PoL and PoT Security at the System Level

The Proof of Liquidity (PoL) and Proof of Transfer (PoT) mechanisms work together to secure Axis Chain by ensuring that validators are both financially committed and judged based on their performance. This section will use mathematical models to demonstrate how these mechanisms ensure security at the system level, using key concepts such as probability, incentive compatibility, and collusion resistance.

Key Variables and Definitions

The key variables used in the model are defined as follows:

Li=Liquidity staked by validator iL_i = \text{Liquidity staked by validator } i
Pi=Probability of validator i being selected to validate a blockP_i = \text{Probability of validator } i \text{ being selected to validate a block}
Ltotal=Total liquidity staked by all validators in the systemL_{total} = \text{Total liquidity staked by all validators in the system}
Vi=Performance score of validator i in PoT, based on correct block validationsV_i = \text{Performance score of validator } i \text{ in PoT, based on correct block validations}
Wi=Weight assigned to validator i, a function of both Li and ViW_i = \text{Weight assigned to validator } i, \text{ a function of both } L_i \text{ and } V_i
Rblock=Reward for validating a blockR_{block} = \text{Reward for validating a block}
Si=Liquidity slashed from validator i for malicious behaviorS_i = \text{Liquidity slashed from validator } i \text{ for malicious behavior}
α=Slashing rate (a fraction of the staked liquidity)\alpha = \text{Slashing rate (a fraction of the staked liquidity)}
λ=Fraction of total liquidity controlled by a group of colluding validators\lambda = \text{Fraction of total liquidity controlled by a group of colluding validators}
N=Total number of validators in the systemN = \text{Total number of validators in the system}

1. Validator Selection in PoL and PoT

Validators are selected to validate blocks based on a combination of their liquidity stake Li L_i (PoL) and performance score Vi V_i (PoT). The overall weight Wi W_i of validator ii , which determines their probability of being selected, is a function of both their liquidity LiL_i and their performance Vi V_i :

Wi=Li×ViW_i = L_i \times V_i

The probability that validator i i is selected to validate a block is proportional to their weight Wi W_i relative to the total weight of all validators:

Pi=Wij=1NWjP_i = \frac{W_i}{\sum_{j=1}^{N} W_j}

Substituting for Wi W_i :

Pi=Li×Vij=1NLj×VjP_i = \frac{L_i \times V_i}{\sum_{j=1}^{N} L_j \times V_j}

2. Incentives for Honest Behavior

Validators are financially incentivized to behave honestly because they earn rewards proportional to their probability of being selected. The expected reward Ri R_i for validator ii per block is given by:

Ri=Pi×RblockR_i = P_i \times R_{block}

Substituting the expression for PiP_i :

Ri=Li×Vij=1NLj×Vj×RblockR_i = \frac{L_i \times V_i}{\sum_{j=1}^{N} L_j \times V_j} \times R_{block}

Thus, the higher the validator’s liquidity Li L_i and performance score ViV_i , the greater their expected reward RiR_i . This incentivizes validators to stake more liquidity and maintain high performance in block validations.

3. Slashing for Malicious Behavior

To deter validators from acting maliciously (e.g., proposing invalid blocks or double-signing), Axis Chain implements slashing penalties. The amount of liquidity slashed from a validator i i is proportional to their staked liquidity:

Si=α×LiS_i = \alpha \times L_i

Where α\alpha is the slashing rate, a fraction of the total staked liquidity.

The expected utility UiU_i for a validator considering malicious behavior can be modeled as:

Ui=Pi×RblockSiU_i = P_i \times R_{block} - S_i

Substituting the expressions for PiP_i and Si S_i :

Ui=Li×Vij=1NLj×Vj×Rblockα×LiU_i = \frac{L_i \times V_i}{\sum_{j=1}^{N} L_j \times V_j} \times R_{block} - \alpha \times L_i

For a validator to act honestly, the expected reward from validating blocks must exceed the expected penalty from being slashed:

Li×Vij=1NLj×Vj×Rblockα×Li\frac{L_i \times V_i}{\sum_{j=1}^{N} L_j \times V_j} \times R_{block} \geq \alpha \times L_i

This inequality shows that a validator will behave honestly as long as the rewards from validation exceed the slashing penalty.

4. Collusion Resistance

To analyze the security against collusion, consider a subset of validators C1,2,,N C \subseteq {1, 2, \ldots, N} that colludes and controls a fraction λ \lambda of the total liquidity:

λ=iCLiLtotal\lambda = \frac{\sum_{i \in C} L_i}{L_{total}}

For the colluding group to successfully compromise the network, they would need to control more than 50% of the total validation power. This means they need:

λ>0.5\lambda > 0.5

However, even if a group controls a large amount of liquidity, the PoT score ViV_i of the colluding validators plays a critical role. Validators with lower performance scores are less likely to be selected, even if they control a large amount of liquidity. Thus, the effective power λeff \lambda_{eff} of the colluding group is reduced by their average performance:

λeff=λ×iCViC\lambda_{eff} = \lambda \times \frac{\sum_{i \in C} V_i}{|C|}

Where C |C| is the number of colluding validators, and Vi V_i is the performance score of each validator. As long as the average performance of the colluding validators is lower than that of honest validators, the effective power λeff\lambda_{eff} will remain below 50%, making it difficult for the colluding group to compromise the network.

5. Probability of Finality with Multiple Validators

Finality in Axis Chain is achieved when a block is validated by a supermajority of validators. Let kk be the minimum number of validators required to finalize a block, where k>N2 k > \frac{N}{2} .

The probability that a block is finalized by at least k k honest validators, given that each validator has a probability PP of behaving honestly, is:

Pfinality=1j=0k1(Nj)Pj(1P)NjP_{finality} = 1 - \sum_{j=0}^{k-1} \binom{N}{j} P^j (1 - P)^{N-j}

Where:

  • P P is the probability that a validator behaves honestly.

  • (Nj) \binom{N}{j} is the combination formula for selecting j j honest validators out of NN .

As the number of honest validators N N increases, the probability Pfinality P_{finality} approaches 1, ensuring that the system achieves fast and secure finality.

6. Security Threshold for Axis Chain

The total security of the PoL and PoT system is represented by the sum of all staked liquidity and performance scores across the network. Let σ\sigma represent the total security weight of the network:

σ=i=1NLi×Vi\sigma = \sum_{i=1}^{N} L_i \times V_i

The network remains secure as long as the effective security weight of honest validators exceeds that of any colluding group. The system’s security threshold is achieved when:

σhonestσcolluding\sigma_{honest} \geq \sigma_{colluding}

This ensures that the network can resist attacks as long as the majority of the validation power (as measured by liquidity and performance) remains in the hands of honest validators.

Last updated