is an alternative consensus mechanism to PoW. Unlike PoW, which relies on miners with hash power to solve a mathematical puzzle, PoS relies on validators staking coins. Validators are selected based on the number of coins they stake (e.g., a validator with 10% of the total coins staked, has a 10% probability of adding a block to the blockchain). PoS consists of selecting validators in proportion to their number of coins. Validators are responsible for adding new blocks to Blockchain. pBFT is an algorithm that tolerates Byzantine faults [14]; An algorithm belonging to the Byzantine Fault Tolerance (BFT) class. BFT is the ability of the network to reach a consensus, on some value, even in the case of having some failed and/or malicious nodes in the network. Lamport et al. [15] proved that if we have correctly working processors, a consensus (agreement on same value) can be reached if at most m processors are faulty; this means that strictly more than two-thirds of the total number of processors should be honest.
- Beacon Chain: The main chain in the network. It is responsible for randomly assigning the validators to the committees of shards. The Beacon chain confirms cross-shard information and shuffles the committees of shards to ensure security.
- Chain (aka shard): A chain that consists of a subset of nodes of the network. Shards process different transactions in parallel to improve scalability. Generally, a sharding-based PoS network consists of one beacon chain and several shards.
- Beacon Committee: A subset of validators, selected randomly from the set of validators, that has decided to stake for the beacon chain. Generally, its main role is to check/verify and insert the valid block header into the beacon chain.
- Shard Committee: A subset of validators, selected randomly from the set of validators, that has decided to stake for the shard chain. A shard committee validates and confirms the transactions processed in the shard.
2.2. Comparison with Related Blockchain Protocols
Bitcoin [1] | Zilliqa [16] | Elastico [18] | Incognito [13] | Harmony [17] | Nxt [19] | |
---|---|---|---|---|---|---|
PoW | ✓ | ✓ | ✓ | ✕ | ✕ | ✕ |
PoS | ✕ | ✕ | ✕ | ✓ | ✓ | ✓ 1 |
pBFT | ✕ | ✓ | ✓ | ✓ | ✓ | ✕ |
Sharding | ✕ | ✓ | ✓ | ✓ | ✓ | ✕ |
Throughput | Up to 7 tx/s | 2800 tx/s | 40 tx/s | 100 1 tx/s and 800 2 tx/s | N/A | 4 tx/s |
Latency | ∼1 h | N/A | 800 s | N/A | N/A | ∼10 min |
Resiliency | Supports up to 50% (≰51%) of Byzantine fault | Up to 33% for shard’s committee and 25% for the entire network | Up to 33% for shard’s committee and 25% for the entire network | Up to 33% for shard’s committee and 51% for beacon’s committee | Up to 33% for shard’s committee and 25% for the entire network | Supports up to 33% (≰) of Byzantine fault participants |
Unique Features | Mining competition | Proposes an innovative smart contract language | First sharding protocol with presence of Byzantine fault | BLS a consensus | State sharding (i.e., Harmony shards Blockchain state) | The miner of the next block is predictable |
Drawbacks | High computational power and low performance | transactions sharding b | Uses small committee size | Centralization concern due to coinage | Centralization concern due to coinage | Centralization concern due to coinage |
Advantages | High level of security | Uses PoW as identity registration to prevent Sybil attacks | Ensures good randomness | High level of privacy | Provides consistent cross-shard transactions | Agile architecture |
3. Probabilistic Model
3.1. Notations & Architecture
3.1.1. Notations & Definitions
3.1.2. Architecture of Incognito
3.2. Probability Distributions
3.3. Years to Fail
4. Evaluation Results
4.1. Simulation Setup
4.2. Results and Analysis
5. Limitations of the Paper and Future Work
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Nakamoto, S. Bitcoin Whitepaper. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 1 January 2022).
- Kassab, M.H.; DeFranco, J.; Malas, T.; Laplante, P.; Destefanis, G.; Graciano Neto, V.V. Exploring Research in Blockchain for Healthcare and a Roadmap for the Future. IEEE Trans. Emerg. Top. Comput. 2019, 9, 1835–1852. [Google Scholar] [CrossRef] [Green Version]
- Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors 2022, 22, 1448. [Google Scholar] [CrossRef] [PubMed]
- Nordgren, A.; Weckström, E.; Martikainen, M.; Lehner, O.M. Blockchain in the fields of finance and accounting: A disruptive technology or an overhyped phenomenon. ACRN Oxf. J. Financ. Risk Perspect. 2019, 8, 47–58. [Google Scholar]
- Abou Jaoude, J.; George Saade, R. Blockchain Applications—Usage in Different Domains. IEEE Access 2019, 7, 45360–45381. [Google Scholar] [CrossRef]
- Hafid, A.; Hafid, A.S.; Samih, M. Scaling Blockchains: A Comprehensive Survey. IEEE Access 2020, 8, 125244–125262. [Google Scholar] [CrossRef]
- PayPal. Available online: https://www.paypal.com/ca/home?locale.x=en_CA (accessed on 12 July 2022).
- Hafid, A.; Hafid, A.S.; Samih, M. A tractable probabilistic approach to analyze sybil attacks in sharding-based blockchain protocols. IEEE Trans. Emerg. Top. Comput. 2022. early access. [Google Scholar] [CrossRef]
- Wang, G.; Shi, Z.J.; Nixon, M.; Han, S. Sok: Sharding on blockchain. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, Zurich, Switzerland, 21–23 October 2019; pp. 41–61. [Google Scholar]
- Hafid, A.; Hafid, A.S.; Samih, M. New Mathematical Model to Analyze Security of Sharding-Based Blockchain Protocols. IEEE Access 2019, 7, 185447–185457. [Google Scholar] [CrossRef]
- Hafid, A.; Hafid, A.S.; Samih, M. A Novel Methodology-Based Joint Hypergeometric Distribution to Analyze the Security of Sharded Blockchains. IEEE Access 2020, 8, 179389–179399. [Google Scholar] [CrossRef]
- Hafid, A.; Hafid Senhaji, A.; Senhaji, A. Sharding-Based Proof-of-Stake Blockchain Protocol: Security Analysis. In Proceedings of the 4th International Congress on Blockchain and Applications, L’Aquila, Italy, 13–15 July 2022; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Incognito. Available online: https://we.incognito.org/t/scaling-blockchain-privacy-with-dynamic-sharding/169 (accessed on 3 September 2022).
- Castro, M.; Liskov, B. Practical byzantine fault tolerance. In OSDI; ACM: New Orleans, LA, USA, 1999; Volume 99, pp. 173–186. [Google Scholar]
- Lamport, L.; Shostak, R.; Pease, M. The Byzantine generals problem. In Concurrency: The Works of Leslie Lamport; ACM: New York, NY, USA, 2019; pp. 203–226. [Google Scholar]
- Zilliqa. The ZILLIQA Technical Whitepaper. Available online: https://docs.zilliqa.com/whitepaper.pdf (accessed on 10 August 2017).
- Harmony. Technical Whitepaper. Available online: https://harmony.one/whitepaper.pdf (accessed on 10 July 2022).
- Luu, L.; Narayanan, V.; Zheng, C.; Baweja, K.; Gilbert, S.; Saxena, P. A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 17–30. [Google Scholar]
- Nxt. Nxt: A Peer-to-Peer Digital Socioeconomic System. Available online: https://nxtdocs.jelurida.com/Nxt_Whitepaper (accessed on 15 March 2022).
- Sasson, E.B.; Chiesa, A.; Garman, C.; Green, M.; Miers, I.; Tromer, E.; Virza, M. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 18–21 May 2014; pp. 459–474. [Google Scholar]
- Rasmussen, R.V.; Trick, M.A. Round robin scheduling—A survey. Eur. J. Oper. Res. 2008, 188, 617–636. [Google Scholar] [CrossRef] [Green Version]
- Rice, J.A. Mathematical Statistics and Data Analysis; Cengage Learning: Belmont, CA, USA, 2006. [Google Scholar]
- Rafael, F. DankSharding. Available online: https://www.rootstrap.com/blog/danksharding-what-is-it-and-how-does-it-work (accessed on 2 December 2022).
- Shardus. White Paper. Available online: https://shardus.com/whitepaper.pdf (accessed on 20 November 2021).
Notation | Description |
---|---|
Number of users (aka number of nodes) | |
n | Committee size of a shard |
Committee size of the beacon chain | |
H | Number of honest validators in a shard |
M | Number of malicious validators in a shard |
Number of validators in a shard () | |
Number of shards | |
X | Random variable that computes the number of malicious nodes in the committee of a shard |
Number of honest validators in the beacon chain | |
Number of malicious validators in the beacon chain | |
Number of validators in the beacon chain () | |
Random variable that computes the number of malicious nodes in the committee of the beacon chain | |
r | Resiliency of the shard committee, |
Resiliency of the beacon committee, | |
R | Percentage of malicious validators in a shard chain |
Percentage of malicious validators in the beacon chain | |
Probability of conquering the protocol | |
Probability of a shard committing a faulty block | |
Probability of all shards committing a faulty block | |
Probability of the beacon chain committing a faulty block | |
Number of years to fail |
= | 10% | 15% | 20% | 30% |
---|---|---|---|---|
1 | 3.63E-66 | 2.10E-34 | 1.58E-18 | 1.70E-04 |
1 | 7.56E+62 | 1.30E+31 | 1.74E+17 | 16.12 |
2 | 0.0 | 5.14E-80 | 2.01E-41 | 5.30E-07 |
2 | inf | 5.33E+76 | 1.36E+38 | 5171.32 |
r | n | Target () | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
2000 | 200 | 400 | 8 | 0.3 (30%) | 0.3 (30%) | 0.33 (33%) | 0.33 (33%) | 0.33 (33%) | 95 | 150 | ≈2500 |
2000 | 200 | 400 | 8 | 0.3 (30%) | 0.3 (30%) | 0.33 (33%) | 0.33 (33%) | 0.33 (33%) | 85 | 145 | ≈2500 |
4000 | 300 | 1000 | 10 | 0.3 (30%) | 0.3 (30%) | 0.33 (33%) | 0.33 (33%) | 0.33 (33%) | 100 | 250 | ≈4000 |
4000 | 300 | 1000 | 10 | 0.3 (30%) | 0.3 (30%) | 0.33 (33%) | 0.33 (33%) | 0.33 (33%) | 122 | 130 | ≈4000 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hafid, A.; Hafid, A.S.; Makrakis, D. Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis. Sensors 2023, 23, 2819. https://doi.org/10.3390/s23052819
Hafid A, Hafid AS, Makrakis D. Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis. Sensors. 2023; 23(5):2819. https://doi.org/10.3390/s23052819
Chicago/Turabian StyleHafid, Abdelatif, Abdelhakim Senhaji Hafid, and Dimitrios Makrakis. 2023. "Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis" Sensors 23, no. 5: 2819. https://doi.org/10.3390/s23052819
APA StyleHafid, A., Hafid, A. S., & Makrakis, D. (2023). Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis. Sensors, 23(5), 2819. https://doi.org/10.3390/s23052819