Paper 2019/1484

Force-Locking Attack on Sync Hotstuff

Atsuki Momose and Jason Paul Cruz

Abstract

Blockchain, which realizes state machine replication (SMR), is a fundamental building block of decentralized systems, such as cryptocurrencies and smart contracts. These systems require a consensus protocol in their global-scale, public, and trustless networks. In such an environment, consensus protocols require high resiliency, which is the ability to tolerate a fraction of faulty replicas, and thus synchronous protocols have been gaining significant research attention recently. Abraham et al. proposed a simple and practical synchronous SMR protocol called Sync Hotstuff (to be presented in IEEE S\&P 2020). Sync Hotstuff achieves $2\Delta$ latency, which is near optimal in a synchronous protocol, and its throughput without lock-step execution is comparable to that of partially synchronous protocols. Sync Hotstuff was presented under a standard synchronous model as well as under a weaker, but more realistic, model called mobile sluggish model. Sync Hotstuff also adopts an optimistic responsive mode, in which the latency is independent of $\Delta$. However, Sync Hotstuff has a critical security vulnerability with which an adversary can conduct double spending or denial-of-service attack. In this paper, we present an attack we call force-locking attack on Sync Hotstuff. This attack violates the safety, i.e., consistency of agreements, of the protocol under the standard synchronous model and the liveness, i.e., progress of agreements, of all versions of the protocol, including the mobile sluggish model and responsive mode. The force-locking attack is not only a specific attack on Sync Hotstuff but also on some general blockchain protocols. After describing the attack, we will present some refinements to prevent this attack. Our refinements remove the security vulnerability on Sync Hotstuff without any performance compromises. We will also provide formal proofs of the security for each model.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
blockchainconsensusSMRattack
Contact author(s)
momose @ sqlab jp
History
2020-01-24: revised
2019-12-30: received
See all versions
Short URL
https://ia.cr/2019/1484
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1484,
      author = {Atsuki Momose and Jason Paul Cruz},
      title = {Force-Locking Attack on Sync Hotstuff},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1484},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/1484}},
      url = {https://eprint.iacr.org/2019/1484}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.