Abstract:Current implementations of governance in Distributed Ledger Technologies leave them susceptible to a number of attacks. We survey the state of the art of Distributed Ledger Technologies (DLTs) governance protocols and work carried out to systematise good governance properties in the context of DLTs. We then select the most appropriate taxonomy of good governance properties and point to formal security notions that good governance protocols should satisfy. We point practitioners to existing solutions to deliver them, where possible. Furthermore, we outline a number of vulnerabilities that arise in the absence of good governance properties. We call on the research community and DLT research practitioners to prioritise delivering these good governance properties and continue to develop tools to do so, to avoid attacks to DLT protocols that exploit their poor governance models.
What problem does this paper attempt to address?
### What problems does this paper attempt to solve?
This paper aims to explore the vulnerabilities brought about by governance flaws in Distributed Ledger Technologies (DLTs). Specifically, the author focuses on the deficiencies in current DLT governance protocols, which make DLTs vulnerable to multiple attacks. The following are the main research questions and objectives of the paper:
1. **Identify the vulnerabilities of existing governance models**:
- The paper analyzes the current status of DLT governance protocols and points out the security threats faced by DLTs due to imperfect governance mechanisms.
- The author emphasizes the various attacks that DLTs may suffer in the absence of good governance properties.
2. **Systematize good governance properties**:
- The paper proposes a classification system for good governance properties and points out the formal security concepts that these properties should meet in DLT governance.
- The author selects the most appropriate classification method for governance properties and provides existing solutions for practitioners to implement these properties.
3. **Call on the community to attach importance to governance improvement**:
- The author calls on the research community and DLT practitioners to give priority to delivering these good governance properties and continue to develop related tools to avoid attacks caused by poor governance models.
4. **Specific governance components and their properties**:
- The paper describes in detail the various components of governance, such as voters, voting, voting aggregation algorithms, election officials, bulletin boards, stakeholders, voting mechanisms, and voting platforms.
- The author further explores the good governance properties that each component should possess, such as participation, incentive mechanisms, voting mechanisms, governance activity, and security.
5. **Missing governance properties**:
- The paper points out some key properties that are not met in current DLT governance protocols, such as mandatory election results, anti - censorship, incentive consistency, non - purchasable voting rights, free voting, verifiability, and ballot secrecy.
- The author discusses the potential vulnerabilities that these missing properties may lead to and explains the mutual exclusivity between certain properties, for example, the conflict between binding elections and free voting.
Through the study of these problems, the paper aims to improve the security and reliability of DLT governance and reduce the risks and attacks caused by poor governance.