skip to main content
10.1145/3576915.3616612acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Interchain Timestamping for Mesh Security

Published: 21 November 2023 Publication History

Abstract

Fourteen years after the invention of Bitcoin, there has been a proliferation of many permissionless blockchains. Each such chain provides a public ledger that can be written to and read from by anyone. In this multi-chain world, a natural question arises: what is the optimal security an existing blockchain, a consumer chain, can extract by only reading and writing to k other existing blockchains, the provider chains? We design a protocol, called interchain timestamping, and show that it extracts the maximum economic security from the provider chains, as quantified by the slashable safety resilience. We observe that interchain timestamps are already provided by light-client based bridges, so interchain timestamping can be readily implemented for Cosmos chains connected by the Inter-Blockchain Communication (IBC) protocol. We compare interchain timestamping with cross-staking, the original solution to mesh security, as well as with Trustboost, another recent security sharing protocol.

References

[1]
[n. d.]. Axelar. https://axelar.network/
[2]
[n. d.]. Composable finance. https://www.composable.finance/
[3]
[n. d.]. cosmos/cosmos-sdk: A Framework for Building High Value Public Blockchains. https://github.com/cosmos/cosmos-sdk
[4]
[n. d.]. cosmos/relayer: An IBC relayer for IBC-Go. https://github.com/cosmos/relayer
[5]
[n. d.]. Electron Labs. https://www.electronlabs.org/
[6]
[n. d.]. Example transaction for updating an IBC client. https://www.mintscan.io/cosmos/txs/271e872f0ca7b247d0685b51a390b891a8d42eb179db2dc3e8bdcc7836cea850
[7]
[n. d.]. Frequency of light client updates v.s. IBC packets. https://github.com/cosmos/relayer/blob/main/docs/advanced_usage.md#auto-update-light-client
[8]
[n. d.]. GraphQL | A query language for your API. https://graphql.org/
[9]
[n. d.]. Komodo. Advanced blockchain technology, focused on freedom. https: //docs.komodoplatform.com/whitepaper/introduction.html
[10]
[n. d.]. Map of zones - Cosmos network explorer. https://mapofzones.com/
[11]
[n. d.]. NetworkX: Network Anlaysis in Python. https://networkx.org/
[12]
[n. d.]. Polymer Labs. https://www.polymerlabs.org/
[13]
[n. d.]. Replicated vs. Mesh Security. https://informal.systems/2022/11/04/replicated-vs-mesh-security
[14]
[n. d.]. Source code for mesh security analysis. https://github.com/SebastianElvis/mapofzones-crawler
[15]
[n. d.]. Transport, Authentication, and Ordering Layer - Clients. https://tutorials.cosmos.network/academy/3-ibc/4-clients.html#updating-a-client
[16]
2019. ICS?: Recursive Tendermint. https://github.com/cosmos/ibc/issues/547
[17]
2021. Today's Cryptocurrency Prices by Market Cap. Website. https: //coinmarketcap.com/.
[18]
2023. IBC Token Transfer | Cosmos Developer Portal. https://tutorials.cosmos.network/academy/3-ibc/5-token-transfer.html
[19]
2023. Mesh Security. Youtube. https://www.youtube.com/watch?v=GjX4ejD_cRA&t=4670s.
[20]
2023. Mesh Security. Website. https://github.com/osmosis-labs/mesh-security https://github.com/osmosis-labs/mesh-security.
[21]
2023. Mintscan - Cosmos Blocks. https://www.mintscan.io/cosmos/blocks.
[22]
Mustafa Al-Bassam. 2019. LazyLedger: A Distributed Data Availability Ledger With Client-Side Smart Contracts. arXiv:1905.09274 (2019). https://arxiv.org/abs/1905.09274
[23]
Sarah Azouvi and Marko Vukolic. 2022. Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot. arXiv:2208.05408 (2022). https://arxiv.org/abs/2208.05408
[24]
Ethan Buchman. 2016. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains.
[25]
Ethan Buchman, Jae Kwon, and Zarko Milosevic. 2018. The latest gossip on BFT consensus. arXiv:1807.04938 (2018). https://arxiv.org/abs/1807.04938
[26]
Vitalik Buterin and Virgil Griffith. 2019. Casper the Friendly Finality Gadget. arXiv:1710.09437 (2019). https://arxiv.org/abs/1710.09437
[27]
Christian Cachin and Björn Tackmann. 2019. Asymmetric Distributed Trust. In OPODIS (LIPIcs, Vol. 153). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 7:1--7:16.
[28]
Miguel Castro and Barbara Liskov. 1999. Practical Byzantine Fault Tolerance. In OSDI. USENIX Association, 173--186.
[29]
Benjamin Y. Chan and Elaine Shi. 2020. Streamlet: Textbook Streamlined Blockchains. In AFT. ACM, 1--11.
[30]
Cynthia Dwork, Nancy A. Lynch, and Larry J. Stockmeyer. 1988. Consensus in the presence of partial synchrony. J. ACM 35, 2 (1988), 288--323.
[31]
Matthias Fitzi, Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2020. Ledger Combiners for Fast Settlement. In TCC (1) (Lecture Notes in Computer Science, Vol. 12550). Springer, 322--352.
[32]
Thomas Hepp, Patrick Wortner, Alexander Schönhals, and Bela Gipp. 2018. Securing Physical Assets on the Blockchain: Linking a novel Object Identification Concept with Distributed Ledgers. In CRYBLOCK@MobiSys. ACM, 60--65.
[33]
Leslie Lamport, Robert E. Shostak, and Marshall C. Pease. 1982. The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst. 4, 3 (1982), 382--401.
[34]
Andrew Lewis-Pye and Tim Roughgarden. 2021. How Does Blockchain Security Dictate Blockchain Implementation?. In CCS. ACM, 1006--1019.
[35]
Dahlia Malkhi and Michael K. Reiter. 1998. Byzantine Quorum Systems. Distributed Comput. 11, 4 (1998), 203--213.
[36]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https: //bitcoin.org/bitcoin.pdf.
[37]
Joachim Neu, Ertem Nusret Tas, and David Tse. 2021. Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma. In IEEE Symposium on Security and Privacy. IEEE, 446--465.
[38]
Joachim Neu, Ertem Nusret Tas, and David Tse. 2022. The Availability-Accountability Dilemma and Its Resolution via Accountability Gadgets. In Financial Cryptography (Lecture Notes in Computer Science, Vol. 13411). Springer, 541--559.
[39]
Rafael Pass and Elaine Shi. 2017. The Sleepy Model of Consensus. In ASIACRYPT (Lecture Notes in Computer Science, Vol. 10625). Springer, 380--409.
[40]
Maxwell Sanchez and Justin Fisher. 2018. Proof-of-Proof: A Decentralized, Trustless, Transparent, and Scalable Means of Inheriting Proof-of-Work Security. Web- site. https://veriblock.org/wp-content/uploads/2018/03/PoP-White-Paper.pdf
[41]
Suryanarayana Sankagiri, Xuechao Wang, Sreeram Kannan, and Pramod Viswanath. 2021. Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality. In Financial Cryptography (2) (Lecture Notes in Computer Science, Vol. 12675). Springer, 84--103.
[42]
Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, and Pramod Viswanath. 2021. BFT Protocol Forensics. In CCS. ACM, 1722--1743.
[43]
Ertem Nusret Tas, Runchao Han, David Tse, Fisher Yu, and Kamilla Nazirkhanova. 2023. Interchain Timestamping for Mesh Security. arXiv:2305.07830 (2023). https://arxiv.org/abs/2305.07830
[44]
Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, and Fisher Yu. 2023. Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. In SP. IEEE, 126--145.
[45]
Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, and Pramod Viswanath. 2022. TrustBoost: Boosting Trust among Interoperable Blockchains. IACR Cryptol. ePrint Arch. (2022), 1428.
[46]
Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan-Gueta, and Ittai Abraham. 2019. HotStuff: BFT Consensus with Linearity and Responsiveness. In PODC. ACM, 347--356.
[47]
Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, and William J. Knottenbelt. 2021. SoK: Communication Across Distributed Ledgers. In Financial Cryptography (2) (Lecture Notes in Computer Science, Vol. 12675). Springer, 3--36.

Cited By

View all

Index Terms

  1. Interchain Timestamping for Mesh Security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
    November 2023
    3722 pages
    ISBN:9798400700507
    DOI:10.1145/3576915
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 November 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. interchain timestamping
    2. mesh security

    Qualifiers

    • Research-article

    Conference

    CCS '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)264
    • Downloads (Last 6 weeks)12
    Reflects downloads up to 28 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media