ABSTRACT
Financial deposits are fundamental to the security of cryptoeconomic protocols as they serve as insurance against potential misbehaviour of agents. However, protocol designers and their agents face a trade-off when choosing the deposit size. While substantial deposits might increase the protocol security, for example by minimising the impact of adversarial behaviour or risks of currency fluctuations, locked-up capital incurs opportunity costs. Moreover, some protocols require over-collateralization in anticipation of future events and malicious intentions of agents. We present Balance, an application-agnostic system that reduces over-collateralization without compromising protocol security. In Balance, malicious agents receive no additional utility for cheating once their deposits are reduced. At the same time, honest and rational agents increase their utilities for behaving honestly as their opportunity costs for the locked-up deposits are reduced. Balance is a round-based mechanism in which agents need to continuously perform desired actions. Rather than treating agents' incentives and behaviour as ancillary, we explicitly model agents' utility, proving the conditions for incentive compatibility. Balance improves social welfare given a distribution of honest, rational, and malicious agents. Further, we integrate Balance with a cross-chain interoperability protocol, XCLAIM, reducing deposits by 10% while maintaining the same utility for behaving honestly. Our implementation allows any number of agents to be maintained for at most 55,287 gas (~ USD 0.07) to update all agents' scores, and at a cost of 54,948 gas (~ USD 0.07) to update the assignment of all agents to layers.
Supplemental Material
- Amitanand S Aiyer, Lorenzo Alvisi, Allen Clement, Mike Dahlin, Jean-Philippe Martin, and Carl Porth. 2005. BAR fault tolerance for cooperative services. ACM SIGOPS Operating Systems Review, Vol. 39, 5 (2005), 45. https://doi.org/10.1145/1095809.1095816Google ScholarDigital Library
- Aditya Asgaonkar and Bhaskar Krishnamachari. 2018. Token Curated Registries - A Game Theoretic Approach. (2018), 16 pages.arxiv: 1809.01756 http://arxiv.org/abs/1809.01756Google Scholar
- Christian Badertscher, Peter Gavz i, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. 2018. Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18. 913--930. https://doi.org/10.1145/3243734.3243848Google ScholarDigital Library
- Christian Badertscher, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas. 2017. Bitcoin as a Transaction Ledger: A Composable Treatment. In Advances in Cryptology - CRYPTO 2017, Vol. 10401 LNCS. 324--356. http://link.springer.com/10.1007/978--3--319--63688--7_11Google ScholarCross Ref
- Lorenz Breidenbach, Phil Daian, Floriantra Er, and Ari Juels. 2018. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18). 1335--1352. https://thehydra.io/paper.pdfGoogle Scholar
- Miguel Castro and Barbara Liskov. 1999. Practical Byzantine Fault Tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation. 173--186. https://doi.org/10.1.1.17.7523 arxiv: arXiv:1203.6049v1Google ScholarDigital Library
- Gaby G. Dagher, Benedikt Bü nz, Joseph Bonneau, Jeremy Clark, and Dan Boneh. 2015. Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15. ACM Press, New York, New York, USA, 720--731. https://doi.org/10.1145/2810103.2813674Google ScholarDigital Library
- Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2019. Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges. (2019). arxiv: 1904.05234 http://arxiv.org/abs/1904.05234Google Scholar
- Bernardo David, Peter Gavz i, Aggelos Kiayias, and Alexander Russell. 2018. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In Advances in Cryptology - EUROCRYPT 2018, Jesper Buus Nielsen and Vincent Rijmen (Eds.), Vol. 46. Springer International Publishing, Cham, 66--98. https://doi.org/10.1007/978--3--319--78375--8_3Google Scholar
- Simon de la Rouviere. 2017. Introducing Curation Markets: Trade Popularity of Memes & Information (with code)! https://medium.com/@simondlr/introducing-curation-markets-trade-popularity-of-memes-information-with-code-70bf6fed9881Google Scholar
- Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 1--10. https://tik-old.ee.ethz.ch/file//49318d3f56c1d525aabf7fda78b23fc0/P2P2013_041.pdfGoogle Scholar
- Stefan Dziembowski, Lisa Eckey, and Sebastian Faust. 2018. FairSwap: How To Fairly Exchange Digital Goods. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18. ACM Press, New York, New York, USA, 967--984. https://doi.org/10.1145/3243734.3243857Google ScholarDigital Library
- Ittay Eyal and Emin Gün Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Financial Cryptography and Data Security 2014, Vol. 8437. Berlin, Heidelberg, 436--454. https://doi.org/10.1007/978--3--662--45472--5_28Google Scholar
- St. Louis Fed. 2019. 10-Year Treasury Constant Maturity Rate, DGS10. Available at: https://fred.stlouisfed.org/series/DGS10.Google Scholar
- Shane Frederick, George Loewenstein, and Ted O'Donoghue. 2002. Time Discounting and Time Preference: A Critical Review. Journal of Economic Literature, Vol. 40, 2 (2002), 351--401. http://www.jstor.org/stable/2698382Google ScholarCross Ref
- Sebastian Gajek. 2018. Graded Token-Curated Decisions with Up-/Downvoting. https://medium.com/coinmonks/graded-token-curated-decisions-with-up-downvoting-designing-cryptoeconomic-ranking-and-2ce7c000bb51Google Scholar
- Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology-EUROCRYPT 2015. Springer, 281--310. http://courses.cs.washington.edu/courses/cse454/15wi/papers/bitcoin-765.pdfGoogle ScholarCross Ref
- Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 3--16.Google ScholarDigital Library
- Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. 2015. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 692--705.Google ScholarDigital Library
- Dominik Harz and Magnus Boman. 2019. The Scalability of Trustless Trust. In 2nd Workshop on Trusted Smart Contracts (Financial Cryptography and Data Security). 279--293. https://doi.org/10.1007/978--3--662--58820--8_19 arxiv: 1801.09535Google Scholar
- Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). 129--144. https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdfGoogle Scholar
- Ferry Hendrikx, Kris Bubendorfer, and Ryan Chard. 2015. Reputation systems: A survey and taxonomy. J. Parallel and Distrib. Comput., Vol. 75 (jan 2015), 184--197. https://doi.org/10.1016/j.jpdc.2014.08.004Google ScholarDigital Library
- Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems, Vol. 43, 2 (mar 2007), 618--644. https://doi.org/10.1016/j.dss.2005.05.019Google ScholarDigital Library
- Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S Matthew Weinberg, and Edward W Felten. 2018. Arbitrum: Scalable, private smart contracts. In Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 1353--1370.Google Scholar
- Sepandar D Kamvar, Mario T Schlosser, and Hector Garcia-Molina. 2003. The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the twelfth international conference on World Wide Web - WWW '03. ACM Press, New York, New York, USA, 640. https://doi.org/10.1145/775152.775242Google ScholarCross Ref
- Rami Khalil and Arthur Gervais. 2017. Revive: Rebalancing Off-Blockchain Payment Networks. Cryptology ePrint Archive, Report 2017/823. http://eprint.iacr.org/2017/823.pdf Accessed:2017-09--26.Google ScholarDigital Library
- Rami Khalil, Arthur Gervais, and Guillaume Felley. 2018. NOCUST--A Securely Scalable Commit-Chain. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 642.Google Scholar
- Rami Khalil, Arthur Gervais, and Guillaume Felley. 2019. TEX-A Securely Scalable Trustless Exchange. IACR Cryptology ePrint Archive, Vol. 2019 (2019), 265.Google Scholar
- Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Symposium on Security & Privacy. IEEE. http://eprint.iacr.org/2015/675.pdfGoogle ScholarCross Ref
- Ranjit Kumaresan and Iddo Bentov. 2014. How to use bitcoin to incentivize correct computations. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 30--41. http://www.cs.technion.ac.il/ idddo/incentivesBitcoin.pdfGoogle ScholarDigital Library
- Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S Rosenschein. 2015. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis Categories and Subject Descriptors. Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015) (2015), 919--927.Google Scholar
- Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros. 2017. Trust Is Risk: A Decentralized Financial Trust Platform. (2017), bibinfonumpages156 pages.Google Scholar
- Loi Luu, Jason Teutsch, Raghav Kulkarni, and Prateek Saxena. 2015. Demystifying incentives in the consensus computer. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 706--719. http://www.comp.nus.edu.sg/ prateeks/papers/VeriEther.pdfGoogle ScholarDigital Library
- Trent McConaghy. 2018. The Layered TCR. https://blog.oceanprotocol.com/the-layered-tcr-56cc5b4cdc45Google Scholar
- P McCorry, S Bakshi, I Bentov, Andrew Miller, and ... 2018a. Pisa: Arbitration Outsourcing for State Channels. (2018). https://www.cs.cornell.edu/ iddo/pisa.pdfGoogle Scholar
- Patrick McCorry, Alexander Hicks, and Sarah Meiklejohn. 2018b. Smart Contracts for Bribing Miners. In Financial Cryptography and Data Security. FC 2018., Vol. 10958. Springer Berlin Heidelberg, 3--18. https://doi.org/10.1007/978--3--662--58820--8_1Google Scholar
- Mike Goldin. 2017. Token-Curated Registries 1.0. (2017), bibinfonumpages10 pages. https://medium.com/@ilovebagels/token-curated-registries-1-0--61a232f8dac7Google Scholar
- Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 31--42.Google ScholarDigital Library
- Moore, Tyler and Christin, Nicolas. 2013. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In International Conference on Financial Cryptography and Data Security. Springer, 25--33.Google Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf. https://bitcoin.org/bitcoin.pdf Accessed: 2015-07-01.Google Scholar
- Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V. Vazirani. 2007. Algorithmic Game Theory. Vol. 1. Cambridge University Press, Cambridge. 1--754 pages. https://doi.org/10.1017/CBO9780511800481 arxiv: 0907.4385Google ScholarDigital Library
- Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the Blockchain Protocol in Asynchronous Networks. In Advances in Cryptology - EUROCRYPT 2017, Vol. 10211. 643--673. https://doi.org/10.1007/978--3--319--56614--6_22Google ScholarCross Ref
- Isaac Pinyol and Jordi Sabater-Mir. 2013. Computational trust and reputation models for open multi-agent systems: A review. Artificial Intelligence Review, Vol. 40, 1 (2013), 1--25. https://doi.org/10.1007/s10462-011--9277-zGoogle ScholarDigital Library
- Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network. https://lightning.network/lightning-network-paper.pdf. https://lightning.network/lightning-network-paper.pdf Accessed: 2016-07-07.Google Scholar
- Achill Rudolph. 2018. Ranking Token Curated Registries. https://medium.com/coinmonks/ranking-token-curated-registries-e9a92dc85b31Google Scholar
- Tuomas W. Sandholm and Victor R. Lesser. 2001. Leveled Commitment Contracts and Strategic Breach. Games and Economic Behavior, Vol. 35, 1--2 (2001), 212--270. https://doi.org/10.1006/game.2000.0831Google ScholarCross Ref
- Tendermint. 2016. Introduction to Tendermint - Tendermint. https://tendermint.com/introGoogle Scholar
- Jason Teutsch and Christian Reitwießner. 2017. A scalable verification solution for blockchains. (2017), bibinfonumpages44 pages.Google Scholar
- Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Buenzli, and Martin Vechev. 2018. Securify: Practical security analysis of smart contracts. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 67--82.Google ScholarDigital Library
- Gavin Wood. 2014. Ethereum: a secure decentralised generalised transaction ledger. (2014), bibinfonumpages32 pages.Google Scholar
- Michael Wooldridge. 2009. An Introduction to MultiAgent Systems 2nd ed.). Wiley Publishing.Google ScholarDigital Library
- Jiangshan Yu, David Kozhaya, Jeremie Decouchant, and Paulo Verissimo. 2019. RepuCoin: Your Reputation is Your Power. IEEE Trans. Comput. (2019), 1--1. https://doi.org/10.1109/TC.2019.2900648Google Scholar
- Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, and William J. Knottenbelt. 2019. XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets. In Proceedings of the IEEE Symposium on Security & Privacy, May 2019. 1254--1271. https://doi.org/10.1109/SP.2019.00085Google Scholar
- Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town Crier: An Authenticated Data Feed for Smart Contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 270--282. https://eprint.iacr.org/2016/168.pdfGoogle ScholarDigital Library
- Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471. https://arxiv.org/pdf/1506.03471.pdf Accessed: 2017-08--22.Google Scholar
Index Terms
- Balance: Dynamic Adjustment of Cryptocurrency Deposits
Recommendations
Sincere and sophisticated players in the envy-free allocation problem
EC '13: Proceedings of the fourteenth ACM conference on Electronic commerceWe study the problem of allocating a collective endowment of n objects among n agents when monetary compensation is available. We require budget balance and assume complete information. We also assume that money is desirable and that no object is ...
Sincere and sophisticated players in the envy-free allocation problem
EC '13: Proceedings of the fourteenth ACM conference on Electronic commerceWe study the problem of allocating a collective endowment of n objects among n agents when monetary compensation is available. We require budget balance and assume complete information. We also assume that money is desirable and that no object is ...
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information
Fairness in secure two-party computation ensures that either both of the communicating parties learn the output of some pre-defined function or none of them does. Rational two-party computation is an extension of two-party computation that incorporates ...
Comments