{"id":1074,"date":"2025-08-06T17:57:28","date_gmt":"2025-08-06T17:57:28","guid":{"rendered":"https:\/\/mll.iiit.ac.in\/?p=1074"},"modified":"2025-08-06T17:57:28","modified_gmt":"2025-08-06T17:57:28","slug":"ashwachain-a-fast-scalable-and-strategy-proof-committee-based-blockchain-protocol","status":"publish","type":"post","link":"https:\/\/mll.iiit.ac.in\/index.php\/2025\/08\/06\/ashwachain-a-fast-scalable-and-strategy-proof-committee-based-blockchain-protocol\/","title":{"rendered":"ASHWAChain: A Fast, Scalable and Strategy-proof Committee-based Blockchain Protocol"},"content":{"rendered":"\n<p class=\"has-ast-global-color-6-background-color has-background\"><strong>Appeared at: <\/strong>Conference on Web and Internet Economics (WINE)<br><strong>Authors: <\/strong>Sanidhay Arora, Anurag Jain, Sankarshan Damle, Sujit Gujar<\/p>\n\n\n\n<p><strong>Abstract.<\/strong>&nbsp;Most cryptocurrencies are practically limited, mostly because of their significant time to finality and lack of scalability. Moreover, most of the existing literature for blockchain consensus protocols assumes the miners as honest. The assumption results in the protocols being susceptible to strategic attacks such as selfish mining, undercutting. Consequently, designing scalable, strategy-proof blockchain consensus protocol forms the basis of this work. Towards this, we present ASHWAChain, which deploys committees, generated through an underlying Proof-of-Work blockchain, to reach consensus using PBFT. Through a sophisticated analysis of system performance, we show that ASHWAChain\u2019s performance is significantly better than the current state-of-the-art. Additionally, we analyze miners\u2019 strategic behavior in ASHWAChain and prove that at equilibrium, the miners will honestly follow the protocol under certain assumptions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Introduction and Motivation<\/h3>\n\n\n\n<p>Most cryptocurrencies today are practically limited due to 3 major reasons, which are as follows:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Low Scalability:<\/strong>\u00a0Scalability refers to the financial system\u2019s ability to handle increased market demands. In the case of cryptocurrencies, this can be measured in terms of transaction throughput or transactions-per-second (TPS). Most popular cryptocurrencies like Bitcoin, Ethereum, etc., handle only up-to 7-15 TPS, which is low for a financial platform considering VISA, which can handle over 24,000 TPS.\u00a0<\/li>\n\n\n\n<li><strong>High Time to finality or Weak Consistency:<\/strong>\u00a0Time to finality refers to the time it takes for a transaction\/block to be considered \u201cfinal\u201d or irreversible with very high probability. In general, this time is considerably high for cryptocurrencies making their applicability practically low. For reference, this time is around 60 minutes in Bitcoin, which is considerably large for other centralized transaction platforms.<\/li>\n\n\n\n<li><strong>Honest Miner Assumption:\u00a0<\/strong>Some cryptocurrencies also assume that their participants or \u201cminers\u201d are honest. This assumption limits their practicality because, in reality, these miners are either Byzantine, rational, or honest. So game-theoretic analysis and security analysis considering these types of players is necessary for a more practically applicable system.<\/li>\n<\/ol>\n\n\n\n<p>Researchers have proposed several protocols to improve blockchain technology\u2019s practical performance for better applicability. These protocols provide3-5times improvement over Bitcoin in terms of TPS. Chen et al. use game-theory to establish the trade-off between full verification, scalability, and finality-duration. This follows an impossibility result which states that it is impossible to have a scalable, consistent, and fully decentralized blockchain.\u200b<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Proposal and Contributions<\/h3>\n\n\n\n<p>Keeping all this in mind, we propose ASHWAChain, a novel protocol blockchain consensus protocol that uses a balance between centralization and decentralization and selects a committee using similar ideas from Delegated Proof-of-Stake (DPoS) for running the protocol. ASHWAChain provides up-to 300 TPS and negligible time to finality. One key feature of this protocol is that it decouples the computational work used in mining from transaction confirmations, which also allows achieving high consistency. We then also provide security, scalability, and game-theoretic analysis for ASHWAChain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Protocol<\/h3>\n\n\n\n<p>We consider a peer-to-peer network consisting of participants or \u201cminers\u201d who control identities in the network. These identities are denoted by their public-private (pk, sk) key pair. Miners are connected by a broadcast network over which they can send messages to everyone.&nbsp;<\/p>\n\n\n\n<p>ASHWAChain comprises two layers:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>PoW Blockchain layer (PBL):<\/strong>\u00a0This layer is responsible for providing Sybil-resistant identities to the Agreement Layer. PBL maintains a blockchain running a Proof-of-Work consensus. \u200bEach block is of the form b<sub>i<\/sub>\u00a0= &lt;h, d, x, p>, where h is the hash of the previous block, d is the difficulty of the network, x is the nonce of the block, and p is the identity included in the block by the miner.\u200b This layer interacts with the Agreement Layer in with an operation, namely\u00a0<em>proposeBlock(b)<\/em>, and once this block is accepted in the Agreement layer, an event is triggered in this layer and all the miners acknowledge this as the latest block and mines on this chain.<\/li>\n\n\n\n<li><strong>Agreement Layer (AL):\u00a0<\/strong>This layer is responsible for maintaining consensus, i.e., fork-resolution and transaction confirmation. The purpose of AL is to maintain a shared state by running SGMP and PBFT agreement protocols. AL is maintained by a committee of n<sub>c<\/sub>\u00a0identities, referred to as validators.\u200b The shared state can only be modified by predefined operations.\u200b AL proceeds in epochs where each epoch consists of t<sub>epoch<\/sub>\u00a0rounds.\u200b This shared state stores account balances, Transaction Blockchain, PBL blockchain copy, a committee blockchain, the list of transaction validators, and operation log. The block-rewards and transaction fee is distributed equally among the validators who signed the blocks.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Analysis<\/h3>\n\n\n\n<p>We first define our adversary model and then provide security analysis. Following from that is scalability analysis, and finally, we game-theoretically analyze ASHWAChain.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Security Analysis<\/h4>\n\n\n\n<p>We consider an adversary A controlling \u03b1<sub>A<\/sub>&nbsp;fraction of computational resources. The remaining resources are controlled by a meta entity H.\u200b The goal of the adversary is to control more than n<sub>ag<\/sub>&nbsp;identities, the minimum number of identities required for agreement or tamper with the network. In PBFT n<sub>ag<\/sub>&nbsp;is one-third of the total committee size, n<sub>c<\/sub>.\u200b The analysis is considered in a steady state, i.e., a state in which all the system parameters are governed by their respective expected value. For our security analysis, we formally define the secure state of the system as follows.<\/p>\n\n\n\n<p><strong>Secure State.&nbsp;<\/strong>The system is said to be in a secure state if n<sub>A<\/sub>, i.e., the number of validators controlled by an adversary, is strictly less than n<sub>c<\/sub>\/3.<\/p>\n\n\n\n<p><strong>Proposition.&nbsp;<\/strong>The system will be in a secure state with a high probability depending on n<sub>threshold<\/sub>&nbsp;and \u03b2 if (i) \u03b1<sub>A<\/sub>, the fraction of computational resources in the network controlled by the adversary A is upper bounded by a fraction \u03b2 and (ii) n<sub>C&nbsp;<\/sub>&gt;= n<sub>threshold<\/sub>, where n<sub>threshold<\/sub>&nbsp;\u2208 Z<sup>+<\/sup>.<\/p>\n\n\n\n<p>Observe that the probability of a block being added to PBL is directly proportional to \u03b1<sub>miner<\/sub>, i.e., the computational power it holds in the system. Consequently, we can model the probability distribution of the identities that will be added to PBL as a binomial distribution. The following figure shows the different minimum values of n<sub>c<\/sub>, committee size, required with 1 in \u201cX\u201d chance of the system not being in a secure state for a given fraction of computational power controlled by an adversary. It is worth noting that in Bitcoin, if we consider 10% power in an adversary\u2019s hands, then the system is&nbsp;<strong>not<\/strong>&nbsp;in a safe state with a 1\/5000 probability.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Scalability Analysis<\/h4>\n\n\n\n<p>From our security analysis, if we consider \u03b1<sub>A<\/sub>= 0.18, the fraction of the computational power controlled by the adversary, then for n<sub>C<\/sub>= 90, the probability of the system being in a secure state will be greater than 1.44\u00d710<sup>\u22124<\/sup>, which is less than 1 in 5000. For this committee size, ASHWAChain can support at-least 300 TPS, which is a significant improvement over existing cryptocurrency protocols.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Game-theoretic Analysis<\/h4>\n\n\n\n<p>In ASHWAChain, we consider Bayesian Nash Equilibrium (BNE) for analysis and we consider the miners to be strategic and 3 types of players which are as follows:\u200b<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Honest (H)<\/strong>: Do not deviate from the defined protocol.\u200b<\/li>\n\n\n\n<li><strong>Rational (R)<\/strong>: Follow the strategy which yields them the highest utility. \u200b<\/li>\n\n\n\n<li><strong>Byzantine (B)<\/strong>: Actively try to compromise the system, irrespective of the utilities they obtain.\u200b<\/li>\n<\/ol>\n\n\n\n<p><strong>Assumptions.&nbsp;<\/strong>We assume that all rational players incur a cost \u03ba &gt;0, if any invalid transaction block is committed. This assumption is based on the premise that the entire ecosystem of the currency inflicts harm when an invalid block is accepted and, since rational players have invested resources and possess a stake in the system, they must incur some cost depending on it. We also assume that the objective of Byzantine players is to minimize the utility of the rational players and prevent the protocol from achieving its goal, regardless of the cost they incur.&nbsp;<\/p>\n\n\n\n<p>We consider the cost of validating a transaction, making our analysis more practical. Finally, we proved that under certain constraints for system parameters, there exists a BNE for rational players where they follow only the protocol strategy, i.e., validate all the blocks and sign only if it\u2019s valid.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Summary<\/h3>\n\n\n\n<p>In this work, we introduced a blockchain consensus protocol, namely ASHWAChain that provides strong consistency and high scalability, by using a committee-based system for consensus. Our security analysis shows that the system is in a secure state, with high probability. Lastly, we proved that under certain assumptions on the protocol parameters, there exists a Bayesian Nash Equilibrium in which the rational players validate the transactions before signing any block.<\/p>\n\n\n<div class=\"taxonomy-post_tag wp-block-post-terms\"><span class=\"wp-block-post-terms__prefix\">Keywords: <\/span><a href=\"https:\/\/mll.iiit.ac.in\/index.php\/tag\/blockchain\/\" rel=\"tag\">Blockchain<\/a><span class=\"wp-block-post-terms__separator\">, <\/span><a href=\"https:\/\/mll.iiit.ac.in\/index.php\/tag\/distributed-ledgers\/\" rel=\"tag\">Distributed Ledgers<\/a><span class=\"wp-block-post-terms__separator\">, <\/span><a href=\"https:\/\/mll.iiit.ac.in\/index.php\/tag\/game-theory\/\" rel=\"tag\">Game Theory<\/a><span class=\"wp-block-post-terms__separator\">, <\/span><a href=\"https:\/\/mll.iiit.ac.in\/index.php\/tag\/peer-to-peer-networks\/\" rel=\"tag\">Peer-to-Peer Networks<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Appeared at: Conference on Web and Internet Economics (WINE)Authors: Sanidhay Arora, Anurag Jain, Sankarshan Damle, Sujit Gujar Abstract.&nbsp;Most cryptocurrencies are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[21,27,28,29],"class_list":["post-1074","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-blockchain","tag-distributed-ledgers","tag-game-theory","tag-peer-to-peer-networks"],"_links":{"self":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts\/1074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/comments?post=1074"}],"version-history":[{"count":1,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts\/1074\/revisions"}],"predecessor-version":[{"id":1075,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/posts\/1074\/revisions\/1075"}],"wp:attachment":[{"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/media?parent=1074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/categories?post=1074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mll.iiit.ac.in\/index.php\/wp-json\/wp\/v2\/tags?post=1074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}