By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: How Primary Committee Size Impacts Blockchain Security in Discrepancy Detection Protocols | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > How Primary Committee Size Impacts Blockchain Security in Discrepancy Detection Protocols | HackerNoon
Computing

How Primary Committee Size Impacts Blockchain Security in Discrepancy Detection Protocols | HackerNoon

News Room
Last updated: 2025/04/16 at 2:09 PM
News Room Published 16 April 2025
Share
SHARE

Table of Links

Abstract and 1. Introduction

  1. Key Concepts

    2.1 Append-Only Log and 2.2 Virtual Machine State

    2.3 Transactions As Curried Functions

    2.4 Natural Names of State

    2.5 Ground Truth

    2.6 Efficient Representations of State

    2.7 Checkpoints

    2.8 Execution Parameters: callData

    2.9 Execution Ordering

    2.10 Deciding on the Correct State

  2. Ideal Layer 2 Design

    3.1 VM Job Queue and Transaction Order Finality

    3.2 Data Availability and Garbage Collection

    3.3 State Finality

    3.4 Checkpoint Finality

  3. Conclusion and References

A. Discrepancy Detection Security Parameters

A Discrepancy Detection Security Parameters

The key security parameter for the discrepancy fastpath approach is the size of the primary committee used for the DD protocol. The size of the slow path DR backup committee depends on the DR protocol chosen, but it can be chosen generously, since the DR protocol should be used extremely infrequently. Any existing state verification protocol can be used, e.g., consensus based on majority voting, 2/3 supermajority, etc.

For the DD primary committee, the security assumptions are that faults are independent, e.g., due to installation-specific configuration errors, personnel security, bribery, etc; and that at most some fraction of the available participants are faulty. We will use a random selection to choose a subset of the available participants to serve in the primary committee. Because we are looking for any discrepancy in the reported output state, this is not a stake-weighted voting scheme.

Let T denote the total number of available participants, and B denote the number of faulty or Byzantine participants.[6] We need to pick C, the size of the primary committee.

Our goal is to make the probability that the entire primary committee are faulty is negligibly small. An acceptable level would be small enough such that the expected number of committee formations needed before an all-faulty committee is chosen is enormous, so that even with a high worst-case rate of committee selections, many lifetimes must pass before such an event would take place.

Since DR schemes cannot work unless there is at least an honest majority, we will use B ≈ T /2 as worst-case parameters, e.g., T = 100 and B = 49. With a committee size of C = 25, this is an expected W = 3.837 · 109 committee selections. Assuming a committee selection rate of 1, 000 per hour, this works out to about 437 years before an all-faulty committee is encountered. This ramps up quickly: at C = 26, it works out to be about 1, 368 years; at C = 30, it is about 177, 740 years. Obviously if we were to assume B ≈ T /3, the primary committee can be even smaller for the same level of security.

An interesting observation is that DD could work with a pool of participants that are less trustworthy than would be feasible with other protocols, i.e., where honest nodes are not a majority, as long as the DR participant pool is acceptable (e.g. a majority are honest for when DR uses honest majority). Estimating whether participants are corruptible is difficult, obviously, and it is not clear why we might have to work with a faulty-majority participant pool, though the possibility is intriguing. A possibility is to require periodic external security audits to participate in the DR pool, and have less stringent requirements to participate in the DD pool.

Authors:

(1) Bennet Yee, Oasis Labs;

(2) Dawn Song, Oasis Labs;

(3) Patrick McCorry, Infura;

(4) Chris Buckland, Infura.


[6] If we wish to use the BAR model, instead of B we would use B + R as the worst case to assume that all rational participants could be bribed etc, by the virtue of arbitrary token creation/transfers.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article PSA: iOS 18.4.1 patches two major security vulnerabilities – 9to5Mac
Next Article Will Meta Really Have to Sell Instagram and WhatsApp?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

NFL boss takes subtle jab at Cowboys as full Mahomes and Kelce effect revealed
News
Airtel Launches AI-Powered Fraud Detection Across WhatsApp, OTT, Emails and More
Mobile
When to Stream 'Captain America: Brave New World' on Disney Plus
News
Overcoming Future Challenges in Spatial Digital Twin Research | HackerNoon
Computing

You Might also Like

Computing

Overcoming Future Challenges in Spatial Digital Twin Research | HackerNoon

7 Min Read
Computing

AMD Zen 6 Feature Flag Merged For Linux 6.15

2 Min Read
Computing

Debian 12.11 Pulls In Dozens Of Fixes

1 Min Read
Computing

Best Tl;dv Alternatives for AI-Powered Note-Taking & Transcription

29 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?