Optimal RANDAO Manipulation in Ethereum

Authors Kaya Alpturer , S. Matthew Weinberg



PDF
Thumbnail PDF

File

LIPIcs.AFT.2024.10.pdf
  • Filesize: 1 MB
  • 21 pages

Document Identifiers

Author Details

Kaya Alpturer
  • Princeton University, NJ, USA
S. Matthew Weinberg
  • Princeton University, NJ, USA

Acknowledgements

We are grateful to Noah Citron for introducing us to the problem, and helpful discussions in early phases of this work. We are also grateful to Yunus Aydın, István Seres, Aadityan Ganesh, and anonymous reviewers for feedback on earlier drafts of this work.

Cite AsGet BibTex

Kaya Alpturer and S. Matthew Weinberg. Optimal RANDAO Manipulation in Ethereum. In 6th Conference on Advances in Financial Technologies (AFT 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 316, pp. 10:1-10:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.AFT.2024.10

Abstract

It is well-known that RANDAO manipulation is possible in Ethereum if an adversary controls the proposers assigned to the last slots in an epoch. We provide a methodology to compute, for any fraction α of stake owned by an adversary, the maximum fraction f(α) of rounds that a strategic adversary can propose. We further implement our methodology and compute f(⋅) for all α. For example, we conclude that an optimal strategic participant with 5% of the stake can propose a 5.048% fraction of rounds, 10% of the stake can propose a 10.19% fraction of rounds, and 20% of the stake can propose a 20.68% fraction of rounds.

Subject Classification

ACM Subject Classification
  • Theory of computation → Algorithmic game theory and mechanism design
  • Information systems → Digital cash
  • Security and privacy → Distributed systems security
Keywords
  • Proof of Stake
  • Consensus
  • Blockchain
  • Ethereum
  • Randomness manipulation

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Randao: A dao working as rng of ethereum, March 2019. URL: https://github.com/randao/randao/.
  2. Musab A Alturki and Grigore Roşu. Statistical model checking of randao’s resilience to pre-computed reveal strategies. In Formal Methods. FM 2019 International Workshops, pages 337-349, Porto, Portugal, 2020. Springer. Google Scholar
  3. Maryam Bahrani and S. Matthew Weinberg. Undetectable selfish mining. In EC '24: The 25th ACM Conference on Economics and Computation. ACM, 2024. Google Scholar
  4. Jonah Brown-Cohen, Arvind Narayanan, Alexandros Psomas, and S. Matthew Weinberg. Formal barriers to longest-chain proof-of-stake protocols. In Proceedings of the 2019 ACM Conference on Economics and Computation, EC '19, pages 459-473, New York, NY, USA, 2019. Association for Computing Machinery. URL: https://doi.org/10.1145/3328526.3329567.
  5. Vitalik Buterin. Randao beacon exploitability analysis, round 2, May 2018. URL: https://ethresear.ch/t/randao-beacon-exploitability-analysis-round-2/1980.
  6. Vitalik Buterin. Rng exploitability analysis assuming pure randao-based main chain, April 2018. URL: https://ethresear.ch/t/rng-exploitability-analysis-assuming-pure-randao-based-main-chain/1825/1.
  7. Vitalik Buterin. Vitalik’s annotated ethereum 2.0 spec, 2020. URL: https://notes.ethereum.org/@vbuterin/SkeyEI3xv#Time-parameters.
  8. Miles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, and Arvind Narayanan. On the instability of bitcoin without the block reward. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pages 154-167, 2016. URL: https://doi.org/10.1145/2976749.2978408.
  9. Ben Edgington. Upgrading ethereum, 2023. Capella edition. URL: https://eth2book.info/.
  10. Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436-454. Springer, 2014. Google Scholar
  11. Matheus V. X. Ferreira, Ye Lin Sally Hahn, S. Matthew Weinberg, and Catherine Yu. Optimal strategic mining against cryptographic self-selection in proof-of-stake. In David M. Pennock, Ilya Segal, and Sven Seuken, editors, EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11 - 15, 2022, pages 89-114. ACM, 2022. URL: https://doi.org/10.1145/3490486.3538337.
  12. Matheus V. X. Ferreira and S. Matthew Weinberg. Credible, truthful, and two-round (optimal) auctions via cryptographic commitments. In Péter Biró, Jason D. Hartline, Michael Ostrovsky, and Ariel D. Procaccia, editors, EC '20: The 21st ACM Conference on Economics and Computation, Virtual Event, Hungary, July 13-17, 2020, pages 683-712. ACM, 2020. URL: https://doi.org/10.1145/3391403.3399495.
  13. Matheus V. X. Ferreira and S. Matthew Weinberg. Proof-of-stake mining games with perfect randomness. In Proceedings of the 22nd ACM Conference on Economics and Computation, EC '21, pages 433-453, New York, NY, USA, 2021. Association for Computing Machinery. URL: https://doi.org/10.1145/3465456.3467636.
  14. Matheus V.X. Ferreira, Aadityan Ganesh, Jack Hourigan, Hannah Hu, S. Matthew Weinberg, and Catherine Yu. Computing optimal manipulations in cryptographic self-selection proof-of-stake protocols. In EC '24: The 25th ACM Conference on Economics and Computation. ACM, 2024. Google Scholar
  15. Matheus V.X. Ferreira, Ye Lin Sally Hahn, S. Matthew Weinberg, and Catherine Yu. Optimal strategic mining against cryptographic self-selection in proof-of-stake. In Proceedings of the 23rd ACM Conference on Economics and Computation, EC '22, pages 89-114, New York, NY, USA, 2022. Association for Computing Machinery. Google Scholar
  16. Amos Fiat, Anna Karlin, Elias Koutsoupias, and Christos H. Papadimitriou. Energy equilibria in proof-of-work mining. In Proceedings of the 2019 ACM Conference on Economics and Computation, EC 2019, Phoenix, AZ, USA, June 24-28, 2019., pages 489-502, 2019. URL: https://doi.org/10.1145/3328526.3329630.
  17. Guy Goren and Alexander Spiegelman. Mind the mining. In Proceedings of the 2019 ACM Conference on Economics and Computation, EC 2019, Phoenix, AZ, USA, June 24-28, 2019., pages 475-487, 2019. URL: https://doi.org/10.1145/3328526.3329566.
  18. R.A. Howard. Dynamic programming and Markov processes. Technology Press of Massachusetts Institute of Technology, 1960. Google Scholar
  19. Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, and Yiannis Tselekounis. Blockchain mining games. In Proceedings of the 2016 ACM Conference on Economics and Computation, EC '16, Maastricht, The Netherlands, July 24-28, 2016, pages 365-382, 2016. URL: https://doi.org/10.1145/2940716.2940773.
  20. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008. URL: http://www.bitcoin.org/bitcoin.pdf.
  21. M.L. Puterman. Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley Series in Probability and Statistics. Wiley, 2014. Google Scholar
  22. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in bitcoin. In Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, pages 515-532, 2016. URL: https://doi.org/10.1007/978-3-662-54970-4_30.
  23. Toni Wahrstätter. Selfish mixing and randao manipulation, July 2023. URL: https://ethresear.ch/t/selfish-mixing-and-randao-manipulation/16081.
  24. Aviv Yaish, Gilad Stern, and Aviv Zohar. Uncle maker: (time)stamping out the competition in ethereum. In Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, and Engin Kirda, editors, Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pages 135-149. ACM, 2023. URL: https://doi.org/10.1145/3576915.3616674.
  25. Aviv Yaish, Saar Tochner, and Aviv Zohar. Blockchain stretching & squeezing: Manipulating time for your best interest. In David M. Pennock, Ilya Segal, and Sven Seuken, editors, EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11 - 15, 2022, pages 65-88. ACM, 2022. URL: https://doi.org/10.1145/3490486.3538250.
  26. Roi Bar Zur, Ittay Eyal, and Aviv Tamar. Efficient mdp analysis for selfish-mining in blockchains. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, AFT '20, pages 113-131, New York, NY, USA, 2020. Association for Computing Machinery. URL: https://doi.org/10.1145/3419614.3423264.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail