{"title":"重塑安全系统需要支付多少费用?","authors":"Tarun Chitra, Mallesh Pai","doi":"arxiv-2408.00928","DOIUrl":null,"url":null,"abstract":"Restaking protocols have aggregated billions of dollars of security by\nutilizing token incentives and payments. A natural question to ask is: How much\nsecurity do restaked services \\emph{really} need to purchase? To answer this\nquestion, we expand a model of Durvasula and Roughgarden [DR24] that includes\nincentives and an expanded threat model consisting of strategic attackers and\nusers. Our model shows that an adversary with a strictly submodular profit\ncombined with strategic node operators who respond to incentives can avoid the\nlarge-scale cascading failures of~[DR24]. We utilize our model to construct an\napproximation algorithm for choosing token-based incentives that achieve a\ngiven security level against adversaries who are bounded in the number of\nservices they can simultaneously attack. Our results suggest that incentivized\nrestaking protocols can be secure with proper incentive management.","PeriodicalId":501128,"journal":{"name":"arXiv - QuantFin - Risk Management","volume":"60 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How much should you pay for restaking security?\",\"authors\":\"Tarun Chitra, Mallesh Pai\",\"doi\":\"arxiv-2408.00928\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Restaking protocols have aggregated billions of dollars of security by\\nutilizing token incentives and payments. A natural question to ask is: How much\\nsecurity do restaked services \\\\emph{really} need to purchase? To answer this\\nquestion, we expand a model of Durvasula and Roughgarden [DR24] that includes\\nincentives and an expanded threat model consisting of strategic attackers and\\nusers. Our model shows that an adversary with a strictly submodular profit\\ncombined with strategic node operators who respond to incentives can avoid the\\nlarge-scale cascading failures of~[DR24]. We utilize our model to construct an\\napproximation algorithm for choosing token-based incentives that achieve a\\ngiven security level against adversaries who are bounded in the number of\\nservices they can simultaneously attack. Our results suggest that incentivized\\nrestaking protocols can be secure with proper incentive management.\",\"PeriodicalId\":501128,\"journal\":{\"name\":\"arXiv - QuantFin - Risk Management\",\"volume\":\"60 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - QuantFin - Risk Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2408.00928\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - QuantFin - Risk Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2408.00928","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Restaking protocols have aggregated billions of dollars of security by
utilizing token incentives and payments. A natural question to ask is: How much
security do restaked services \emph{really} need to purchase? To answer this
question, we expand a model of Durvasula and Roughgarden [DR24] that includes
incentives and an expanded threat model consisting of strategic attackers and
users. Our model shows that an adversary with a strictly submodular profit
combined with strategic node operators who respond to incentives can avoid the
large-scale cascading failures of~[DR24]. We utilize our model to construct an
approximation algorithm for choosing token-based incentives that achieve a
given security level against adversaries who are bounded in the number of
services they can simultaneously attack. Our results suggest that incentivized
restaking protocols can be secure with proper incentive management.