Alpesh Bhudia, A. Cartwright, E. Cartwright, J. Hernandez-Castro, D. Hurley-Smith
{"title":"Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism","authors":"Alpesh Bhudia, A. Cartwright, E. Cartwright, J. Hernandez-Castro, D. Hurley-Smith","doi":"10.1109/COINS54846.2022.9854946","DOIUrl":null,"url":null,"abstract":"Cryptocurrencies to date, most notably Bitcoin, have primarily relied on a proof-of-work system to validate and process transactions on the blockchain. Proof-of-work systems have, however, several limitations, such as enormous energy demands, and so are likely to be replaced by proof-of-stake systems. These systems use a mechanism that does not rely on mining power but the amount of stake owned by a node, allowing randomly selected validators to create blocks and verify blocks created by other validators. Proof-of-stake systems naturally result in staking pools where in a third party organisation operates validators on behalf of investors who have staked in the currency. Given they have oversight for a large amount of staked currency, staking pools are a prime target for malicious actors. In this paper we explore the economic implications of an attack on a staking pool. We pay particular attention to how the staking pool and clients could resolve an extortion attack by a malicious actor who has accessed relevant signing keys.","PeriodicalId":187055,"journal":{"name":"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COINS54846.2022.9854946","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cryptocurrencies to date, most notably Bitcoin, have primarily relied on a proof-of-work system to validate and process transactions on the blockchain. Proof-of-work systems have, however, several limitations, such as enormous energy demands, and so are likely to be replaced by proof-of-stake systems. These systems use a mechanism that does not rely on mining power but the amount of stake owned by a node, allowing randomly selected validators to create blocks and verify blocks created by other validators. Proof-of-stake systems naturally result in staking pools where in a third party organisation operates validators on behalf of investors who have staked in the currency. Given they have oversight for a large amount of staked currency, staking pools are a prime target for malicious actors. In this paper we explore the economic implications of an attack on a staking pool. We pay particular attention to how the staking pool and clients could resolve an extortion attack by a malicious actor who has accessed relevant signing keys.