Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies

被引:0
|
作者
Ganesh, Chaya [1 ]
Orlandi, Claudio [2 ]
Tschudi, Daniel [3 ]
Zohar, Aviv [4 ]
机构
[1] Indian Inst Sci, Bangalore, Karnataka, India
[2] Aarhus Univ, Concordium Blockchain Res Ctr, Aarhus, Denmark
[3] Concordium, Zurich, Switzerland
[4] Hebrew Univ Jerusalem, Jerusalem, Israel
基金
欧洲研究理事会; 以色列科学基金会;
关键词
D O I
10.1007/978-3-030-93944-1_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In proof-of-work based cryptocurrencies, miners invest computing power to maintain a distributed ledger. One known drawback of such a consensus protocol is its immense energy consumption. To prevent this waste of energy various consensus mechanism such as proof-of-space or proof-of-stake have been proposed. In proof-of-stake, block creators are selected based on the amounts of currency they stake instead of their expanded computing power. In this work we study Virtual ASICs-a generalization of proof-of-stake. Virtual ASICs are essentially a virtualized version of proof-of-work. Miners can buy on-chain virtual mining machines which can be powered by virtual electricity. Similar to their physical counterparts, each powered virtual ASIC has a certain chance to win the right to create the next block. In the boundary case where virtual electricity is free, the protocol corresponds to proof-of-stake using an ASIC token which is separate from the currency itself (the amount of stake equals your virtual computing power). In the other boundary case where virtual computers are free, we get a proof-of-burn equivalent. That is, a consensus mechanism in which miners 'burn' currency to obtain lottery tickets for the right to create the next block. From a technical point of view, we provide the following contributions: - We design cryptographic protocols that allow to sell Virtual ASICs in sealed-bid auctions on-chain. We ensure that as long as a majority of the miners in the system mine honestly, bids remain both private and binding, and that miners cannot censor the bids of their competitors; - In order to implement our auction protocol, we introduce a novel all-or-nothing broadcast functionality in blockchains that allows to "encrypt values to the future" and could be of independent interest. - Finally, we provide a consensus protocol based on Virtual ASICs by generalizing existing protocols for proof-of-stake consensus.
引用
收藏
页码:173 / 191
页数:19
相关论文
共 50 条
  • [1] Compounding of Wealth in Proof-of-Stake Cryptocurrencies
    Fanti, Giulia
    Kogan, Leonid
    Oh, Sewoong
    Ruan, Kathleen
    Viswanath, Pramod
    Wang, Gerui
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 42 - 61
  • [2] Balancing Participation and Decentralization in Proof-of-Stake Cryptocurrencies
    Kiayias, Aggelos
    Koutsoupias, Elias
    Marmolejo-Cossio, Francisco
    Stouka, Aikaterini-Panagiota
    ALGORITHMIC GAME THEORY, SAGT 2024, 2024, 15156 : 333 - 350
  • [3] A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies
    Naderi, Zahra
    Shariatpanahi, Seyed Pooya
    Bahrak, Behnam
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (03) : 1322 - 1334
  • [4] Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies
    Lee, Suhyeon
    Kim, Seungjoo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (16):
  • [5] Proof-of-Stake Sidechains
    Gazi, Peter
    Kiayias, Aggelos
    Zindros, Dionysis
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 139 - 156
  • [6] Stake-Bleeding Attacks on Proof-of-Stake Blockchains
    Gazi, Peter
    Kiayias, Aggelos
    Russell, Alexander
    2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, : 85 - 92
  • [7] Evolution of Shares in a Proof-of-Stake Cryptocurrency
    Rosu, Ioanid
    Saleh, Fahad
    MANAGEMENT SCIENCE, 2021, 67 (02) : 661 - 672
  • [8] LaKSA: A Probabilistic Proof-of-Stake Protocol
    Reijsbergen, Daniel
    Szalachowski, Pawel
    Ke, Junming
    Li, Zengpeng
    Zhou, Jianying
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [9] Securing Proof-of-Stake Blockchain Protocols
    Li, Wenting
    Andreina, Sebastien
    Bohli, Jens-Matthias
    Karame, Ghassan
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 297 - 315
  • [10] Formal Analysis of a Proof-of-Stake Blockchain
    Thin, Wai Yan Maung Maung
    Dong, Naipeng
    Bai, Guangdong
    Dong, Jin Song
    2018 23RD INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2018, : 197 - 200