This Week in Blockchain Research Issue #39
|zk Capital||Dec 20, 2019|
Paper of the Week:
In literature, there are mainly two kinds of partial synchronous networks for Byzantine Agreement protocols. In type I partial synchronous networks, all messages are guaranteed to be delivered, DoS attacks are not allowed, and reliable point-to-point communication channels for all pairs of participants are required. In type II, the network becomes synchronous after an unknown Global Synchronization Time (GST), DoS attacks are allowed only before GST.
This paper shows attacks that these BFT protocols are insecure in all types of partial synchronous networks.
If there does not exist a reliable broadcast channel before GST of type II networks, then one can launch attacks on several widely deployed BFT protocols (e.g. PBFT, Tendermind BFT, and GRANDPA BFT) so that participants would never reach an agreement on a proposal. Thus these BFT protocols are not secure in type II partial synchronous networks.
Since in type I one does not know when the message could be delivered, the broadcast protocol may be unreliable until the end of a fixed unknown time period. That is, the same attack in type II could be used to show that these protocols will reach deadlock before the end of this unknown time period, participants discard messages if they have changed views already.
A BFT finality gadget protocol is proposed that is based on DLS BFT consensus protocol in partial synchronous networks.
The proposed work leverages the special properties of blockchain that the validity of a candidate next-block is self certified and one can define strict order on all candidate next-blocks.
An analysis is provided that proves security of the proposed work in type II partial synchronous networks and achieves the best performance among existing BFT protocols for blockchains.
Authors: Yongge Wang*
Affiliations: * UNC Charlotte.
1. Paper Title: BDoS: Blockchain Denial of Service.
Summary: An incentive-based attack on blockchain availability with a significantly lower cost.
Authors: Michael Mirkin*†, Yan Ji†‡, Jonathan Pang†§, Ariah Klages-Mundt†§, Ittay Eyal*†, and Ari Jules†‡,
2. Paper Title: Smart Contract Repair.
Summary: A parallel, biased search for a set of edits to that contract that fixes a given vulnerability without breaking any test that previously passed.
3. Paper Title: Implementing a Protocol Native Managed Cryptocurrency.
Summary: An implementation of previous work that does not just leverage many of the strengths of modern cryptocurrencies, but also leverage the capabilities of traditional fiat currencies.
4. Paper Title: Proof of file access in a private P2P network using blockchain.
Summary: A solution that manages to avoid single points of failures, maintains the P2P nature of the file-exchange platform and still provides evidence for the access of a file by a peer.
Authors: Uwe Roth*,
Affiliations: * Luxembourg Institute of Science and Technology.
Summary: A propose privacy-preserving claims issuance model that carries indicators of the provenance of the data and the algorithms used to derive the claim or assertion.
Affiliations: * MIT.
Summary: A secure, scalable and cost-efficient protocol for implementing timed-delivery of private information in a decentralized blockchain network.
Summary: AI bring benefits to blockchain in aspects ofintelligent operational maintenance of blockchain, intelligent quality assurance of smart contracts and automated malicious behaviour detection.
Summary: A sharding-based blockchain framework, for byzantine-resilient distributed-learning under the decentralized 5G computing environment.
Summary: This work shows how the foundational elements of a cryptocurrency can be rethought to support central bank goals and to explicitly support the laws that apply to electronic fiat currencies.
Authors: Peter Mell*,
Affiliations: * NIST.
Summary: The paper proposes an analytical model for characterizing de/centralization in digital networks and maps this onto blockchain networks.
Affiliations: * London School of Economics.
3. Paper Title: Distributed Ledger Technology Systems: A Conceptual Framework.
Summary: This study sets out to contribute to international discussions to create a shared, common language around DLT systems to clarify terminology and concepts.
4. Paper Title: More (or Less) Economic Limits of the Blockchain.
Summary: The economic question is whether PoS type systems can perform more efficiently than PoW systems.
Feb 10-14 - Financial Cryptography and Data Security 2020(Malaysia)
Feb 19-21 - Stanford Blockchain Conference 2020 (Palo Alto)
March 07-08 - Cryptoeconomic Systems Conference 2020 by MIT Press (Boston)
Past Conferences’ Videos:
“Significant research in the blockchain space is constantly being achieved by academic researchers. Unfortunately, a lot of this research is overlooked due to the massive numbers of papers being generated and the way they are being promoted and published. We’ve put together a categorized list of academic papers that can guide our subscribers and keep them up to date.”
Thanks for reading! If we missed anything, shoot us an email so that we can feature it in our next newsletter!
This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.