f851181dc7c69633.tex
1: \begin{abstract}
2: Nakamoto invented the longest chain protocol, and claimed its security by analyzing the private double-spend attack, a race between the adversary and the honest nodes to grow a longer chain. But is it the worst attack? We answer the question in the affirmative for three classes of longest chain protocols, designed for different consensus models: 1) Nakamoto's original Proof-of-Work protocol; 2) Ouroboros and SnowWhite Proof-of-Stake protocols; 3) Chia Proof-of-Space protocol. As a consequence, exact characterization of the maximum tolerable adversary power is obtained for each protocol as a function of the average block time normalized by the network delay. The security analysis of these protocols is performed in a unified manner by a novel method of reducing all attacks to a race between the adversary and the honest nodes.
3: 
4: 
5: 
6: %%We present a unified approach to blockchain security analysis, based on the concept of {\em adversary-proof convergence}. Using this approach, we provide security analysis for three longest chain protocols: 1) Nakamoto's Proof-of-Work protocol; 2) Ouroboros Proof-of-Stake protocol; 3) Chia Proof-of-Space protocol. An exact characterization of the largest fraction of tolerable adversary power as a function of the network delay $\Delta$ is obtained for each protocol. For the first two protocols, previous works yielded upper and lower bounds that match only in the limit as $\Delta \rightarrow 0$, converging to $0.5$. For the third protocol, only an upper bound was available with no non-trivial lower bound.
7: 
8: 
9: 
10: \end{abstract}
11: