A Circuit Approach to Constructing Blockchains on Blockchains

Ertem Nusret Tas,David Tse,Yifei Wang
2024-08-20
Abstract:Since the creation of Bitcoin 15 years ago, there has been an explosion in the number of permissionless blockchains. Each of these blockchains provides an open ledger that anyone can read from and write to. In this multi-chain world, an important question emerges: how can we build a more secure overlay blockchain by reading from and writing to a given set of blockchains? Drawing an analogy with switching circuits, we approach the problem by defining two basic compositional operations between blockchains, serial and triangular compositions, and use these operations as building blocks to construct general overlay blockchains. Under the partially synchronous setting, we have the following results: 1) the serial composition, between two blockchains, yields an overlay blockchain that is safe if at least one of the two underlay blockchains is safe and that is live if both of them are live; 2) the triangular composition between three blockchains, akin to parallel composition of switching circuits, yields an overlay blockchain that is safe if all underlay blockchains are safe and that is live if over half of them are live; 3) repeated composition of these two basic operations can yield all possible tradeoffs of safety and liveness for an overlay blockchain built on arbitrary number of underlay chains. The results are also extended to the synchronous setting.
Cryptography and Security
What problem does this paper attempt to address?
The core problem that this paper attempts to solve is: how to construct a more secure overlay blockchain by reading from and writing to the existing blockchains (i.e., the underlying blockchains). Specifically, the authors draw on the concept of switching circuits, define two basic blockchain combination operations - serial combination and triangular combination, and use these operations as the basic building blocks for constructing a general - purpose overlay blockchain. The paper mainly focuses on various trade - offs between security and liveness that can be achieved through these two combination operations in a partially synchronous network setting. ### Main problems and motivations of the paper 1. **Security issues in the multi - chain world**: - In a multi - chain world, each blockchain has a public ledger that anyone can read from and write to. Therefore, a natural question is how to construct a more secure overlay blockchain by only reading from and writing to the ledgers of existing blockchains. - Traditional consensus protocols require the security (including security and liveness) of blockchains. In this paper, the authors explore how to enhance the security of the overlay blockchain by combining multiple underlying blockchains. 2. **Limitations of existing methods**: - The two main existing methods are interchain timestamping and Trustboost. The former has an asymmetric dependency between security and liveness, while the latter couples security and liveness together. - The authors point out that in order to better understand the security of the overlay blockchain, it is necessary to separate security and liveness and study their respective dependencies on the security and liveness of the underlying blockchains. ### Specific contributions of the paper 1. **Separation of security and liveness**: - The authors propose a new framework. Through the two basic operations of serial combination and triangular combination, the security and liveness of the overlay blockchain can be separated. This means that the security of the overlay blockchain can depend only on the security of the underlying blockchains, without being affected by their liveness. 2. **Optimal security guarantees**: - In a partially synchronous network setting, the authors prove that for any integer \( k\geq1 \), and integers \( s \) and \( l \) that satisfy \( \left\lfloor\frac{k}{2}\right\rfloor + 1\leq l\leq k \) and \( s\geq2(k - l)+ 1 \), an overlay blockchain can be constructed such that: - If at least \( s \) underlying blockchains are secure, then the overlay blockchain is secure. - If at least \( l \) underlying blockchains are active, then the overlay blockchain is active. - In particular, when more than \(\frac{2}{3}\) of the \( k \) underlying blockchains are secure and active, the overlay blockchain is both secure and active. 3. **Proof of unreachability**: - The authors also prove that in a partially synchronous network, if \( s < 2(k - l)+ 1 \), then no protocol can simultaneously satisfy the above security and liveness conditions. 4. **Extension in synchronous networks**: - The paper further discusses the security properties that can be achieved in synchronous networks and shows that compared with partially synchronous networks, the overlay blockchain in synchronous networks has better security guarantees. ### Conclusion This paper solves the problem of how to construct a more secure overlay blockchain by combining multiple underlying blockchains through introducing new combination operations and theoretical analysis. The authors not only provide specific construction methods, but also prove the optimality of these methods and provide a theoretical basis for future research.