Polynomial Voting Rules
Abstract.
We propose and study a new class of polynomial voting rules for a general decentralized decision/consensus system, and more specifically for the PoS (Proof of Stake) protocol. The main idea, inspired by the Penrose square-root law and the more recent quadratic voting rule, is to differentiate a voter’s voting power and the voter’s share (fraction of the total in the system). We show that while voter shares form a martingale process that converge to a Dirichlet distribution, their voting powers follow a super-martingale process that decays to zero over time. This prevents any voter from controlling the voting process, and thus enhances security. For both limiting results, we also provide explicit rates of convergence. When the initial total volume of votes (or stakes) is large, we show a phase transition in share stability (or the lack thereof), corresponding to the voter’s initial share relative to the total. We also study the scenario in which trading (of votes/stakes) among the voters is allowed, and quantify the level of risk sensitivity (or risk averse) in three categories, corresponding to the voter’s utility being a super-martingale, a sub-martingale, and a martingale. For each category, we identify the voter’s best strategy in terms of participation and trading.
Key words: Cryptocurrency, economic incentive, fluid limit, phase transition, polynomial voting rules, Proof of Stake protocol, stability, urn models.
AMS 2020 Mathematics Subject Classification: 60C05, 60F05, 60G42, 91B08.
1. Introduction
Voting, in the traditional sense, refers to a set of rules for a community of individuals or groups (“voters”) to reach an agreement, or to make a collective decision on some choices and ranking problems. In today’s world, “voting” has become a ubiquitous notion that includes any decentralized decision-making protocol or system, where the voters are often abstract entities (“virtual”), and the voting process automated; and the purpose of reaching consensus is often non-social and non-political, such as to enhance the overall security of an industrial operation or infrastructure (Garcia-Molina (1982); Lamport et al. (1982)). Examples include cloud computing (Armbrust et al. (2009); Dean and Ghemawat (2008)), smart power grids (Huang and Baliga (2009)), and more recently, trading or payment platforms and exchanges built upon the blockchain technology (Nakamoto (2008); Wood (2014)).
At the core of a blockchain is the consensus protocol, which specifies a set of voting rules for the participants (“miners” or validators) to agree on an ever-growing log of transactions (the “longest chain”) so as to form a distributed ledger. There are several existing blockchain protocols, among which the most popular are Proof of Work (PoW, Nakamoto (2008)) and Proof of Stake (PoS, King and Nadal (2012); Wood (2014)). In the PoW protocol, miners compete with each other by solving a hashing puzzle. The miner who solves the puzzle first receives a reward (a number of coins) and whose work validates a new block’s addition to the blockchain. Hence, while the competition is open to everyone, the chance of winning is proportional to a miner’s computing power.
In the PoS protocol, there is a bidding mechanism to select a miner to do the work of validating a new block. Participants who choose to join the bidding are required to commit some “stakes” (coins they own), and the winning probability is proportional to the number of stakes committed. Hence, a participant in a PoS blockchain is actually a “bidder,” as opposed to a “miner” — only the winning bidder becomes the miner validating the block. (Any participant who chooses not to join the bidding can be viewed as a bidder who commits zero stakes.) Needless to add, bidding exists long before the PoS protocol, and has been widely used in many applications, such as auctions and initial public offerings (IPOs).
Let’s explore the PoS bidding mechanism a bit more formally. Suppose a voter (or bidder) is in possession of votes (or stakes) at time , an index that counts the rounds of voting or bidding in the protocol; and is the total number of votes over all voters. Hence, voter ’s share, fraction of the total, is . Following a traditional voting rule, voter ’s chance or probability of winning, which we call voting power, will be equal to , voter ’s share. Yet, this doesn’t have to be the case. That is, any voter’s voting power needs not be equal to the voter’s share (of the system total). Indeed, there are often good reasons for the two to be different.
Historically, the English scholar Lionel Penrose famously proposed a square-root voting rule (Penrose (1946)), around the time when the United Nations was founded shortly after WWII. According to Penrose, a world assembly such as the UN should designate each country a number of votes that is proportional to the square root of its population. The obvious implication (which may or may not be what Penrose initially intended) is to limit the voting power of nations with very large populations. In the same spirit, the quadratic voting rule has attracted much attention in recent years (Lalley and Weyl (2018)). The idea is that each voter be given a budget (in dollars, for instance); the voter can cast multiple votes on any single or subset of choices or candidates on the ballot, with votes (for any choice) costing dollars. Under both voting rules, the voting power is different from the voter’s share or representation in the system, population in the first case, and the budget in the second case.
Inspired by these ideas, we propose a class of polynomial voting rules, denoted , which grant every voter a voting power that scales the voter’s share by a factor for . When , this reduces to the traditional voting case of powershare, which is a linear rule. When , the rule resembles the square-root or the quadratic voting rules mentioned above in spirit, in terms of decoupling voting power from a voter’s share, but of course differs in both the application context and implementation schemes. As we will demonstrate, the general rule is a time change of the rule, with the parameter measuring how much the traditional rule is “slowed down,” namely, the voting power is diminished over time.
There are (at least) two reasons to consider slowed-down voting schemes in blockchains.
-
•
First, the block-generation time requires to be lower bounded due to network delay (see (Shi, 2020, Section 14.3)). Specifically, there is the principle of security:
(1.1) Here “honest/dishonest power” refers to the voting power of honest/dishonest bidders. The parameter is a user-defined security factor; e.g., means, honest power is expected to be twice as much as dishonest power; hence, measures how secure a distributed system is. When honest bidders broadcast their validation results, dishonest bidders may exploit network delay to attack; equivalently, network delay will reduce the honest power. Thus the term “” plays the role of a discount factor, with proportional to network delay (the more severe network delay is, the smaller the discount is, and hence the larger is). Honest power is discounted also because honest bidders follow exactly the protocol while dishonest bidders do not comply with the rules. As we will illustrate (in the remarks following Theorem 6) slowing down the voting process enhances security. This is because decreasing voting power over time will increase the block generation time, which will mitigate network delay and make the principle of security (1.1) “easier” to hold.
-
•
Second, PoS blockchains suffer from malicious attacks known as Nothing at Stake (see e.g. Deirmentzoglou et al. (2019)). As pointed out in Bagaria et al. (2019), for the PoS longest-chain protocol, honest bidders focus exclusively on the longest chain while dishonest bidders can work simultaneously on all existing blocks. They showed that the PoS longest-chain is less secure than its PoW counterpart, assuming both honest and dishonest parties have constant voting power over time. However, as dishonest bidders have more flexibility, it is (much) more likely that they win and get rewarded, and their advantage is only amplified over time. This makes “constant voting power” highly undesirable. There are two general approaches to solving this problem: (i) adjust the amount of reward over time, (ii) slow down the voting process; both are aimed at preventing dishonest bidders from overpowering honest bidders as time evolves.
Here is an overview of our main findings and results. We prove that under the voting rule, voter shares form a martingale process that converges to a Dirichlet distribution as , while their voting powers follow a super-martingale process that decreases to zero over time (Theorem 6); and for both limits we also explicitly characterize their rates of convergence. Thus, the voting scheme enhances security, preventing any voter or any group of voters from controlling the voting process and overpowering the system.
We further group the voters into two categories: large and small, according to the initial (time zero) votes they own relative to the total (). When is large, which is the case in most applications, we show a phase transition in the stability of voter shares across the two categories (Proposition 7). Notably, the same phenomenon is demonstrated under the traditional voting rule (), refer to Roşu and Saleh (2021); Tang (2022). Our result establishes that this phase transition is in fact universal, in the sense that it applies to all values of .
We also study the scenario in which trading (of votes/stakes) among the voters (or “bidders”) is allowed, motivated by PoS applications in cryptocurrency. For , the trading scenario has been recently studied in Roşu and Saleh (2021). Not only our model is more general, in allowing any , our results are also richer and sharper (Theorem 9). For instance, we quantify the level of risk sensitivity (or risk-averse) that results in three cases according to the voter’s utility being a super-martingale, a sub-martingale or a martingale. Each case will lead to a best strategy for the voter, including “non-participation” (not to participate at all in the bidding) and “buy out” (buying as many stakes as what is available), which are not considered in Roşu and Saleh (2021). Note that “buy-out” is a monopoly, and it is desirable to limit the number of stakes that any voter can acquire in a single round. This is studied in our subsequent paper Tang and Yao (2023) on trading PoS stakes with volume constraint. See also Tang (2023) for various problems (including transaction costs and voter’s collective behavior) related to the PoS trading.
The key to our analysis relies on the study of the random process (the total volume of votes/stakes at time ), which is a time-homogeneous Markov chain. We develop some asymptotic results for this Markov chain, including large-deviation bounds (Theorem 3) and a fluid limit (Proposition 5).
In the remainder of this paper there are two main sections. Section 2 studies the voting model from a general perspective, focusing on the associated stochastic processes, such as , voter shares, and voting powers; their long-term behavior and limits, some of which are further characterized by concentration inequalities or large-deviation bounds. Section 3 concerns two aspects of the voting rule that are more closely associated with the application of PoS in cryptocurrency: (a) the evolution of bidder shares over time and the phase transition phenomenon mentioned above; (b) the issue of incentive and risk-sensitivity when trading is allowed. Concluding remarks and suggestions for further research are collected in Section 4.
2. The Voting Model
In this section, we develop a formal model for the voting rule, focusing on the stochastic processes associated with the model, their properties and limiting behavior.
First, here is a list of some of the common notation used throughout the paper.
-
•
denotes the set of positive integers, and denotes the set of real numbers.
-
•
denotes equal in distribution, and denotes convergence in distribution.
-
•
means is bounded from above as ; means is bounded from below and above as ; and or means decays towards zero as .
-
•
denotes the -Wasserstein distance between two probability distributions and . Refer to (Villani, 2009, Chapter 6).
We use etc to denote generic constants (which may change from line to line).
The voters, referred to as bidders below, are the participants in the decentralized system, where they engage in rounds of bidding following a pre-specified voting rule (the “consensus protocol”) so as to win more votes, or stakes. (The PoS protocol described in the Introduction provides a concrete instance to motivate the model here.) Let be the total number of bidders, which will stay fixed throughout the paper; and let denote the set of all bidders.
Time is discrete, indexed by , and corresponds to the rounds of bidding mentioned above. Bidder initially owns stakes. Let denote the total number of initial stakes owned by all bidders. The term bidder share refers to the fraction of stakes each bidder owns. So the initial bidder shares are given by
(2.1) |
Similarly, denotes the number of stakes owned by bidder at time , and the corresponding share is
(2.2) |
Here is the total number of stakes at time , and thus . (We shall often refer to as the “volume of stakes” or, simply, “volume.”) Clearly, for each , forms a probability distribution on .
In each period , a single stake (or “reward”) is distributed as follows: each bidder receives the reward with probability
(2.3) |
and receives nothing with probability . Clearly, is bidder ’s reward rate, as is the average number of rounds for bidder to win an additional unit of stake. To the extent the reward is coupled with the voting mechanism outlined above, can also be viewed as bidder ’s voting power at time . (Below, we use the terms “reward rate” and “voting power” interchangeably if there is no ambiguity.) When , the voting power coincides with the bidder share , which is the Pólya urn framework in Roşu and Saleh (2021), and in Tang (2022).
Let be the random event that bidder receives one unit of reward in period . Thus, the number of stakes owned by each bidder evolves as follows,
(2.4) |
or simply,
(2.5) |
Accordingly, the total number of stakes evolves as follows, taking into account ,
(2.6) |
The counting process specified in (2.6) evolves as a time-homogeneous Markov chain on , in contrast with the Pólya urn (with a constant reward) in which grows deterministically and linearly in . As we will see in the next subsection, the voting rule slows down the distribution of rewards, so the volume of stakes grows sublinearly. This is consistent with the volume growth in many cryptocurrencies such as Bitcoin and Ethereum.
Let be the vector of bidder stakes at time . An alternative (and useful) characterization of is given as follows.
Proposition 1.
Let be a counting process with arrivals occurring at , such that the inter-arrival times are independent, with , for every , following a geometric distribution with success probability parameter . Define the process by
where is a copy of the Pólya urn process with colors and initial balls. Then, we have , where is the process of bidder stakes defined above.
Proof.
It is clear from the dynamics in (2.6) that the two counting processes and have the same distribution. Given , the probability that the next (unit of) stake goes to bidder is by the craps principle. The connection to the Pólya urn process with colors (voters) and initial balls (stakes) is obvious. ∎
The above proposition implies that the Pólya urn is embedded in the process of stakes through a random time change . This fact will be used below to study the long-time behavior of bidder shares and reward rates in §2.2. But we first study in the next subsection how the issuance of rewards is slowed down under the voting rule.
2.1. The volume
Let be the filtration generated by the random events .
Proposition 2 (Long-time behavior of ).
Under the voting rule, the following results hold:
-
(i)
The process is an -sub-martingale, and its compensator is
-
(ii)
There is the convergence in probability:
(2.7)
Proof.
(i) It suffices to note that , for all .
(ii) Apply the method of moments by computing for all . For , we have by definition
It is clear that with probability one as . As a result, as which yields
(2.8) |
Next for , we have
Thus, by (2.8). Then we get as . We proceed by induction. Assuming that as , we get
which implies that as . Thus, we have
By the method of moments (see e.g. (Billingsley, 1995, Section 30)), converges in distribution, and thus in probability to . ∎
The proposition gives the growth rate of the volume of stakes: grows as as . Part (i) suggests that , which is consistent with the limit in (2.7). When , follows the (deterministic) linear growth of the Pólya urn model (with a constant reward). For , grows as .
Even more important is the question, how does “fluctuate” around its growth trajectory ; specifically, how to establish large-deviation bounds on ? This is addressed in the next theorem, along with a corollary that confirms ’s concentration around its growth trajectory, for large .
Theorem 3 (Large deviations for ).
Define a function ,
Let be the two roots of on . Under the voting rule, the following results hold:
-
(i)
For each , and for any ,
(2.9) -
(ii)
For each , and for any ,
(2.10)
Proof.
Without loss of generality, assume that . Note that has increments , so there are paths ending at (one has to choose upward steps “” out of steps). Moreover, the probability of each path ending at is upper bounded by
since the upward “” steps contribute , and the remaining flat “” steps have at most probability . Thus,
where
(2.11) |
Standard analysis shows that there are such that is nondecreasing on and . As we will see, and as . The idea is to study the term with for as . By Stirling’s formula,
and
Combining the above estimates yields
(2.12) |
Note that , which is increasing from to on . The unique stationary point of on is achieved at such that , so it is clear that . We have
Thus, the function has two roots on , and on . As a result, for each we have
and each we have
∎
The theorem above gives exponential deviation bounds for when it is either sufficiently small (below ), or sufficiently large (above ). Note that there is a gap between the two bounding curves, since for each , . (For instance, for , .) The gap is due to the combinatorial estimates in our proof, which may very well be improved. Refer to the Appendix 5.1 for a numerical procedure that shrinks the gap.
As a corollary, the volume of stakes concentrates around for large .
Corollary 4.
Under the voting rule, we have, for each ,
(2.13) |
Proof.
Recall that the process is a time-homogenous Markov chain. The path properties of a general time-homogenous Markov chain has long been studied since the work of Lamperti (1960, 1962, 1963). The basic idea is to study the recurrence, or transience of based on
For instance, if then is recurrent; and if then is transient. The regime corresponding to is called the Markov chain with asymptotic zero drift, and features active research (see e.g. Denisov et al. (2016); Menshikov et al. (2017)). Specializing to the process , we have
Interestingly, there seem to be few results on the Lamperti’s problem where both and decreases to zero as , except that is transient. Observe that is nondecreasing, and
where the “upward” contribution is larger than the “downward” counterpart as . In the similar spirit to Lamperti (1962), the asymptotic growth (2.7) hinges on a degenerate fluid approximation of the process , as stated in the following proposition.
Proposition 5 (Fluid limit of ).
Under the voting rule, we have
(2.14) |
where for non-integer is defined by the linear interpolation of the chain , and , is the solution to the ordinary differential equation with .
Proof.
Fix . It suffices to prove the weak convergence on . By Proposition 2 (ii), there is the convergence in probability as . Given , there is such that for any ,
Let . We have for each . Note that for each , the process is nondecreasing. Thus,
So the sequence of processes is tight. Moreover, for each , converges in probability to as . Then for , the vector converges in probability to , i.e. the convergence in finite-dimensional distributions. The weak convergence follows readily from the tightness and the convergence in finite-dimensional distributions (see e.g. (Billingsley, 1999, Chapter 2)). ∎
Note that the fluid limit in the proposition is different from the fluid limit in the literature of stochastic networks, where it usually takes the form of a FSLLN (functional strong law of large numbers) concerning a renewal process and the associated counting process. In that setting, the convergence (to a deterministic function of time) is stronger – the almost sure convergence, and uniformly on . Refer to (Chen and Yao, 2001, §6.1). Here, the process is non-renewal, thus the FSLLN limit does not apply; yet there is still the weak convergence, and the limit is still a deterministic function of time , explicitly characterized above. Another notable point is, in the FSLLN setting, both time and space are scaled by the same scaling factor whereas in (2.14) the time scaling remains the same, and the space scaling is by . But this is only because grows in the order of (Proposition 2 (ii)), whereas a renewal (counting) process grows linearly in .
2.2. Bidder shares and voting powers
Here we study the evolution and the long-time behavior of and . Recall that the Dirichlet distribution with parameters , which we denote by , has support on the standard simplex and has density
where is the Gamma function. For , the Dirichlet distribution reduces to the beta distribution, denoted as . It is easily seen that if then for each , .
Theorem 6 (Long-time behavior).
Under the voting rule, we have the following limiting distributions.
-
(i)
Bidder shares: the process is an -martingale, and with probability one,
(2.15) where . Moreover, for each ,
(2.16) -
(ii)
Voting powers: the process is an -super-martingale, and for , with probability one, as for each . Moreover, for each ,
(2.17)
Proof.
(i) By (2.2) and (2.5), it is easily seen that for each and ,
(2.18) |
Recognizing the first term on the right side of (2.18), , while all other terms sum up to zero, we conclude that is an -martingale. The convergence in (2.15) follows from the martingale convergence theorem (see e.g. (Durrett, 2019, Section 4.2)). By Proposition 1, is a time-changed Pólya urn. So the limiting shares have the same distribution as that of the Pólya urn, which is .
Let be the Pólya urn with , and be the corresponding shares. Set . By Goldstein and Reinert (2013), we have for each ,
(2.19) |
Taking , we get
where the last inequality follows from Theorem 3 and (2.19). This yields the bound (2.16).
(ii) Applying the same derivation as in (2.18) but to instead, we have
The last two terms add up to . Thus, we have
i.e. is an -super-martingale for each . Recall that so which converges to with probability one. By (i), converges almost surely, and hence in distribution to . By Proposition 2, converges in probability to . We then apply Slutsky’s theorem to get the convergence in (2.17). ∎
Several remarks are in order. Part (i) of Theorem 6 shows that the bidder shares form a martingale, and converges to a Dirichlet distribution (independent of ). This should be expected from the fact that the underlying bidder stakes is a time-changed Pólya urn; refer to Proposition 1. What’s more revealing is the Wasserstein bound in (2.16) between a bidder’s share and its limit. In fact, a matching lower bound can also be established (which we leave to the interested reader). Thus, the convergence rate of the bidder shares is exactly of order . (Also refer to Proposition 7 below for further discussions on the stability of the bidder shares when the initial stakes is large.)
Part (ii) of the theorem implies that each bidder’s voting power decays to zero at rate . Or, equivalently, the reward rate is slowed down: it takes a time of order for any bidder to be rewarded a new (unit of) stake. This enhances security, so that no bidder can manipulate or control the bidding/voting process; while the level of decentralization remains unchanged. This also means the principle of security in (1.1) becomes “easier” to hold at large time , since (due to the network delay) as . On the other hand, if the reward is associated with transaction validation (which does not need to be), then the time required to validate a new block becomes uncontrolled in the long run. A possible remedy is to dynamically tune the parameter over time, as detailed in the Appendix 5.2.
3. Other Results, with PoS-Crypto Applications
In this section, we present more results associated with the model that are largely motivated by the application of PoS in cryptocurrency. There are two subsections: In the first one, §3.1, we study the the evolution of bidder shares when , the volume of initial stakes, is large. In §3.2, we study the additional feature of allowing the bidders to trade stakes among themselves, focusing on the issue of trading incentive (or the lack thereof). We remark that the results in both subsections exhibit some type of phase transitions, and are independent of the parametric value of , and in this sense, universal.
3.1. Evolution of bidder shares and phase transitions
As explained in the introduction, one key feature of the model is that the reward rate, or the voting power (if the reward goes with validation work) of any bidder is different from ’s share of the total volume of stakes at . We have seen from Theorem 6 (iii) that the reward rate or voting power is decreasing over time, which facilitates security. On the other hand, the evolution of the share over time, from its initial value , in both absolute and relative terms, is an important issue for any individual bidder .
In the classical Pólya urn setting, it is shown in Roşu and Saleh (2021) that for a large bidder with initial stake , there is the stability in bidder share, in the sense that
Furthermore, similar, albeit qualitatively different, results are revealed in Tang (2022), for small bidders (following the definition in part (ii) of the corollary below). Here we focus on the ratio . Since , the results in Tang (2022) hold. The following proposition is a refined version of (Tang, 2022, Theorem 2.1).
Proposition 7 (Phase transitions of ).
Let be the total number of initial stakes. Under the voting rule, we have
-
(i)
For such that as (i.e. ), and for each sufficiently small and each or ,
(3.1) which converges to as .
-
(ii)
For (i.e. ), there is the convergence in distribution
(3.2) where is a Gamma random variable with density . Moreover, there is (independent of and ) such that
(3.3)
Proof.
(i) Conditioning on and using the law of total variance, we get
It suffices to apply Chebyshev’s inequality to get the bound (3.1).
(ii) Note that
A careful application of Goldstein and Reinert (2013) yields a refinement of (2.19): there is such that . Adapting the argument in Theorem 6 yields
(3.4) |
Next we claim that
(3.5) |
which can be proved by elementary calculus. Here we provide a sketch of proof. Set for simplicity. Let , and let be the sum of independent random variables, independent of . By beta-gamma algebra, has the same distribution as . Thus,
(3.6) |
By normal approximation, we have where is standard normal (see Rio (2009)). Injecting into (3.6) yields the desired bound. Finally, combining the estimates (3.4) and (3.5) gives the bound (3.3). ∎
The proposition reveals a phase transition in the stability of shares, and identifies large and small bidders, in terms of the size of their stakes, according to the categories in the two parts. A large bidder is guaranteed to have stability, in the precise sense characterized in (3.1), that the share ratio concentrates at , and converges to in probability when , for any (including ). For small bidders, this is reversed: the concentration inequality in (3.1) becomes the anti-concentration inequality:
(3.7) |
implying volatility. The Wasserstein bound (3.3) is new, and it indicates that the ratio approaches the limiting Gamma distribution with an error for . However, we do not know whether the “ dependence” in (3.3) is tight so the ratio may mix at a faster rate.
3.2. Participation and trading
So far, we have not considered the possibility of allowing the bidders to trade stakes (among themselves). In the classical Pólya urn model (), it is shown in Roşu and Saleh (2021) that under certain conditions (which enforce some notion of “risk neutrality”), there will be no incentive for any bidder to trade. Here, we extend that to the model, allowing to take any non-negative values. Furthermore, we allow a bidder-dependent risk-sensitivity (or risk-averse) parameter , and study the issue of incentive as it relates to .
In the new setting of allowing trading, we need to modify the problem formulation presented at the beginning of §2. First, for each , let be the number of stakes that bidder will trade at time . Then, instead of (2.4), the number of stakes evolves as
(3.8) |
i.e. denotes the number of stakes bidder owns in between time and , excluding those traded in period .
Note that will be up to bidder to decide, as opposed to the random event which is exogenous; in particular, can be negative (as well as positive or zero). We will elaborate more on this below, but note that will be constrained such that after the updating in (3.8) will remain nonnegative.
Let be the price process of each (unit of) stake, which is a stochastic process assumed to be independent of the randomness induced by the voting rule (specifically, the process ). Hence, we augment the filtration with that of the exogenous price process to a new filtration denoted . Note that the price process is also assumed as exogenous in Roşu and Saleh (2021). This assumption need not be so far off, as the crypto’s price tends to be affected by market shocks (such as macroeconomics, geopolitics, breaking news, etc) much more than by trading activities. So, here we isolate the price of each stake from any bidder’s trading impact.
Let denote (units of) the risk-free asset that bidder holds at time , and the risk-free (interest) rate. (Here, the risk-free asset is naturally the one that underlies the above price process.) As we are mainly concerned with the effect of exchanging stakes to each individual, we allow bidders to trade stakes only internally among themselves, but not risk-free assets between them. Hence, each bidder has to trade risk-free asset with a third-party instead of trading that with another bidder.
The decision for each bidder at is hence a tuple, . Moreover, there is a terminal time, denoted (i.e., is integer valued), by which time bidder has to sell all assets, including both any risk-free asset and any stakes owned at that time, and leave the system. can either be deterministic or random. In the latter case, assume it has a finite expectation, and is either adapted to , or independent of all other randomness (in which case augment accordingly). We also allow bidder to leave the system and liquidate prior to at a stopping time relative to . Thus, bidder will also decide at which time to stop and exit. To simplify the notation, we abuse for , the minimum of and .
Let denote the (free) cash flow (or, “consumption”) of bidder at time , i.e.,
(C1) |
with
(C2) |
and
(C3) |
Observe that the equation in (C1) simply defines what’s available for “consumption” in period . It is simply an accounting or budget constraint on the cash flow. The requirements in (C2) are all in the spirit of disallowing shorting, on both components of the decision, the free asset and the traded stakes . In particular the latter is constrained such that (following ) i.e., bidder cannot sell more than what’s in possession at ; it also ensures that no bidder can own a number of stakes beyond the current total volume (). (C3) specifies how the assets are liquidated at the exit time : both and will be set at zero, and all remaining stakes liquidated (cashed out at per unit).
Denote bidder ’s decision (process) or “strategy” as and . The objective of bidder is
(3.9) |
where is a discount factor, a given parameter measuring the risk sensitivity of bidder . Clearly, bidder ’s objective is to maximize a utility that is just the present value of ’s total cash flow cumulated up to .
We need to introduce two more processes that are related and central to understanding the dynamics of the system in the presence of trading. The first one is , where denotes the market value of the volume of stakes at time . The second one is , for each bidder , defined as follows:
(3.10) |
where follows (3.8). Note the two terms that define are the discounted present values, respectively, of ’s pre-trading stakes () and of the return from ’s trading (cumulated up to ).
The connection between and is presented in the following lemma, which reveals that their incremental gains (per time period) are proportional: each increment of is a fraction of the corresponding increment of . In other words, not only represents bidder ’s share of the total volume of stakes, it also represents ’s share of the system’s market value, with or without trading.
Lemma 8.
Under the voting rule, along with the trading specified above, we have
(3.11) |
Proof.
The process also connects to the utility in (3.9). To see this, summing up both sides of (C1) and (C3) over (along with in (C2)), we have
(3.14) |
Observe that the first two terms on the RHS are equal to , so we can rewrite the above as follows (after taking expectations on both sides), emphasizing the exit time and the strategy ,
(3.15) |
hence, the RHS above is separable: the first term depends on only while the second term, the summation, on only. Furthermore, the second term is provided (which is the condition (a) assumed in Theorem 9 below), along with being non-negative, part of the feasibility in (C2). In this case, we will have , which implies , with equality holding when for all .
We are now ready to present the main result regarding the utility maximization problem in (3.9). A quick word on the parameter that will appear prominently in Theorem 9 below. Simply put, it is the rate (expected rate of return) associated with each stake (e.g., a unit of some cryptocurrency), i.e., it is the counterpart of , the rate for the risk-free asset. We will elaborate more on the two rates after proving the theorem. In the theorem, two strategies are singled out: the “buy-out” strategy, in which bidder buys up all stakes available at time , and then participates in the bidding process until the end; and the “non-participation” strategy, in which bidder turns all stakes into cash, and then never participates in either bidding or trading for all . Note that the non-participation strategy is executed at ; as such, it complements the feasible class, which is for and presumes participation. The buy-out strategy clearly belongs to the feasible class.
Theorem 9 (Buy-out strategy versus non-participation).
Assume the following two conditions:
(3.16) |
Then, under the voting rule, the following results will hold.
First, with condition (a), the maximal utility is achieved by setting for all ; i.e., .
In addition, all three parts of the following will hold.
-
(i)
If , then any feasible strategy will provide no greater utility for bidder than the non-participation strategy, i.e., .
-
(ii)
If , then any feasible strategy will provide no greater utility for bidder than the buy-out strategy. In this case, bidder will buy all available stakes at time , and participate in the bidding process until the terminal time .
-
(iii)
If , then, bidder is indifferent between the non-participation and the buy-out strategy with any exit time, both of which will provide no less utility than any feasible strategy. In other words, all strategies achieve the same utility (which is ).
Proof.
That (with being set to for all ), under condition (a) in (3.16), has already been established in the discussions following (3.15). So, it suffices to prove the three parts (i)-(iii).
(i) Applying the given condition (b) in (3.16), along with the assumed inequality , to the RHS of the equation in (3.11) will make it ; i.e.,, is a -super-martingale, implying . Since is independent of , we have
(3.17) |
(ii) With the assumed inequality , now becomes a -sub-martingale; and hence, the inequality below,
(3.18) |
To identify the optimal trading strategy , we use backward induction (dynamic programming). To optimize , observe
which is linear in . By assumed condition (b) in (3.16), we have
Thus, , following the (binding) constraint in (C2). That is, bidder ’s optimal strategy at the penultimate time is to buy all available stakes at that time. Going backward, we have for . Thus, the optimal trading strategy is , .
(iii) Under the assumed equality , is a -martingale; hence, the inequality in (3.17) now holds as equality, i.e., . Thus. all strategies lead to the optimal utility, including any feasible strategy (in particular, the no-trading strategy) and the non-participation strategy.
The “moreover” part of the theorem is immediate. ∎
In what remains of this section, we make a few remarks on Theorem 9, in particular, to motivate and explain its required conditions. First, the rate is determined by condition (b), the second equation in (3.16). As such, it should be distinct from , the latter being associated with a risk-free asset. For all practical purpose, we can assume , even though this is not assumed in the theorem. When this relation does hold, then condition (a) will become superfluous in cases (i) and (iii).
Second, the discount factor in the utility objective in (3.9), a parameter that measures bidder ’s sensitivity towards risk, plays a key role in characterizing phase transitions in terms of . In case (i), the inequality implies bidder is seriously risk-averse; and this is reflected in ’s non-participation strategy. In case (ii), the inequality holds in the opposite direction, implying bidder is lightly risk-averse or even a risk taker. Accordingly, ’s strategy is to aggressively sweep up all the available stakes to reach monopoly, and participate (but not trade) until the terminal time. Also note in this case, the non-participation strategy will provide less (no greater) utility for bidder than the “no-trading” strategy, and certainly no greater utility than the buy-out strategy. In case (iii), the inequality becomes an equality , and becomes a martingale. Consequently, bidder is indifferent between non-participation and participation, and in the latter case, indifferent to all (feasible) strategies, including the buy-out (and the no-trading) strategy. Indeed, the equality is both necessary and sufficient for the no-trading strategy. This equality also has the effect to force all participating bidders to have the same risk sensitivity.
In contrast, in Roşu and Saleh (2021), there is a single rate , or equivalently. is assumed, which seems difficult to justify, since in most applications (cryptocurrency in particular) will be significantly larger than . Moreover, there is also a single risk sensitivity for all bidders, which is set at . Thus, Roşu and Saleh (2021) is limited to the martingale case only, reaching the same conclusion as our case (iii), that all feasible strategies, buy-out included, yields the same (expected) utility. As there is no stopping decision and super- or sub-martingale cases in Roşu and Saleh (2021), non-participation does not come up at all, neither do notions like risk-averse or risk-seeking.
The last point we want to emphasize is that the two conditions in (3.16) play very different roles. As evident from the proof of Theorem 9, condition (b) makes a super- or sub-martingale or a martingale, according to bidder ’s risk sensitivity as specified by the inequalities and equality applied to (along with ) in the three cases. Yet, to solve the maximization problem in (3.9), needs to be connected to the utility; and this is the role played by condition (a), under which it is necessary (for optimality) to set for all , and applicable to all three cases in Theorem 9. In this sense, condition (a) alone solves half of the maximization problem, the half of the strategy. In fact, it’s more than half, as the optimal strategy is only needed in the sub-martingale case; and even there, condition (a) pins down the fact that to participate (even without trading) is better than non-participation.
Note that Theorem 9 can be readily extended. For instance, the rates and can vary over the time. In this case, it suffices to modify the conditions in case (i) to
the conditions in case (ii) to
and the conditions in case (iii) to
Then, Theorem 9 will continue to hold. We can also include a processing cost that any bidder selected by the mechanism will pay to receive the reward. (This corresponds to the “mining” cost to validate the block.) In this case, the budget constraint (C1) is modified by adding a term to the right side of the equation, and the same applies to the liquidation constraint (with replaced by ). Condition (b) in (3.16) is modified to .
4. Conclusions
We have proposed in this study a new voting rule that is more general than the traditional voting rule (which is linear, corresponding to ). More importantly, the voting rule distinguishes voting power from voter share, and hence decouples the two.
Applying the voting rule to the PoS protocol, where the voters are the bidders (competing for “rewards,” or validation of new blocks), we show this decoupling will enhance security, a key objective of the PoS protocol. Specifically, we prove that while bidder shares form a martingale process that will converge to a Dirichlet distribution, each bidder’s voting power is a super-martingale that decreases to zero over time. For both limiting results, we explicitly characterize their rate of convergence as well. Furthermore, we show a phase transition in the stability of bidder shares in terms of each bidder’s initial share relative to the total in the system. We also study the issue of a bidder’s risk sensitivity when trading is allowed, and provide conditions under which a bidder will have no incentive to participate in the bidding process, or, if participate, will forgo trading.
In the Introduction, we mentioned two general approaches to enhance security in the PoS protocol: adjust the amount of reward over time and slow down the voting process; and the current study focuses on the latter while keeping the reward constant. It is possible to pursue a combination of both approaches, i.e., adjusting the size of reward dynamically over time in the same manner as adjusting (for the latter, refer to §5.2 below). In another direction, it is also possible to study the trading problem in §3.2 under a suitable market impact model, where the price process will be impacted by trading activities; for instance, a mean-field PoS model with linear impact (and transaction costs).
Acknowledgments: We thank anonymous referees for helpful suggestions which improve the presentation of the paper. W. Tang gratefully acknowledges financial support through NSF grants DMS-2113779 and DMS-2206038, and through a start-up grant at Columbia University. David Yao’s work is part of a Columbia-CityU/HK collaborative project that is supported by InnoHK Initiative, The Government of the HKSAR and the AIFT Lab.
5. Appendix
5.1. Improvement on
Theorem 3 proves large-deviation bounds on . However, it does not cover the whole range. It remains open to prove such bounds in the range ; and once proved, the result will also imply the almost sure convergence of as .
Here we provide a way to (slightly) improve the values of in Theorem 3. To simplify the presentation, we consider (quadratic voting rule) with and . The idea relies on a multi-scale analysis by splitting the interval into and , and the goal is to upper bound for . In the sequel, we neglect the polynomial factors and only focus on the exponential terms. Note that
Next we split the range of into , and with . For , we simply bound the term (a) by while for we bound the term () by . Consequently,
Using Stirling’s formula, we get exponential bounds for the terms () and ():
(5.1) | ||||
By equating the two coefficients before in (5.1), we have
By letting with , the above equation yields
(5.2) |
and the coefficient before is
(5.3) |
where is specified by (5.2). By injecting the expression (5.2) into (5.3), is a function of . It is easy to see that has only one root on which is approximately , and is improved numerically to from to . Similarly, the value of is improved numerically from to .
We can continue this procedure, for instance to split into , and , and so on to get better and better numerical values of and . However, it is not clear whether this approach will eventually get all the way to the threshold . We conjecture that the exponential deviation holds right off the threshold , which is supported by the numerical experiments; refer to Figure 1.


5.2. Control of voting powers
As proved in Theorem 6, the reward rate decays at rate . If the reward is associated with the validation of a new block, then the duration between two consecutive validations (called “block time” below) will increase (and uncontrolled) over time. For instance, set (quadratic voting rule), and seconds ( months). Then, the duration required to see the next block at time is approximately
which is even much longer than the minutes block time of Bitcoin. (The block time is seconds in Ethereum, see e.g. Buterin (2014).)
One possible (and practical) solution is to dynamically “tune” the parameter over time. Specifically, let denote a threshold for the expected number of rounds of bidding/voting between two validated blocks. Then,
-
•
set , and apply the scheme up to round ;
-
•
set , and apply the scheme up to round and so on.
Here are user-defined hyper-parameters. To illustrate, by setting rounds ( minutes in Ethereum) and for ,
-
-
Apply the scheme up to round hours;
-
-
Apply the scheme up to round weeks;
-
-
Apply the scheme up to round years;
-
-
Apply the scheme up to round years and so on.
Similarly, by setting rounds ( minutes in Ethereum),
-
-
Apply the scheme up to round minutes;
-
-
Apply the the scheme up to round minutes;
-
-
Apply the scheme up to round years , and so on.
It is also possible to tune the parameter at random time points adaptive to the reward rate. That is,
-
•
Set , and apply the scheme up to round where is the first time by which no new block is validated in rounds;
-
•
Set , and apply the scheme up to round where is the first time by which no new block is validated in rounds since then and so on.
Note that in either case the process of stakes is a time-changed Pólya urn, so the results in Section 3 continue to hold (except that the convergence rate will depend on the choice of ).
References
- Armbrust et al. (2009) M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, and I. Stoica. Above the clouds: A Berkeley view of cloud computing. 2009. Technical Report UCB/EECS-2009-28. Available at https://www2.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf.
- Bagaria et al. (2019) V. Bagaria, A. Dembo, S. Kannan, S. Oh, D. Tse, P. Viswanath, X. Wang, and O. Zeitouni. Proof-of-stake longest chain protocols: Security vs predictability. 2019. arXiv:1910.02218.
- Billingsley (1995) P. Billingsley. Probability and measure. Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Inc., New York, third edition, 1995.
- Billingsley (1999) P. Billingsley. Convergence of probability measures. Wiley Series in Probability and Statistics: Probability and Statistics. John Wiley & Sons, Inc., New York, second edition, 1999.
- Buterin (2014) V. Buterin. Toward a -second block time. 2014. Available at https://blog.ethereum.org/2014/07/11/toward-a-12-second-block-time.
- Chen and Yao (2001) H. Chen and D. D. Yao. Fundamentals of queueing networks, volume 46 of Applications of Mathematics. Springer-Verlag, 2001.
- Dean and Ghemawat (2008) J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51(1):107–113, 2008.
- Deirmentzoglou et al. (2019) E. Deirmentzoglou, G. Papakyriakopoulos, and C. Patsakis. A survey on long-range attacks for proof of stake protocols. IEEE Access, 7:28712–28725, 2019.
- Denisov et al. (2016) D. Denisov, D. Korshunov, and V. Wachtel. At the edge of criticality: Markov chains with asymptotically zero drift. 2016. arXiv:1612.01592.
- Durrett (2019) R. Durrett. Probability—theory and examples. Cambridge University Press, 2019.
- Garcia-Molina (1982) H. Garcia-Molina. Elections in a distributed computing system. IEEE Trans. Comput., 31(01):48–59, 1982.
- Goldstein and Reinert (2013) L. Goldstein and G. Reinert. Stein’s method for the beta distribution and the Pólya-Eggenberger urn. J. Appl. Probab., 50(4):1187–1205, 2013.
- Huang and Baliga (2009) A. Q. Huang and J. Baliga. FREEDM System: Role of power electronics and power semiconductors in developing an energy internet. In 21st International Symposium on Power Semiconductor Devices & IC’s, pages 9–12, 2009.
- King and Nadal (2012) S. King and S. Nadal. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. 2012. Available at https://decred.org/research/king2012.pdf.
- Lalley and Weyl (2018) S. P. Lalley and E. G. Weyl. Quadratic voting: How mechanism design can radicalize democracy. In AEA Papers and Proceedings, volume 108, pages 33–37, 2018.
- Lamperti (1960) J. Lamperti. Criteria for the recurrence or transience of stochastic process. I. J. Math. Anal. Appl., 1:314–330, 1960.
- Lamperti (1962) J. Lamperti. A new class of probability limit theorems. J. Math. Mech., 11:749–772, 1962.
- Lamperti (1963) J. Lamperti. Criteria for stochastic processes. II. Passage-time moments. J. Math. Anal. Appl., 7:127–145, 1963.
- Lamport et al. (1982) L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3):382–401, 1982.
- Menshikov et al. (2017) M. Menshikov, S. Popov, and A. Wade. Non-homogeneous random walks, volume 209 of Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, 2017. Lyapunov function methods for near-critical stochastic systems.
- Nakamoto (2008) S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, page 21260, 2008.
- Penrose (1946) L. S. Penrose. The elementary statistics of majority voting. J. R. Stat. Soc., 109(1):53–57, 1946.
- Rio (2009) E. Rio. Upper bounds for minimal distances in the central limit theorem. Ann. Inst. Henri Poincaré Probab. Stat., 45(3):802–817, 2009.
- Roşu and Saleh (2021) I. Roşu and F. Saleh. Evolution of shares in a proof-of-stake cryptocurrency. Manag. Sci., 67(2):661–672, 2021.
- Shi (2020) E. Shi. Foundations of Distributed Consensus and Blockchains. 2020. Available at http://elaineshi.com/docs/blockchain-book.pdf.
- Tang (2022) W. Tang. Stability of shares in the Proof of Stake protocol – concentration and phase transitions. 2022. arXiv:2206.02227.
- Tang (2023) W. Tang. Trading and wealth evolution in the Proof of Stake protocol. 2023. arXiv:2308.01803.
- Tang and Yao (2023) W. Tang and D. D. Yao. Trading under the proof-of-stake protocol–a continuous-time control approach. Math. Finance, 33(4):979–1004, 2023.
- Villani (2009) C. Villani. Optimal transport, volume 338 of Grundlehren der mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin, 2009. Old and new.
- Wood (2014) G. Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151:1–32, 2014.