Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption

IF 2.3 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC
Mustafa Ibrahim Alnajjar, Mehmet Sabir Kiraz, Ali Al-Bayatti, Suleyman Kardas
{"title":"Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption","authors":"Mustafa Ibrahim Alnajjar, Mehmet Sabir Kiraz, Ali Al-Bayatti, Suleyman Kardas","doi":"10.1186/s13638-024-02390-4","DOIUrl":null,"url":null,"abstract":"<p>A distributed ledger is a shared and synchronized database across multiple designated nodes, often referred to as miners, validators, or peers. These nodes record, distribute, and access data to ensure security and transparency. However, these nodes can be compromised and manipulated by selectively choosing which user transactions to include, exclude, or reorder, thereby gaining an unfair advantage. This is known as a miner/maximal extractable value (MEV) attack. Existing solutions can be classified into various categories, such as MEV auction platforms and time-based ordering properties, which rely on private transaction Mempools. In this paper, we first identify some architectural weaknesses inherent in the latest proposals that divide the block creation and execution roles into separate functions: block builders and block executors. The existing schemes mainly suffer from the verifiability of the decryption process, where a corrupted builder or executor can simply deny the inclusion of specific targeted transactions by exploiting the fact that all transactions are in plain format. To address this, we propose an enhanced version that incorporates a verifiable decryption process. On a very high level, within our proposal, whenever an Executor or a Builder performs a decryption, the decrypted values must be broadcasted. This enables any entity in the network to publicly verify whether the decryption was executed correctly, thus preventing malicious behavior by either party from going undetected. We also define a new adversary model for MEV and conduct a comprehensive security analysis of our protocol against all kinds of potential adversaries related to MEV. Finally, we present the performance analysis of the proposed solution.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"11 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EURASIP Journal on Wireless Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1186/s13638-024-02390-4","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

A distributed ledger is a shared and synchronized database across multiple designated nodes, often referred to as miners, validators, or peers. These nodes record, distribute, and access data to ensure security and transparency. However, these nodes can be compromised and manipulated by selectively choosing which user transactions to include, exclude, or reorder, thereby gaining an unfair advantage. This is known as a miner/maximal extractable value (MEV) attack. Existing solutions can be classified into various categories, such as MEV auction platforms and time-based ordering properties, which rely on private transaction Mempools. In this paper, we first identify some architectural weaknesses inherent in the latest proposals that divide the block creation and execution roles into separate functions: block builders and block executors. The existing schemes mainly suffer from the verifiability of the decryption process, where a corrupted builder or executor can simply deny the inclusion of specific targeted transactions by exploiting the fact that all transactions are in plain format. To address this, we propose an enhanced version that incorporates a verifiable decryption process. On a very high level, within our proposal, whenever an Executor or a Builder performs a decryption, the decrypted values must be broadcasted. This enables any entity in the network to publicly verify whether the decryption was executed correctly, thus preventing malicious behavior by either party from going undetected. We also define a new adversary model for MEV and conduct a comprehensive security analysis of our protocol against all kinds of potential adversaries related to MEV. Finally, we present the performance analysis of the proposed solution.

Abstract Image

利用可验证解密的双层架构缓解 MEV 攻击
分布式账本是多个指定节点(通常称为矿工、验证器或对等节点)共享和同步的数据库。这些节点记录、分发和访问数据,以确保安全性和透明度。然而,这些节点可能会被破坏和操纵,有选择性地选择包含、排除或重新排序哪些用户交易,从而获得不公平的优势。这就是所谓的矿工/最大可提取值(MEV)攻击。现有的解决方案可分为多种类型,如 MEV 拍卖平台和基于时间的排序属性,它们都依赖于私有交易 Mempool。在本文中,我们首先确定了最新方案中固有的一些架构缺陷,这些方案将区块创建和执行角色分为不同的功能:区块创建者和区块执行者。现有方案的主要缺陷在于解密过程的可验证性,在这种情况下,被破坏的构建者或执行者可以利用所有交易都是明文格式这一事实,简单地拒绝包含特定的目标交易。为了解决这个问题,我们提出了一个包含可验证解密过程的增强版本。从高层次上讲,在我们的建议中,每当执行者或构建者执行解密时,解密后的值必须进行广播。这使得网络中的任何实体都能公开验证解密是否正确执行,从而防止任何一方的恶意行为不被发现。我们还为 MEV 定义了一个新的对手模型,并针对与 MEV 相关的各种潜在对手对我们的协议进行了全面的安全分析。最后,我们介绍了所提解决方案的性能分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
7.70
自引率
3.80%
发文量
109
审稿时长
8.0 months
期刊介绍: The overall aim of the EURASIP Journal on Wireless Communications and Networking (EURASIP JWCN) is to bring together science and applications of wireless communications and networking technologies with emphasis on signal processing techniques and tools. It is directed at both practicing engineers and academic researchers. EURASIP Journal on Wireless Communications and Networking will highlight the continued growth and new challenges in wireless technology, for both application development and basic research. Articles should emphasize original results relating to the theory and/or applications of wireless communications and networking. Review articles, especially those emphasizing multidisciplinary views of communications and networking, are also welcome. EURASIP Journal on Wireless Communications and Networking employs a paperless, electronic submission and evaluation system to promote a rapid turnaround in the peer-review process. The journal is an Open Access journal since 2004.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信