This Week in Blockchain Research Issue #55
|zk Capital||May 6|
Paper of the Week:
Paper Title: Twins: White-Glove Approach for BFT Testing.
Byzantine behavior is unconstrained, hence, one can only implement a subset of such behaviors and the subset of Byzantine behaviors to be tested are chosen by system de- velopers, who are naturally tainted by having designed the system with certain limited Byzantine behaviors in mind.
In addition, similar challenges arise when testing BFT protocols via formal specification and verification methods. Branching over Byzantine (arbitrary) behavior is unconstrained, leading to state explosion when modeling and model checking.
Moreover, as a pragmatical consideration, developing test code that implements Byzantine attacks might be risky.
This work proposes a new approach for systematically testing BFT systems. Instead of coding incorrect behavior, the proposed work runs faulty nodes in two (or generally, k) parallel universes in tandem. Both instances have the same credentials/signing-keys and run autonomously.
The proposed work is based on the insight that most interesting Byzantine attacks can rely on a correct implementation of the protocol, such that a Byzantine node appears to be honest. Therefore, a message not generated by the correct implementation will not be generated.
Several famous attacks on BFT protocols are reinstated in this approach. In two of these attacks, it took the community more than a decade to discover protocol flaws that this work would have surfaced within minutes.
The authors refer to their proposed work as a “white glove” approach: It is neither “block-box”, since it does modify the internal behavior of the tested system, nor is it “white-box”, because it does not open internal code modules.
It minutely interacts with existing code to control message delivery and schedule various coarse-steps such as protocol rounds. Most importantly, it is practical to deploy in real systems as it uses existing correct node code. In fact, it can be implemented by thinly wrapping twin nodes with a network-scheduler acting as an adversary, easily keeping up with an evolving software project.
Affiliations: * Calibra.
1. Paper Title: Threshold ECDSA for Decentralized Asset Custody.
Summary: A new threshold ECDSA protocol that is designed with interoperability applications in mind and achieves several improvements over previous solutions.
Authors: Adam Gągol* and Damian Straszak*,
Affiliations: * Cardinals.
2. Paper Title: Storing and Retrieving Secrets on a Blockchain.
Summary: This work uses a blockchain to achieve a functionality that is essentially equivalent to extractable witness encryption.
Authors: Vipul Goyal*, Abhiram Kothapalli*, Elisaweta Masserova*, Bryan Parno*, and Yifan Song*,
Affiliations: * Carnegie Mellon University.
Summary: A technical solution to the problem of imposing global constraints on distributed independent entities in the context of multi-platform crowdworking systems.
1. Paper Title: JaxNet: Scalable Blockchain Network.
Summary: A scalable, decentralized cryptocurrency that is based on Proof of Work.
Authors: Iurii Shyshatsky*, Vinod Manoharan*, Taras Emelyanenko *, and Lucas Leger*,
Affiliations: * JaxNet.
1. Paper Title: Proof-Carrying Data from Accumulation Schemes.
Summary: An accumulation scheme for a non-interactive argument, showing that this suffices to construct proof-carrying data (PCD), even if the argument itself does not have a sublinear-time verifier.
Summary: This work formalizes aggregatable subvector commitment (aSVCs), gives an efficient construction in prime-order groups from constant-sized polynomial commitments, and uses it to bootstrap a highly-efficient stateless cryptocurrency.
1. Paper Title: Account Management in Proof of Stake Ledgers.
Summary: A formal PoS wallet construction that enables delegation and stake pool formation.
Summary: This paper discussed some misalignments between the state machine replication approach and the permissioned blockchain requirements and proposed several techniques to address them.
Authors: Alysson Bessani*, Eduardo Alchieri†, Joao Sousa*, Andre Oliveira*, Fernando Pedone‡,
1. Paper Title: Applying Blockchain Layer2 Technology to Mass E-Commerce.
Summary: The effect that layer2 technology can provide in reducing fee costs and improving transaction volumes.
Affiliations: * Trinity College Dublin.
Summary: This article argues that the United States government should embrace cryptocurrencies that are pseudonymous and should further study those which are considered anonymous.
Authors: Raffi Teperdjian*,
Affiliations: * George Washington University.
Conferences & CFPs:
October 21-23 - The second ACM conference on Advances in Financial Technologies (AFT’20) (New York City)
Past Conferences’ Videos:
This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.