稳健的重置网络

Naveen Durvasula, Tim Roughgarden
{"title":"稳健的重置网络","authors":"Naveen Durvasula, Tim Roughgarden","doi":"arxiv-2407.21785","DOIUrl":null,"url":null,"abstract":"We study the risks of validator reuse across multiple services in a restaking\nprotocol. We characterize the robust security of a restaking network as a\nfunction of the buffer between the costs and profits from attacks. For example,\nour results imply that if attack costs always exceed attack profits by 10\\%,\nthen a sudden loss of .1\\% of the overall stake (e.g., due to a software error)\ncannot result in the ultimate loss of more than 1.1\\% of the overall stake. We\nalso provide local analogs of these overcollateralization conditions and robust\nsecurity guarantees that apply specifically for a target service or coalition\nof services. All of our bounds on worst-case stake loss are the best possible.\nFinally, we bound the maximum-possible length of a cascade of attacks. Our results suggest measures of robustness that could be exposed to the\nparticipants in a restaking protocol. We also suggest polynomial-time\ncomputable sufficient conditions that can proxy for these measures.","PeriodicalId":501525,"journal":{"name":"arXiv - CS - Data Structures and Algorithms","volume":"168 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Robust Restaking Networks\",\"authors\":\"Naveen Durvasula, Tim Roughgarden\",\"doi\":\"arxiv-2407.21785\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We study the risks of validator reuse across multiple services in a restaking\\nprotocol. We characterize the robust security of a restaking network as a\\nfunction of the buffer between the costs and profits from attacks. For example,\\nour results imply that if attack costs always exceed attack profits by 10\\\\%,\\nthen a sudden loss of .1\\\\% of the overall stake (e.g., due to a software error)\\ncannot result in the ultimate loss of more than 1.1\\\\% of the overall stake. We\\nalso provide local analogs of these overcollateralization conditions and robust\\nsecurity guarantees that apply specifically for a target service or coalition\\nof services. All of our bounds on worst-case stake loss are the best possible.\\nFinally, we bound the maximum-possible length of a cascade of attacks. Our results suggest measures of robustness that could be exposed to the\\nparticipants in a restaking protocol. We also suggest polynomial-time\\ncomputable sufficient conditions that can proxy for these measures.\",\"PeriodicalId\":501525,\"journal\":{\"name\":\"arXiv - CS - Data Structures and Algorithms\",\"volume\":\"168 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Data Structures and Algorithms\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2407.21785\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Data Structures and Algorithms","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2407.21785","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

我们研究了验证器在重启协议中跨多个服务重用的风险。我们将重启网络的稳健安全性描述为攻击成本与攻击利润之间缓冲的函数。例如,我们的结果表明,如果攻击成本总是超过攻击利润的 10%,那么突然损失总赌注的 0.1%(例如,由于软件错误)不会导致最终损失超过总赌注的 1.1%。我们还提供了这些超额抵押条件的局部类似条件,以及专门适用于目标服务或服务联盟的稳健安全保证。最后,我们限定了级联攻击的最大可能长度。我们的研究结果提出了稳健性的衡量标准,这些标准可以向重置协议的参与者公开。我们还提出了多项式时间可计算的充分条件,这些条件可以替代这些度量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Robust Restaking Networks
We study the risks of validator reuse across multiple services in a restaking protocol. We characterize the robust security of a restaking network as a function of the buffer between the costs and profits from attacks. For example, our results imply that if attack costs always exceed attack profits by 10\%, then a sudden loss of .1\% of the overall stake (e.g., due to a software error) cannot result in the ultimate loss of more than 1.1\% of the overall stake. We also provide local analogs of these overcollateralization conditions and robust security guarantees that apply specifically for a target service or coalition of services. All of our bounds on worst-case stake loss are the best possible. Finally, we bound the maximum-possible length of a cascade of attacks. Our results suggest measures of robustness that could be exposed to the participants in a restaking protocol. We also suggest polynomial-time computable sufficient conditions that can proxy for these measures.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信