Andrianna Polydouri, Dionysis Zindros, Aggelos Kiayias
National and Kapodistrian University of Athens
Department of Informatics and Telecommunications
Decrypto Seminar
July 2021
Players in the peer-to-peer network
Prover - Verifier model
Do we have to download the whole chain?
Simplified Payment Verification (SPV)
SPV protocol
Superlight clients
Ideal superblock distribution
Synchronization proof
Example for m = 3:
Suffix proof π: contains some superblocks...
How could the client do any verification on these unlinked blocks?
Consensus Protocol changes
magic!
"Superblocks protocol can be deployed as-is under velvet fork"
adversarial blocks may include false super-pointers
Is there a way to attack?
Just ignore them as unupgraded!
False super-pointers could mean...
... so, can the adversary only harm his proofs by not playing fair?
False super-pointers could also mean...
"Thorny" blocks
cut-and-paste portions of the honest chain
cut-and-paste portions of the honest chain
skip honest upgraded blocks of attacked level
honest miners ignore unupgraded and thorny blocks while updating the interlink
Suppression & Chainsewing
velvet honest majority assumption
simple chain quality does not suffice!
the adversary may attack only some superblocks...
andriannapolyd@gmail.com