Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24082
|View full text |Cite
|
Sign up to set email alerts
|

The Attack of the Clones Against Proof-of-Authority

Abstract: The vulnerability of traditional blockchains have been demonstrated at multiple occasions. Various companies are now moving towards Proof-of-Authority (PoA) blockchains with more conventional Byzantine fault tolerance, where a known set of n permissioned sealers among which no more than t are Byzantine seal blocks that include user transactions. Despite their wide adoption, these protocols were not proved correct.In this paper, we present the Cloning Attack against the two mostly deployed PoA implementations o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(24 citation statements)
references
References 15 publications
(30 reference statements)
0
24
0
Order By: Relevance
“…However, the designed authorisation in CRA 3 is attribute-based and anonymous. Note that all the implemented experiments used the equivalent cryptographic security level (128-bit) [ 28 ], and that the transaction fee (gas) was calculated based upon the bytecodes generated by Ethereum Virtual Machine (EVM) [ 29 ] with PoA (Proof of Authority) [ 30 ] as the consensus mechanism.…”
Section: Performance Evaluation and Resultsmentioning
confidence: 99%
“…However, the designed authorisation in CRA 3 is attribute-based and anonymous. Note that all the implemented experiments used the equivalent cryptographic security level (128-bit) [ 28 ], and that the transaction fee (gas) was calculated based upon the bytecodes generated by Ethereum Virtual Machine (EVM) [ 29 ] with PoA (Proof of Authority) [ 30 ] as the consensus mechanism.…”
Section: Performance Evaluation and Resultsmentioning
confidence: 99%
“…PoA and PoS consensus can integrate block reward/penalty mechanisms to promote fairness and establish system sustainability in the long-term. Reward/penalty mechanisms can also be used to enforce trusted operation by validators and further simplify the block sealing process [54]. Although PoA consensus is already available in ETH, the integration of PoS consensus is still undergoing [55].…”
Section: A Blockchain Consensusmentioning
confidence: 99%
“…These attacks have so far mainly been observed and studied on permissionless blockchains. In permissioned blockchains, manipulations of the routing protocol or network traffic interception can also lead to network partitions [22]. If none of the partitions are large enough to reach consensus, the network will stop processing incoming transactions (deterministic algorithms) or create competing forks (stochastic algorithms) [21].…”
Section: Network Protocolsmentioning
confidence: 99%
“…The PoA algorithm used by permissioned Ethereum networks is vulnerable to the Attack of the Clones [22]. In the attack, a single malicious node can double spend with high probability.…”
Section: Consensusmentioning
confidence: 99%