# Formal Barriers to Longest-Chain Proof-of-Stake Protocols

## Author(s): Brown-Cohen, Jonah; Narayanan, Arvind; Psomas, Alexandros; Weinberg, Seth M

To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1f822
DC FieldValueLanguage
dc.contributor.authorBrown-Cohen, Jonah-
dc.contributor.authorNarayanan, Arvind-
dc.contributor.authorPsomas, Alexandros-
dc.contributor.authorWeinberg, Seth M-
dc.date.accessioned2021-10-08T19:44:33Z-
dc.date.available2021-10-08T19:44:33Z-
dc.date.issued2019-06en_US
dc.identifier.citationBrown-Cohen, Jonah, Arvind Narayanan, Alexandros Psomas, and Seth M. Weinberg. "Formal Barriers to Longest-Chain Proof-of-Stake Protocols." In EC '19: Proceedings of the 2019 ACM Conference on Economics and Computation (2019): pp. 459-473. doi:10.1145/3328526.3329567en_US
dc.identifier.urihttps://arxiv.org/abs/1809.06528-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1f822-
dc.description.abstractThe security of most existing cryptocurrencies is based on a concept called Proof-of-Work, in which users must solve a computationally hard cryptopuzzle to authorize transactions ("one unit of computation, one vote''). This leads to enormous expenditure on hardware and electricity in order to collect the rewards associated with transaction authorization. Proof-of-Stake is an alternative concept that instead selects users to authorize transactions proportional to their wealth ("one coin, one vote"). Some aspects of the two paradigms are the same. For instance, obtaining voting power in Proof-of-Stake has a monetary cost just as in Proof-of-Work: a coin cannot be freely duplicated any more easily than a unit of computation. However some aspects are fundamentally different. In particular, exactly because Proof-of-Stake is wasteless, there is no inherent resource cost to deviating (commonly referred to as the "Nothing-at-Stake'' problem). In contrast to prior work, we focus on incentive-driven deviations (any participant will deviate if doing so yields higher revenue) instead of adversarial corruption (an adversary may take over a significant fraction of the network, but the remaining players follow the protocol). The main results of this paper are several formal barriers to designing incentive-compatible proof-of-stake cryptocurrencies (that don't apply to proof-of-work).en_US
dc.format.extent459 - 473en_US
dc.language.isoen_USen_US
dc.relation.ispartofEC '19: Proceedings of the 2019 ACM Conference on Economics and Computationen_US
dc.rightsAuthor's manuscripten_US
dc.titleFormal Barriers to Longest-Chain Proof-of-Stake Protocolsen_US
dc.typeConference Articleen_US
dc.identifier.doidoi:10.1145/3328526.3329567-
dc.identifier.isbn13978-1-4503-6792-9-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceedingen_US

Files in This Item:
File Description SizeFormat