Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
Game theory suggests ways for Ethereum Classic to deter double-spend assaults, say MIT researchers.
The recent 51% attacks on Ethereum Classic (ETC) have raised fresh questions about the security of proof-of-work blockchains. Not only has ETC been attacked three times within a month, but these assaults have been enabled with rented hashrate power. One of these attacks cost OKEx $5.6 million as it paid out its customers in full. The major cryptocurrency exchange then threatened to delist Ethereum Classic if it doesnât improve its security soon.Â
Some questions being asked last week were: Is this problem unique to Ethereum Classic, or are all PoW blockchains vulnerable? Would regulating hashrate rental firms help? If not, what exactly can be done?
Cointelegraph queried industry representatives for some answers. One interesting recommendation came from a research team at the Massachusetts Institute of Technology that has been exploring ways of applying game theory to crypto security. The team borrowed a leaf from the âwar of attritionâ game theory, which entails exhausting enemy resources via small losses. The idea seems to provide some disincentives to would-be hackers.
Ethereum Classic company declined to be interviewed for this story.
Mount a counterattack?
Daniel Aronoff from MITâs department of economics told Cointelegraph that a better way to deter 51% assaults may be to threaten attackers with retaliation. He co-authored a recent paper on defending against âdouble-spendâ attacks with Neha Narula, director of MIT Media Labâs Digital Currency Initiative, and Daniel Moroz, Ph.D. candidate in computer science at Harvard University â both of whom provided input in Aronoffâs correspondence with Cointelegraph. Aronoff further explained:
âOur work on blockchain incentives shows that theoretically a deep-pocketed exchange can deter double-spend attacks if potential attackers believe the intended victim will counter-attack and negate the attempted double-spend.â
Intuitively, the exchange and the attacker are fighting over the value of the current double-spend attack, he noted, âbut the exchange also risks encouraging more attacks in the future if it allows the attack to succeed. Therefore, the exchange has more to gain by defeating the attack than does the attacker have to gain by succeeding.â
Hashrate rental shops increase attack likelihood
The groupâs February 2020 paper appears to anticipate the sort of problems that have beset ETC in recent months. It notes that PoW mining was intended to provide blockchains with robustness against double-spend attacks (of which 51% attacks are a subset), but recent economic analysis strongly suggests that free entry conditions along with the ability to rent sufficient hashrate to conduct an attack arguably make the resulting block rewards irresistible to malefactors.
The MIT team devised a formal model of a retaliation game in which a victim such as ETC launches a counterattack. This is how they imagine the struggle: âA victim might rent from the same marketplace at the same cost to retrieve its property. In this way, the interaction between the attacker and the victim takes the shape of a War of Attrition.â
The model shows that the mere threat of this kind of counterattack eventually âinduces a subgame perfect equilibrium in which no attack occurs in the first place.â Meanwhile, in the real world, attacks on networks like ETC continue. âThe threat is real,â said Aronoff, adding:
âIt is perplexing that the targeted exchanges chose not to counter-attack, which would have cost tens of thousands of dollars, and instead immediately paid out millions of dollars to clients. This sends a perverse signal that it is easy to make a fortune by double-spending an exchange. Exchanges can deter future attacks fairly inexpensively by establishing the credibility that they will counter attempts to double-spend them.â
Crackdown on hash rental firms?
Some other questions were raised last week regarding PoW incursions. As noted, the July 30 to Aug. 1 attack on the Ethereum Classic network was enabled by hash rate purchased from NiceHash, a marketplace that connects sellers and buyers of hash rate for different algorithms. In the aftermath of the attack, ETC called for enforcement and regulation of hash-rate rental platforms.
Would regulating hash-rate rental firms curtail such attacks? Maybe not. Many of these rental firms may be outside the reach of regulators. In the case of NiceHash, its âco-founder is pending extradition to the United States for charges of fraud and racketeering after being convicted of similar offenses in Slovenia,â noted Ethereum Classic. Darren Tapp, assistant research professor at Arizona State University, and CEO of TAPPMATH database provider, told Cointelegraph:
âIt is not clear in which jurisdiction regulation would apply. In any case, I imagine that hashpower rental marketplaces will be more active in unregulated jurisdictions. A market actor intending to carry out a 51% attack will always bid higher for hash power then other actors. This may mean that hashpower will migrate away from regulations.â
Emin GĂŒn Sirer, CEO of Ava Labs and associate professor of computer science at Cornell University, told Cointelegraph that ETCâs case wasnât unique: âAny PoW coin that isnât the leader in its hash function is vulnerable to attacks such as these.â He went on to add:Â âTheir security relies on the amount of hashpower that an attacker can get their hands on, and as that number grows, the number of confirmations required for security goes towards infinity.â
Would checkpointed consensus help?
On Sept. 4, Charles Hoskinsonâs IOHK proposed to the ETC community that it use Cardano or Bitcoin networks to prevent 51% attacks. The idea would be to introduce checkpoints to validate the network. This would be performed by an Ouroboros-Byzantine fault tolerance checkpointing network and signed on the ETC by âtrusted members.â Was there merit in this proposal?
According to Sirer: âAny checkpointing proposal that relies on humans is antithetical to blockchains and is tantamount to complete technical failure.â These individuals could be coerced or compelled to make any state change at any time, he said.
âUsing a checkpointing proposal like this completely defeats the point of using a blockchain at all,â Aronoff added. âIt would be easier for the âtrusted membersâ to just maintain a database of ETC transactions themselves.â
Others were more positive with regard to the checkpointing proposal. âIOHKâs checkpointing proposal is valid but would really be a last resort solution for ETC as a decentralized PoW blockchain network,â Jay Hao, CEO of OKEx exchange, told Cointelegraph.
âProposing âtrusted membersâ adds an element of centralization to the network that is likely to be unacceptable to the majority of the ETC community â especially if it intends to continue as a PoW chain,â said Hao. It would invalidate Bitcoinâs longest chain principle. âFor a project like Ethereum Classic that has fought hard to maintain its belief in code is law, I canât see this proposal being adopted.â
A different hashing algorithm?
Others in the community suggested that changing ETCâs hashing algorithm might help. However, Sirer rejected this idea too: âChanging the hashing algorithm is a stopgap measure in the short term, and itâs unlikely to be popular because it invalidates the minersâ investment in their infrastructure.â
A better long-term solution in Sirerâs view would be to switch to a different consensus protocol â one that isnât vulnerable to 51% attacks, which would âallow ETC to be minted with existing miner infrastructure, while computing the checkpoints in a decentralized fashion, without trusted keys or community members.â
Related: Two Attacks on ETC Network Leave Community Needing a Solution, Fast
Asked about switching protocols, Tapp answered: âBoneh Lynn Shacham (BLS) signature schemes are a useful tool for multi party digital signatures,â which allow a user to verify that a signer is authentic. âParties that wish to form a joint BLS signature can produce a partial signature, and then any party that collects enough partial signatures can construct a joint signature.â Tapp also added:
âThen actors that prove they control an unspent output can register on-chain, with a public BLS key, as a node that will identify which block they received first. [...] The unspent output will prevent a Sibyl attack. Also the threshold for the signature can be set above 50%. With a protocol like this, an attacker would need to control a significant number of registered nodes, which is prohibitively expensive.â
Are all PoW blockchains vulnerable?
One lesson some were drawing from the recent events was that any PoW blockchain without enough devices engaged in mining might be susceptible to 51% attacks. âAll decentralized blockchains including BTC are susceptible to 51% attacks by their very nature,â OKExâs Hao told Cointelegraph, adding further:
âIf this was not the case, they would cease to be decentralized. Because of this, and our belief in the promise of decentralized projects, OKEx has been very tolerant and supportive of ETC and its recent problems.â
But the OKEx CEO also put forth a warning: âItâs imperative that ETC fix the vulnerabilities in the network that make the possibility of another attack in the short-term high, as they could place ETCâs future at risk and/or cause exchanges like OKEx to delist.â
Elsewhere, the MIT team hasnât seen much evidence that their retaliation strategy is being used widely in the marketplace at present, but that could soon change. As they note in their paper: âAs the markets for hashrate power continue to mature, we expect sophisticated actors to increase their readiness to defend themselves in the case of a double-spend attack.â
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.