Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–6 of 6 results for author: D'Amato, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.00549  [pdf, ps, other

    cs.DC

    A Confirmation Rule for the Ethereum Consensus Protocol

    Authors: Aditya Asgaonkar, Francesco D'Amato, Roberto Saltini, Luca Zanolini, Chenyi Zhang

    Abstract: A Confirmation Rule, within blockchain networks, refers to an algorithm implemented by network nodes that determines (either probabilistically or deterministically) the permanence of certain blocks on the blockchain. An example of Confirmation Rule is the Bitcoin's longest chain Confirmation Rule where a block is confirmed (with high probability) when it has a sufficiently long chain of successors… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  2. arXiv:2310.11331  [pdf, ps, other

    cs.DC

    Streamlining Sleepy Consensus: Total-Order Broadcast with Single-Vote Decisions in the Sleepy Model

    Authors: Francesco D'Amato, Luca Zanolini

    Abstract: Over the past years, distributed consensus research has shifted its focus towards addressing challenges in large-scale, permissionless systems, such as blockchains. This shift is characterized by the need to accommodate dynamic participation, contrasting the traditional approach of a static set of continuously online participants. Works like Bitcoin and the Sleepy Model have set the stage for this… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

  3. arXiv:2309.05347  [pdf, other

    cs.DC

    Asynchrony-Resilient Sleepy Total-Order Broadcast Protocols

    Authors: Francesco D'Amato, Giuliano Losa, Luca Zanolini

    Abstract: Dynamically available total-order broadcast (TOB) protocols tolerate fluctuating participation, e.g., as high as 99% of their participants going offline, which is especially useful in permissionless blockchain environments. However, dynamically available TOB protocols are synchronous protocols, and they lose their safety guarantees during periods of asynchrony. This is a major issue in practice.… ▽ More

    Submitted 6 May, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

  4. arXiv:2302.12745  [pdf, ps, other

    cs.DC

    A Simple Single Slot Finality Protocol For Ethereum

    Authors: Francesco D'Amato, Luca Zanolini

    Abstract: Currently, Gasper, the implemented consensus protocol of Ethereum, takes between 64 and 95 slots to finalize blocks. Because of that, a significant portion of the chain is susceptible to reorgs. The possibility to capture MEV (Maximum Extractable Value) through such reorgs can then disincentivize honestly following the protocol, breaking the desired correspondence of honest and rational behavior.… ▽ More

    Submitted 15 August, 2023; v1 submitted 24 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2302.11326

  5. arXiv:2302.11326  [pdf, ps, other

    cs.DC

    Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience

    Authors: Francesco D'Amato, Luca Zanolini

    Abstract: Dynamic participation has recently become a crucial requirement for devising permissionless consensus protocols. This notion, originally formalized by Pass and Shi (ASIACRYPT 2017) through their "sleepy model", captures the essence of a system's ability to handle participants joining or leaving during a protocol execution. A dynamically available consensus protocol preserves safety and liveness wh… ▽ More

    Submitted 17 August, 2023; v1 submitted 22 February, 2023; originally announced February 2023.

  6. arXiv:2209.03255  [pdf, other

    cs.CR cs.DC

    Goldfish: No More Attacks on Ethereum?!

    Authors: Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, David Tse

    Abstract: The LMD GHOST consensus protocol is a critical component of proof-of-stake Ethereum. In its current form, this protocol is brittle, as evidenced by recent attacks and patching attempts. We propose Goldfish, a new protocol that satisfies key properties required of a drop-in replacement for LMD GHOST: Goldfish is secure in the sleepy model, assuming a majority of the validators follows the protocol.… ▽ More

    Submitted 30 December, 2023; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Financial Cryptography and Data Security 2024