Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–18 of 18 results for author: Neu, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.16902  [pdf, other

    cs.CR

    Short Paper: Accountable Safety Implies Finality

    Authors: Joachim Neu, Ertem Nusret Tas, David Tse

    Abstract: Motivated by proof-of-stake (PoS) blockchains such as Ethereum, two key desiderata have recently been studied for Byzantine-fault tolerant (BFT) state-machine replication (SMR) consensus protocols: Finality means that the protocol retains consistency, as long as less than a certain fraction of validators are malicious, even in partially-synchronous environments that allow for temporary violations… ▽ More

    Submitted 28 December, 2023; v1 submitted 31 August, 2023; originally announced August 2023.

    Comments: Financial Cryptography and Data Security 2024

  2. arXiv:2308.05096  [pdf, other

    cs.DC cs.CR

    Optimal Flexible Consensus and its Application to Ethereum

    Authors: Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse

    Abstract: Classic BFT consensus protocols guarantee safety and liveness for all clients if fewer than one-third of replicas are faulty. However, in applications such as high-value payments, some clients may want to prioritize safety over liveness. Flexible consensus allows each client to opt for a higher safety resilience, albeit at the expense of reduced liveness resilience. We present the first constructi… ▽ More

    Submitted 3 December, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: To be published at the IEEE Symposium on Security & Privacy 2024

  3. Nakamoto Consensus under Bounded Processing Capacity

    Authors: Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse

    Abstract: For Nakamoto's longest-chain consensus protocol, whose proof-of-work (PoW) and proof-of-stake (PoS) variants power major blockchains such as Bitcoin and Cardano, we revisit the classic problem of the security-performance tradeoff: Given a network of nodes with finite communication- and computation-resources, against what fraction of adversary power is Nakamoto consensus (NC) secure for a given blo… ▽ More

    Submitted 24 June, 2024; v1 submitted 16 March, 2023; originally announced March 2023.

    Comments: ACM Conference on Computer and Communications Security (CCS) 2024

  4. arXiv:2209.08673  [pdf, other

    cs.CR

    Proofs of Proof-of-Stake with Sublinear Complexity

    Authors: Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, Dionysis Zindros

    Abstract: Popular Ethereum wallets (like MetaMask) entrust centralized infrastructure providers (e.g., Infura) to run the consensus client logic on their behalf. As a result, these wallets are light-weight and high-performant, but come with security risks. A malicious provider can mislead the wallet by faking payments and balances, or censoring transactions. On the other hand, light clients, which are not i… ▽ More

    Submitted 24 October, 2023; v1 submitted 18 September, 2022; originally announced September 2022.

  5. arXiv:2209.03255  [pdf, other

    cs.CR cs.DC

    Goldfish: No More Attacks on Ethereum?!

    Authors: Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, David Tse

    Abstract: The LMD GHOST consensus protocol is a critical component of proof-of-stake Ethereum. In its current form, this protocol is brittle, as evidenced by recent attacks and patching attempts. We propose Goldfish, a new protocol that satisfies key properties required of a drop-in replacement for LMD GHOST: Goldfish is secure in the sleepy model, assuming a majority of the validators follows the protocol.… ▽ More

    Submitted 30 December, 2023; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: Financial Cryptography and Data Security 2024

  6. arXiv:2203.01315  [pdf, other

    cs.CR

    Two Attacks On Proof-of-Stake GHOST/Ethereum

    Authors: Joachim Neu, Ertem Nusret Tas, David Tse

    Abstract: We present two attacks targeting the Proof-of-Stake (PoS) Ethereum consensus protocol. The first attack suggests a fundamental conceptual incompatibility between PoS and the Greedy Heaviest-Observed Sub-Tree (GHOST) fork choice paradigm employed by PoS Ethereum. In a nutshell, PoS allows an adversary with a vanishing amount of stake to produce an unlimited number of equivocating blocks. While most… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

  7. arXiv:2111.12332  [pdf, other

    cs.CR cs.DC

    Longest Chain Consensus Under Bandwidth Constraint

    Authors: Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh

    Abstract: Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of a major blockchain, Solana. They cause congestion and excessive message delays in a real network due to its bandwidth constraints. In contrast, longest chain (LC), an important family of consensus protocols, has previously only been proven secure assuming an idealized network model in which all messag… ▽ More

    Submitted 17 May, 2022; v1 submitted 24 November, 2021; originally announced November 2021.

  8. arXiv:2111.12323  [pdf, other

    cs.CR

    Information Dispersal with Provable Retrievability for Rollups

    Authors: Kamilla Nazirkhanova, Joachim Neu, David Tse

    Abstract: The ability to verifiably retrieve transaction or state data stored off-chain is crucial to blockchain scaling techniques such as rollups or sharding. We formalize the problem and design a storage- and communication-efficient protocol using linear erasure-correcting codes and homomorphic vector commitments. Motivated by application requirements for rollups, our solution Semi-AVID-PR departs from e… ▽ More

    Submitted 5 May, 2022; v1 submitted 24 November, 2021; originally announced November 2021.

  9. arXiv:2110.10086  [pdf, ps, other

    cs.CR

    Three Attacks on Proof-of-Stake Ethereum

    Authors: Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse

    Abstract: Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators' profits and delay consensus decisions, and one where adversarial network delay is leveraged to stall consensus decisions indefinitely. We provide refined variants of these attacks, considerably relaxing the r… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  10. arXiv:2105.06075  [pdf, ps, other

    cs.CR cs.DC

    The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets

    Authors: Joachim Neu, Ertem Nusret Tas, David Tse

    Abstract: For applications of Byzantine fault tolerant (BFT) consensus protocols where the participants are economic agents, recent works highlighted the importance of accountability: the ability to identify participants who provably violate the protocol. At the same time, being able to reach consensus under dynamic levels of participation is desirable for censorship resistance. We identify an availability-… ▽ More

    Submitted 18 May, 2022; v1 submitted 13 May, 2021; originally announced May 2021.

  11. arXiv:2010.10447  [pdf, ps, other

    cs.CR cs.DC

    Snap-and-Chat Protocols: System Aspects

    Authors: Joachim Neu, Ertem Nusret Tas, David Tse

    Abstract: The availability-finality dilemma says that blockchain protocols cannot be both available under dynamic participation and safe under network partition. Snap-and-chat protocols have recently been proposed as a resolution to this dilemma. A snap-and-chat protocol produces an always available ledger containing a finalized prefix ledger which is always safe and catches up with the available ledger whe… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

  12. arXiv:2009.04987  [pdf, ps, other

    cs.CR cs.DC

    Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma

    Authors: Joachim Neu, Ertem Nusret Tas, David Tse

    Abstract: The CAP theorem says that no blockchain can be live under dynamic participation and safe under temporary network partitions. To resolve this availability-finality dilemma, we formulate a new class of flexible consensus protocols, ebb-and-flow protocols, which support a full dynamically available ledger in conjunction with a finalized prefix ledger. The finalized ledger falls behind the full ledger… ▽ More

    Submitted 4 February, 2021; v1 submitted 10 September, 2020; originally announced September 2020.

    Comments: Forthcoming in IEEE Symposium on Security and Privacy 2021

  13. Successive Cancellation Inactivation Decoding for Modified Reed-Muller and eBCH Codes

    Authors: Mustafa Cemil Coşkun, Joachim Neu, Henry D. Pfister

    Abstract: A successive cancellation (SC) decoder with inactivations is proposed as an efficient implementation of SC list (SCL) decoding over the binary erasure channel. The proposed decoder assigns a dummy variable to an information bit whenever it is erased during SC decoding and continues with decoding. Inactivated bits are resolved using information gathered from decoding frozen bits. This decoder lever… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Comments: Accepted at the 2020 ISIT

  14. arXiv:1910.01834  [pdf, other

    cs.CR cs.DC cs.IT cs.NI

    Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks

    Authors: Vivek Bagaria, Joachim Neu, David Tse

    Abstract: In multi-path routing schemes for payment-channel networks, Alice transfers funds to Bob by splitting them into partial payments and routing them along multiple paths. Undisclosed channel balances and mismatched transaction fees cause delays and failures on some payment paths. For atomic transfer schemes, these straggling paths stall the whole transfer. We show that the latency of transfers reduce… ▽ More

    Submitted 29 March, 2020; v1 submitted 4 October, 2019; originally announced October 2019.

  15. Ternary Quantized Polar Code Decoders: Analysis and Design

    Authors: Joachim Neu, Mustafa Cemil Coşkun, Gianluigi Liva

    Abstract: The performance of short polar codes under successive cancellation (SC) and SC list (SCL) decoding is analyzed for the case where the decoder messages are coarsely quantized. This setting is of particular interest for applications requiring low-complexity energy-efficient transceivers (e.g., internet-of-things or wireless sensor networks). We focus on the extreme case where the decoder messages ar… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

  16. Babel Storage: Uncoordinated Content Delivery from Multiple Coded Storage Systems

    Authors: Joachim Neu, Muriel Médard

    Abstract: In future content-centric networks, content is identified independently of its location. From an end-user's perspective, individual storage systems dissolve into a seemingly omnipresent structureless `storage fog'. Content should be delivered oblivious of the network topology, using multiple storage systems simultaneously, and at minimal coordination overhead. Prior works have addressed the advant… ▽ More

    Submitted 25 August, 2019; originally announced August 2019.

  17. arXiv:1902.10395  [pdf

    cs.IT

    Quantized Polar Code Decoders: Analysis and Design

    Authors: Joachim Neu

    Abstract: Applications of massive machine-type communications, such as sensor networks, smart metering, 'internet-of-things', or process and factory automation, are forecast to have great economic impact in the next five to ten years. Low-complexity energy- and cost-efficient communication schemes are essential to enable large-scale deployments. To target these requirements, we study decoding of polar codes… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

  18. Degrees-of-Freedom of the MIMO Three-Way Channel with Node-Intermittency

    Authors: Joachim Neu, Anas Chaaban, Aydin Sezgin, Mohamed-Slim Alouini

    Abstract: The characterization of fundamental performance bounds of many-to-many communication systems in which participating nodes are active in an intermittent way is one of the major challenges in communication theory. In order to address this issue, we introduce the multiple-input multiple-output (MIMO) three-way channel (3WC) with an intermittent node and study its degrees-of-freedom (DoF) region and s… ▽ More

    Submitted 31 May, 2019; v1 submitted 27 August, 2017; originally announced August 2017.