By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: SoK: A Stratified Approach to Blockchain Decentralization | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > SoK: A Stratified Approach to Blockchain Decentralization | HackerNoon
Computing

SoK: A Stratified Approach to Blockchain Decentralization | HackerNoon

News Room
Last updated: 2025/03/27 at 5:43 PM
News Room Published 27 March 2025
Share
SHARE

Table of Links

Abstract and 1. Introduction

2 Methodology

3 Hardware

4 Software

5 Network

6 Consensus

7 Cryptocurrency Economics

8 Client API

9 Governance

10 Geography

11 Case Studies

12 Discussion and References

A. Decentralization and Policymaking

B. Software Testing

C. Brief Evaluations per Layer

D. Measuring decentralization

E. Fault Tolerance and Decentralization

2 Methodology

Decentralization in the context of blockchains is often reduced to particular aspects of the system e.g., consensus participation. Nonetheless, distributed ledgers comprise multiple essential, interacting components. Drawing from all sources of prior research, our work discerns the layers that form a ledger in a “bottomup” manner.[5] Starting from the physical layer, i.e., Hardware, we systematize blockchain decentralization in multiple strata, all the way up to Governance. We also include Geography as a dimension that touches upon all other layers (Figure 1). We note that this layering is applied only on the ledger’s stack; exploring decentralization in exogenous infrastructure (e.g., physical links, Internet routing, operating systems etc.) is an interesting question, but outside the scope of this paper.

A first step to understand the importance of decentralization for such systems is to identify the properties of interest that distributed ledgers should satisfy and

Fig. 1. Illustration of our methodology: the layers of a blockchain system, identification of some type of resources in two of the layers (tokens, peers), their assignment to relevant parties exhibiting a higher (network) and lower (tokenomics) degree of decentralization and an example of equal joint ownership of one token.Fig. 1. Illustration of our methodology: the layers of a blockchain system, identification of some type of resources in two of the layers (tokens, peers), their assignment to relevant parties exhibiting a higher (network) and lower (tokenomics) degree of decentralization and an example of equal joint ownership of one token.

which can be affected by the ledger’s degree of decentralization. The two core security properties that each ledger should guarantee are safety and liveness. Safety ensures that all honest users hold the same, “settled” view of the ledger. Liveness reflects the ability to update the ledger’s settled view regularly, as new transactions are submitted. We note that safety and liveness typically incorporate and express other useful properties for real-world applications, such as transaction finality or censorship resistance. A third property, privacy, guarantees that users’ actions enjoy a certain degree of dissociation from their real-world identities and individually are unlinkable. Finally, specifically in the context of blockchain systems, price stability captures the property that the ledger’s core digital asset’s supply and market price are predictable (to a reasonable extent). In particular, price stability is violated if the asset’s market price demonstrates high volatility in the short term (e.g., monthly).[6] For ease of reading, we will refer to this property only as “stability” for the rest of the paper.

We view these properties through the lens of (cyber-)security, i.e., in the context of an adversary who wishes to subvert them. This is strictly stronger compared to settings where failures are assumed to be benign (e.g., crash faults due to power outages). A single point of failure exists when a single party, if controlled by the adversary, can violate one or more of the ledger’s properties.

We lay out the following methodology: for each system layer we identify (a) one or more resources, that can be thought of as the basic “unit” of the layer pertaining to the ledger’s security properties; (b) the relevant parties that control, either directly or indirectly, said resources; (c) the ledger’s properties that are at risk, if the resources’ distribution across the relevant parties becomes centralized. For example, considering Bitcoin’s consensus layer, the resource is hashing power and the relevant parties are the miners; the properties at risk are safety, liveness and, to a somewhat lesser degree, stability and privacy. Table 1 provides a summary of our systematization, with resources and relevant parties presented for each identified layer and sub-category.

Notably, a resource might be modular, with some parts considered more important than others. For instance, software products are typically not monolithic, with e.g., documentation being less crucial than a library or a configuration file. Therefore, the parties that maintain the former have (arguably) less influence over the resource (i.e., the software product) than the coders of the latter. To resolve this concern, one could compute an aggregate level of decentralization, after weighing each component based on its significance. Such aggregation methodology could also be applied to compute the decentralization level of the whole system, assuming weights for each layer (cf. Section 12).

Another issue is that one relevant party may encompass multiple real-world identities. For instance, consider two software products, one maintained by a single organization with many members, the other maintained by a handful of independent developers. Although the first may be more decentralized in terms of people, from a legal perspective the second may be deemed more decentralized, as the first is authored by a single legal entity.

By projecting the relevant parties of each category to legal persons, we articulate a test that can be useful in assessing systems w.r.t. their decentralization in a legal sense (Definition 1). Here, a legal person can be an organization, e.g., a company or non-profit foundation, or an individual

Definition 1. A blockchain system fails the Minimum Decentralization Test (MDT) if and only if there exists a layer (cf. Table 1) for which there is a single legal person that controls a sufficient number of relevant parties so that it is able to violate a property of interest.

In the following sections, we provide detailed explanations as to why each identified layer is important and how it fits into our framework (Sections 3-10). Then, we apply our methodology on case studies (Section 11), and finally, we suggest various directions for future research that our work points to (Section 12).


[5] Our stratification is inspired by the OSI conceptual network model, cf. [162].

[6] The cryptocurrency market is notoriously volatile, so one could apply different thresholds for “reasonable” levels of volatility. An interesting line of future research would be to identify non-cryptocurrency assets, which could serve as a base of comparison for which levels of volatility are acceptable in this case.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Today's NYT Connections Hints, Answers for March 28, #656
Next Article Amazon GameLift Streams Launches for High-Fidelity, Browser-Based Game Streaming
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Kill Switch: A Coder’s Act of Revenge | HackerNoon
Computing
Screen Recordings Made Easy, Thanks to This On-Sale AI Tool
News
20% of NIO’s battery swap stations approach breakeven point · TechNode
Computing
Get the record-low price on the Nebula Capsule 3 projector before Prime Day
News

You Might also Like

Computing

The Kill Switch: A Coder’s Act of Revenge | HackerNoon

7 Min Read
Computing

20% of NIO’s battery swap stations approach breakeven point · TechNode

2 Min Read
Computing

Authentication Sucks—So This Developer Built a Better Starting Point | HackerNoon

4 Min Read
Computing

Xiaomi smartphone to debut Qualcomm’s Snapdragon 7s Gen 3 next month · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?