Toward Equilibria and Solvability of Blockchain Pooling Strategies: A Topological Approach
Abstract.
In 2015, Eyal proposed the first game-theoretical model for analyzing the equilibrium of blockchain pooling: when the blockchain pools are abstracted as a non-cooperative game, two pools can reach a Nash equilibrium with a closed-form formula; Moreover, an arbitrary number of pools still exhibit an equilibrium as long as the pools have an equal number of miners. Nevertheless, whether an equilibrium exists for three or more pools of distinct sizes remains an open problem. To this end, this paper studies the equilibrium in a blockchain of arbitrary pools. First, we show that the equilibrium among identical pools, coinciding the result demonstrated by Eyal through game theory, can be constructed using a topological approach. Second, if the pools are of different size, we show that (i) if the blockchain’s pools exhibit two distinct sizes, an equilibrium can be reached, and (ii) if the blockchain has at least three distinct pool sizes, there does not exist an equilibrium.
1. Introduction
In 2015, Eyal (Eyal, 2015) proposed the first game-theoretical model for analyzing the equilibrium of blockchain pooling: when the blockchain pools are abstracted as a non-cooperative game, two pools can reach a Nash equilibrium with a closed-form formula. Moreover, the pioneering work further proved that an arbitrary number of pools still exhibit an equilibrium as long as the pools have an equal number of miners. Whether an equilibrium exists for three or more pools of distinct sizes, however, remains an open problem.
This paper studies the equilibrium in a blockchain of arbitrary pools: the number of pools might be larger than three, and each of these pools might admit any number of miners: the pools might be of different sizes, pair-wisely. The motivation of this study is that relaxing the constraints on the number of pools and their size-equality would better portrait the real-world scenarios: evidently, all production blockchain systems comprise more than two pools whose sizes are barely equal.
We approach this problem through a methodology rather than game theory though; instead, we go for a lower-level mathematical technique—topology. This choice of methodology is purely technical: we found that the framework and tools in topology are more flexible and arguably, more powerful. Although there are multiple branches of topology, such as point-set topology and algebraic topology, their essence is very similar: it is all about the relationship among the elements of a set and the derived topological properties thereof. In this sense, although in the remainder of this paper we intermingle the techniques from both point-set topology and algebraic topology, the intrinsic rationale never diverges—again, it is all about the discussion on the relationship among, this time, the miners within and across blockchain pools.
From a technical perspective, this paper will first (§3) show that the equilibrium among identical pools, coinciding the result demonstrated by (Eyal, 2015) through game theory, can be constructed using a topological approach. Instead of using game theory as a black box in a non-cooperative game, we show that the equilibrium must exist even if we treat the blockchain pools in a coalitional game. The key insight of our approach, and also the approaches of other results of this paper, lies at the topological invariant on the connectivity of topological objects. This result demonstrates the power of topology: although an equilibrium, known as a core, of a coalitional game, might not exist, a topological-approach can speak of more—an equilibrium does exist for this problem.
The second part of this paper’s technical contribution (§4) is to tackle a more challenging problem in blockchain pooling, where the pools are not equal in size. Through various point-set-topological and algebraic-topological tools, along with a reduction to a well-known -set-agreement problem in solvability, we show that (i) if the blockchain’s pools exhibit two distinct sizes, an equilibrium can be reached, and (ii) if the blockchain has at least three distinct pool sizes, there does not exist an equilibrium. Once again, the results demonstrate the power of topological methods for this problem: we can now decide whether an equilibrium exists for an arbitrary set of pools—stronger than saying “an equilibrium might not exist.”
2. Background and Preliminaries
2.1. Blockchain Pools
Due to the severe competition for block mining, blockchain miners form coalitions, or pools, to amortize the cost. The point is to share the reward and transaction fee with fellow miners in the same pool in a more continuous manner rather than risking a long period of a solo mining before getting anything back, although the latter indicating a high reward with a probability. The motivation of pooling together in blockchains is well-justified and at goodwill; In a perfect world, every pool and miner is a good citizen and behaves as expected.
However, in the real world, there is nothing preventing one or more pools from sending a spy miner over to other pools. The rationale is also justifiable as follows: if the spy can hide its local mining results, then the target pool will be less competitive and has a lower chance of winning the race of mining blocks. There is a downside of this attack, however: the pool which sends out spies is also less competitive in the sense that its own computational power is cut down. It is then not hard to see that such a dilemma might significantly affect the pooling strategies, for example, whether to launch the infiltrating attack, if so, what is the percentage of computation power should be devoted to the attack, and so on.
It then becomes a natural question to ask whether such attacks among pools might reach a stable status: pools will not launch more attacks or withdraw existing attacks—no more spies moving around, which is called an equilibrium. One of the pioneering works for this matter appeared in (Eyal, 2015), which shows: (i) no-attack is not an equilibrium: all pools are rational and would not miss the opportunity to legally impair other pools; (ii) a blockchain of two pools does have a Nash equilibrium; and (iii) a blockchain of pools of an equal number of miners also has an equilibrium.
2.2. Game Theory
One key question in game theory is whether there exists an equilibrium among rational players who would not change her decision even if the decision is sub-optimal—usually implying that her utility is not maximal. The main reason for not switching to a higher-return decision is due to the possibility of a “very bad” outcome. Quantitatively, the players calculate the expectation—a weighted average over all the possible decisions in the simplest form—and make their decisions that might not be the absolutely highest-return one.
The well-known Nash equilibrium is one such decision, or the so-called solution concept, in the literature of game theory. Informally, the Nash equilibrium has a two-fold meaning. First, the existence of Nash equilibrium states that if an individual player has a finite number of strategies, then there must exist an equilibrium among a finite number of such players. Second, the Nash equilibrium of multi-player decisions, as any other solution concepts of equilibrium, once reached, would not change unless the assumptions are invalidated. One strong assumption of Nash equilibrium is the isolation of individual players: the players in the game will simply behave as an entity, and no collaboration is allowed. This assumption covers many interesting problems, but obviously, not all. The problems targeted by Nash equilibrium and its variant are called non-cooperative games.
When players are allowed to collaborate, i.e., to form coalitions to work together for higher utility returns, the game then becomes a cooperative game, or better known as a coalitional game in the literature of game theory. Although coalitional games share very similar objectives and challenges as non-cooperative games, the solution concepts look quite different. For instance, the equilibrium counterpart in coalitional games is called a core, which does not always exist. Some approximations to the core do exist, such as the bargaining set, but in general, a coalitional game’s equilibrium point, from existence to calculation, remains a very challenging problem.
2.3. Point-Set Topology
We review the basics in point-set topology in this section. In the literature, it is also called general topology. Point-set topology focuses on the abstraction of relationships among elements in a set, without constraints about the corresponding geometric objects. Because the relationships are all defined, in an axiomatic manner, over the abstraction of elements and sets, the properties and theorems are applied to other branches of topology. A detailed introduction to point-set topology can be found in textbooks such as (Munkres, 2000). The definitions we list below are by no means exhaustive; we only sketch the ones that will be used in later chapters. We assume the readers are familiar with basic set-theoretical terms.
-
•
Topological Space. Let be a set. A set of subsets of is called a topology of as long as and . The tuple is called the topological space of . If , then is called a trivial topology of . If the context is clear, we also call the topology induced by topology .
-
•
Discrete Topological Space. Let be a topology of set . If for any subset we have , then is called a discrete topology of . Essentially, all the elements in are singleton elements in ; also, any combination of those singleton elements are also in .
-
•
Open Set. Let be a topology of . Any element is called an open set. The complement set is called a closed set.
-
•
Continuous Functions. Let be a function from topology to topology , . We call a continuous function if for every open set , there exists an open set such that .
-
•
Injective, Surjective, and Bijective Functions. Let be a function from domain set to image set , . If for any , , and , we have , then is injective. If for every , there is an element such that , then is surjective. If is both injective and surjective, then is bijective.
-
•
Homeomorphism. Let be a function from topology to topology , . If is both bijective and continuous, then is called a homeomorphism of and , and is called homeomophic to .
2.4. Algebraic Topology
In contrast to point-set topology, algebraic topology is more concerned with the underlying geometric realizations and algebraic structures. One approach to study the geometric objects is to decompose them into smaller pieces, the so-called triangulation, which does not necessarily break the object down into triangles but cells. If we restrict the shape of a cell to a polyhedron, i.e., only points and lines, then the geometric object can be depicted as a discrete approximation. Each of these polyhedron cells is then called a simplex, and the whole object is called a simplicial complex. It turns out that these concepts can also be defined in a set-theoretic context, as we will see shortly. A delicate and beautiful theory, namely algebraic topology, has been built upon these simple yet powerful definitions, and this is where we start our review. As point-set topology, we only list the concepts and notations of algebraic topology that will be used in later chapters of this paper; a more complete and rigorous review of algebraic topology can be found in textbooks such as (Munkres, 1984).
-
•
Simplicial Complex, Simplex. Let be a set. Each element is called a vertex. A simplicial complex is a set of subsets of if (i) all the vertices are singleton elements in and (ii) for every , all subsets of are also in . Each element is called a simplex. In the remaining of the paper, we call a simplicial complex a complex if no ambiguity may arise.
-
•
Face, Proper Face, Facet. A face of simplex if . A proper face of simplex if . A simplex is a facet of a complex if is not a proper face of any other simplices in .
-
•
Vertex Map. Give two complexes and , a vertex map is a function , where returns the set of vertices. Note that we do not impose any additional properties of the function ; For example, it is allowed to map two distinct vertices from to the same vertex in .
-
•
Simplicial Map. A vertex map from to is called a simplicial map it carries any simplex from to a simplex in . That is, if is a simplex in , then is a simplex in .
-
•
Carrier Map. A carrier map maps each simplex in complex to a subset of complex , usually called a subcomplex all of which constitute a powerset denoted . To this end, the carrier map is often written as .
-
•
Dimension of Simplices and Complexes . The dimension of a simplex is defined as the number of its vertices minus 1: . The reason why this is so defined is due to the geometric intuition: a two-vertex simplex can be geometrically viewed as a 1-dimensional line segment, a three-vertex simplex can be geometrically viewed as a 2-dimensional triangle, and so on. The dimension of a complex is defined as the dimension of the highest-dimensional simplices in the complex. That is, .
-
•
Skeleton of Complexes . A -skeleton of complex is a set of simplices in whose dimension is up to . That is, . Following this definition, the vertices of a complex is just its 0-skeleton: .
-
•
Connectivity. This is one of the most important topological properties in the sense that two topological spaces cannot be equivalent (i.e., homeomorphic) if they exhibit different levels of connectivity. The most widely-used property, also the one used in later chapters of this paper, is called path-connected, which has a similar definition as graph theory. A complex is called path-connected if any two vertices can be connected through a sequence of 1-dimensional simplices. If the context is clear, we simply call a complex connected if it is path-connected. Strictly speaking, path-connectivity is at the degree 0 of the connectivity spectrum, namely 0-connectivity. There is higher-degree connectivity: a -connectivity indicates that a -dimensional ball can be continuously mapped to the complex—there is no -dimensional “holes” in the complex.
-
•
Subdivision . Subdivision refers to finer decomposition of a given simplex, denoted , such that a new set of simplices are generated, and all of them constitute a new complex. Two of the most popular subdivisions are Barycentric subdivision and Chromatic subdivision. Barycentric subdivision () simply takes the Barycentric center of a specific lower-dimensional skeleton, joins the center to existing vertices, and repeats this procedure on all levels of skeletons. Chromatic subdivision () extends the Barycentric subdivision by introducing joint-centers such that the new vertices cannot directly share a lower-dimensional simplex with existing vertices, which turns to be very useful in tasks related to graph coloring.
-
•
Joining Complexes (*). In addition to dividing existing simplices, we are also able to “glue” together existing complexes through joining. Given two complexes and , the joining of two is a new complex with all the simplices from and . Formally, we say . This definition can be extended to simplices as well; for example, the join of a vertex and a complex is a new complex with the original vertex, the original complex, and all the edges (i.e., 1-dimensional simplices) between the original vertex and every vertex of the original complex.
3. Equilibrium of Equal Pools
3.1. Problem Formulation
Assume there are pools, where , . We call the size Two pools are said to be equal if they have the same number of nodes, namely, size. Let the size of each pool be , , . Each of pools is a thus a -simplex, and the input complex has disconnected -simplices, i.e., components: there is no 1- or higher-dimensional simplex among any pair of these components. These -simplices are disconnected from each other because they know nothing about others.
Definition 3.1 (Vertex in ).
Each vertex in is a tuple , where denotes the -th pool’s -th node (miner) and denotes logical false—the miner does not join another pool other than . Evidently, we have and .
The output complex is defined as follows. Each vertex in is a tuple , where is the same as Def. 3.1 and denotes the -th pool, . Note that, by such definition, even if does not change its originally assigned pool, the vertex will still change the value from to .
Definition 3.2 (Auxiliary Operations on Vertices).
By convention, we define two auxiliary operations to return the process identities and their assignments:
Furthermore, we define the following functions to return the miner’s pool and index information:
Because our goal is to find an equilibrium, each node cannot be intersected by two or more simplices in . That is, if and , then . It follows that the output complex is a disconnected complex of -simplices where . For any -simplex in , we have
where denotes the set . Similarly, we have
Now we are ready to define the carrier map from complex to , that is, . Essentially, “deforms” a simplex into one possible simplex in a subset of , i.e., a subcomplex in a monotonic way. By monotinic, we require that adding more vertices or higher-dimensional simplices into would only enlarge the subcomplex . If we can successfully construct a carrier map , or prove that such carrier map exists, then we are guaranteed the existence of an equilibrium.
The problem of assigning pools to miners is thus represented as a triple . In the remainder of this section, we will discuss how to find or construct , if it exists.
3.2. Methodology Overview
In the literature of algebraic topology, we usually face two types of problems: (i) To demonstrate that two topological spaces are “equivalent” up to continuous deformation—retaining the topological properties or the so-called topological invariant, and (ii) To prove that two topological spaces cannot be equivalent. For the first type of problem, we can either construct an explicit continuous function to map from the first space to the other or show that both spaces are homeomorphic in the sense that their underlying algebraic structures (e.g., groups, fields) are homomorphic. For the second type of problem, we are left with the only option of showing that the underlying algebraic structures are not homomorphic.
Our strategy to find the equilibrium for equal pools is as follows.
-
(1)
We will construct a continuous function, i.e., a simplicial map from a specific -simplex to a -simplex . That is, .
-
(2)
We will show that all the -simplices in are homeomorphic, such that the simplicial map is applicable to all the simplices in .
-
(3)
Finally, we will prove that for any , the corresponding simplices in constitute a connected subcomplex:
3.3. Simplicial Map from to
First, we will rephrase the well-known results of game-theoretic blockchains in the context of algebraic topology. Eyal (Eyal, 2015) showed that a no-attack strategy is not a Nash equilibrium in blockchain pools. That is to say, in the output complex , a connected component, which is itself a simplex, cannot have all of its nodes staying in their originally assigned pool. We thus have our first constraint on the simplices in , as stated in the following lemma.
Lemma 3.3.
For any simplex , there exists a vertex such that and .
Proof.
The result is a straightforward implication of the result in (Eyal, 2015). More specifically, this can be easily verified by contradiction. If every vertex satisfy the following two conditions: and , then we know that no node joins another pool in the final pool assignment. However, this is not possible because a “stay-at-pool” strategy is not a Nash equilibrium111Indeed, here we assume a noncooperative game among individual miners. A more general and harder problem is to consider the coalition among the miners in the same pool, essentially forming a coalitional game model. We will discuss solution concepts and solvability challenges of coalitional pooling strategies in §4. according to (Eyal, 2015), leading to a contradiction. ∎
Recall that a simplicial map is an extended vertex map: not only does the map apply to -simplices (i.e., vertices), but also to any -simplices, . That is, we need to show that there exists a map from to such that any simplex of dimension has a corresponding -dimensional simplex in . Formally, we will have the following result.
Lemma 3.4.
There exists a simplicial map from to .
Proof.
We prove this lemma by constructing a map by induction. We will first show that a vertex map exists. Then, we will assume such a map exists for dimension , and finally, show that a new map exists for dimension based on the -dimensional map.
We define a map as follows. Recall that indicates the set of simplices of dimension of up to ; therefore, simply represents the set of vertices of complex . Recall that the dimension of is much larger that of :
Therefore, it is essential for to map simplices from to the same simplex in . More specifically, we need to construct the map for all the vertices of simplices in . Without loss of generality, in the following we will work on the -th -simplex, namely , such that .
Recall that by definition, the output complex comprises -simplices with all the possible pool assignments as long as the miners are distinct. We define the simplicial map based on the following two conditions:
-
(1)
-
(2)
Condition (1) ensures that the simplicial map is name preserving, a requirement of any protocol that can solve the problem. Condition (2) guarantees that the resulting simplex is valid, according to Lemma 3.3. Intuitively, all the vertices in move the “next” pool in the loop of simplices. Note that this map is well-defined because all the pools are of equal size, as part of the assumption. It turns out that other simplicial maps , can be similarly constructed as , and they are all well-defined due to the equal cardinality of pools. Therefore, , , we can always use to map all the vertices of simplices into the same simplex in . We have thus successfully built the base for the induction, i.e., .
It remains to show that higher-dimensional faces of and can also be mapped through . Suppose we have found a simplicial map , , which is indeed the case for 0-dimension as shown above, we will need to show a -dimensional varient of the simplical map can map to . Let and be two -dimensional simplices in and , respectively. Because , there must exist two vertices and , respectively, such that and . We construct a -dimensional simplex as the joining of and , and do that for and in a similar fashion:
Recall that denotes the join operation between two simplices. Evidently, we will have and , for which the map can be applied.
Finally, we define as the composition of a series of join operations and lower-dimensional maps . By construction, is a simplicial map from to . ∎
Intuitively speaking, Protocol 3.4 states that it is possible to merge multiple initial pool-local views into a coherent view in the final pool assignment. Next, we will show that this property is invariant as long as the pools are kept equal in the input.
3.4. Homeomorphic Simplices in
In this section, we will show that all the -simplices in are homeomorphic, meaning that all these components are essentially equivalent in the sense that one component can deform into another with continuous functions. This property will be crucial when we prove that more than one equilibrium must exist in an equal-pool blockchain network later in §3.6. The remainder of this section will demonstrate that if is an equal-pool blockchain network, then any two pools are homeomorphic. Formally, we will prove the following lemma.
Lemma 3.5.
Suppose is an equal-pool blockchain’s input complex. For any , and are homeomorphic.
Proof.
Here we overuse the Greek letters, e.g., and , to represent both the simplices and topological spaces. In the latter case, the discrete space induced by the vertices of the simplex. That is, topological space consists of all the subsets of vertices in :
If the context is clear, we simply write to indicate its topological space .
We need to show that there is a function between two topological spaces, i.e., , such that:
-
(1)
is bijective
-
(2)
is continuous
-
(3)
is continuous
Let be any subset. Denote its cardinality , , then can be rewritten as
where if . For each element , is a vertex defined in Def. 3.1. Recall that returns the local index of vertex in the pool identified by . We extend the definition of on a single vertex defined in Def. 3.2 to a set:
Evidently, since all pools are equal in size by assumption, for any , we can always have a , where , such that . This is exactly the condition based on which we define :
Now, we need to verify that defined above is bijective and continuous in both directions.
To show that is bijective, we need to show that is both injective and surjective. For any two subsets of , and , . Without loss of generality, suppose and . Then, we will have a vertex such that . Since , we know , meaning that . Therefore, we just show:
thus is injective. Suppose is any subset of , we will show that there must be a domain whose image comprises —if this is true, then is surjective. This can be trivially verified: because pools are all equal and the miners within each pool are following the same naming convention (cf. Def. 3.2), then for any set of indices , there must be a subset such that , rendering a surjective function. Since is both injective and surjective, we know is a bijective function.
Next, we show that is a continuous function. That is to say, for any open set , we have an open set such that . Recall that an open set is defined as any subset included in the topological space. A simplex, by definition, has all of its subsets as open sets222In topology, these open sets are also closed sets since they are all complementary to the open sets. We do not explicitly define closed sets in the main text since we do not need closed sets in our proofs. in the induced discrete topological space. The continuity property can be similarly demonstrated as we proved the covering property (i.e., is surjective) before. The indices of open set is . Because pools are all equal and following the same naming convention, there must be an open set such that .
Finally, we need to show that the inverse function is also continuous. We skip the detailed proof here because it follows exactly the same reasoning as we proved the continuity of .
Given that is both bijective and continuous, and is also continuous, we have found a homeomorphim for and . Since both and are arbitrary simplices of , we conclude that all simplices in are homeomorphic. ∎
3.5. Connected Subcomplex in
In the previous two subsections, we have shown that (i) there exists a simplicial map from the input complex to the output complex and (ii) all the simplices in the input complex are homeomorphic. The last piece for our main theorem, which will be presented in §3.6, is demonstrating that the mapped simplices in the output complex indeed constitute a connected subcomplex. Formally, we need to prove the following lemma.
Lemma 3.6.
Let be the simplicial map defined in Lemma 3.4. We define the union of the mapped simplices as :
then and is connected.
Proof.
The first part of the proof is trivial. We need to show that for any face , then . Because is a union of , it is suffice to show that . This is evidently true because that is how is constructed in Lemma 3.4.
The second part, the connectedness of , needs more work, though. Recall that is a composition of maps each of which corresponds to a specific dimension , . Therefore, by construction, each is connected: we can always have a -dimensional disk that is homeomorphic to . It remains to show that there is at least one path connecting two simplices in . We will prove this by contradiction.
Suppose there does not exist a path between two simplices and . Then and cannot coexist in the same simplex of because all the simplices in are -dimensional: missing a path between and would have disqualified any of the two serving in the same simplex in . Let and . It follows that and are not mapped into the same simplex in by . However, every guarantees that
as shown in Lemma 3.4. This means that a fixed must map all the simplices in into the same -dimensional simplex in , leading to a contradiction. ∎
3.6. Equilibrium of Equal-Pool Blockchains
We are now ready to state the main result for equal-pool blockchains. Specifically, we will show that there is a protocol to continuously transform the input complex into the output complex.
Theorem 3.7.
If all blockchain pools are equal, then there exist protocols to allow all miners reach equilibrium.
Proof.
By Lemma 3.4, the simplicial map maps simplices in into the same simplex in . However, because ’s are disconnected to each other, , the corresponding topological space cannot continuously deform to the topological space induced by . That is, there does not exist a protocol induced by for miners to reach equilibrium.
To fix the disconnected components, we can limit to a subset of its domain—a specific simplex in . Without loss of generality, let the specific simplex be the first one out of the simplices :
According to Lemma 3.5, all , are homeomorphic. Therefore, up the continuous transformation, can be represented by times of :
where
Note that is connected by definition, which is a -dimensional simplex. Now, we have a map . By Lemma 3.6, we know is connected. Therefore, both the domain and image sets of are connected. Because is deduced from that is a simplicial map, must be a simplicial map as well. A simplicial map between two connected complexes is obviously continuous. Thus a protocol must exist to transform the input complex into the output complex. ∎
Theorem 3.7 and its proof shows that for any blockchain with equal pools, there are at least equilibria because can be defined on up to distinct simplices in . This is a stronger result than (Eyal, 2015) in the sense that the lower bound of the number of equilibria is elevated from one to . Nonetheless, it is arguable that equal pools might not be a practical assumption in real-world blockchain practices. To that end, we will switch our focus on the pooling strategies where the sizes are arbitrary.
4. Solvability of Arbitrary Pools
If we relax the requirement of equal pools in blockchains, we cannot any more reason about the equilibrium following the techniques in §3: Lemma 3.5 becomes invalid. To see this, consider one of the conditions for a homeomorphism ; must be bijective between and . However, if not all pools have the same size, then there must be two simplices and such that:
Therefore, there cannot exist a bijective function between two sets of different cardinalities. In the remainder of this section, we will show that a general blockchain-pooling problem does not have an equilibrium. As before, we start with the problem formulation.
4.1. Problem Formulation
Assume there are pools, where , . Let denote such pools. At least two pools have distinct numbers of miners. Without loss of generality, let . In general, we pose no requirement on the equality of cardinality of other pools. To start with an easier problem, we assume
That is, we have one -simplex and lower-dimensional -simplices in the blockchain pools. Moreover, all of these simplices are disconnected pair-wise.
Note that although this condition makes the problem easier than the original one, the condition is strong enough to invalidate Lemma 3.5. Also, if we can show that this “easier” problem does not have an equilibrium, neither does the original problem.
As the equal-pool problem, each vertex in is a tuple , where denotes the -th pool’s -th node (miner) and denotes logical false—the miner does not join another pool other than . Evidently, we have and .
The output complex is defined similarly. Each vertex in is a tuple , where is the same as input complex and denotes the -th pool, . Note that, by such definition, even if does not change its originally assigned pool, the vertex will still change the value from to .
Because we are concerned with an equilibrium, each node cannot be intersected by two or more simplices in . That is, if and , then . It follows that the output complex is a disconnected complex of -simplices where . For any -simplex in , we have
However, the would look different for and other simplices:
We can define the carrier map from complex to , similarly to the equal-pool counterpart. The monotonic property of still holds in this arbitrary-pool problem. We will show that such cannot exist due to some topological invariant in the remainder of this section.
4.2. Methodology Overview
Our approach to demonstrate that an equilibrium does not exist is built upon the findings in the equal-pool counterpart presented in §3. Specifically, we will split the simplices in the input complex into two subcomplexes: (i) The first subcomplex consists of only one simplex ; (ii) The second subcomplex consists of -simplices: . Then, according to Theorem 3.7, can lead to at least equilibria, and we can rewrite the simplicial maps with a power of limited maps. It remains to show that the extended problem with has no way to be mapped to a connected simplex in .
The main technique we use to demonstrate the impossibility is reduction. That is, we reduce a well-known problem, the -set agreement problem, whose solution does not exist for certain conditions that are satisfied by the equilibrium of an arbitrary-pool blockchain. Specifically, we will show that we can “simulate” the execution of the -set agreement procedure by calling the operations in an arbitrary-pool blockchain. Indeed, if we are able to do so, that means we would be able to solve the -set agreement problem, which is not possible. As a result, a protocol for reaching equilibrium in an arbitrary-pool network cannot exist.
4.3. Binary Partition: Topology of and
We start our analysis with a simpler problem where only one simplex has a different dimension than other simplices in the input complex. Without loss of generality, we assume , and and . Moreover, we assume , , and .
We then construct limited simplicial maps and for and , respectively. As before, we have the following equations:
As a result, the mapped simplices can be similarly partitioned into two parts , where
We can write as a power of because all the , are homeomorphic, as discussed before (cf. Lemma 3.5). It turns out that we can expect two distinct sets of outcomes in the output complex. The problem can now be represented as a triple . We define an auxiliary operation to return the partition of a specific simplex:
such that .
4.4. Ternary and Higher-order Partitions
We can naturally extend the partition techniques from two to three or more. As we will show later in §4.5, for , all the -set agreement problems are not decidable to have a protocol. In the following, we assume : there are at least three distinct pools in terms of their sizes. Note that we also require that the size of the largest pool is at least , i.e., , because otherwise there cannot exist distinct sizes
As in the case of binary partition, we can similarly define . We denote the cardinality, i.e., pool size, of partitioned input complex as:
where , and require
We use to denote the set of pool sizes:
It should be noted that partitions of the input complex do not change ’s topological properties. There are still components in , each of which is a -dimensional simplex where . Furthermore, these simplices are disconnected since the miners are in distinct pools and learn nothing from other pools initially.
Having partitioned input complex based on their cardinalities, we are ready to construct the output complex the corresponding carrier maps. The partitioned simplicial maps for -distinct-pool are a natural extension to the binary partition we discuss in §4.3. Recall that all simplices are homeogeneous for a specific dimension . Therefore, the compounded simplicial map can be written as
The task then can be expressed in the following triple:
where we use multiplication to denote map composition:
4.5. Relations with -set Agreement
4.5.1. The -set Agreement Problem
This section briefly reviews the classical -set agreement (KSA) problem and its important decidability implications in the literature. In the following sections, we will then use the KSA as a base model and reduce it to the -distinct-pool (KDP) problem in blockchains. In the literature of computation theory, the reduction is also called “simulation,” in the sense that a solution protocol for the targeting problem can be wrapped up as a solution for the base problem whose decidability is already known.
Definition 4.1 (-set agreement task.).
A task of -set agreement is a triple , where the input is comprised of multiple -simplices, the output is a complex of pairwise-disconnected simplices each of which is connected by itself, and the carrier map mapping each -simplex in to a subcomplex in . The initial views of vertices in are taken from a set , the final views of vertices in are taken from a set , whose cardinality is , i.e., . While the values in can be arbitrary, the output complex is required to have exactly simplices, each of which takes a distinct value from .
Intuitively, KSA requires that the outcome can have up to distinct values for a group of members. It is a generalization of the well-known consensus problem where only one value can be chosen by the members. Indeed, the consensus problem is a degenerate of KSA where . Although KSA may seem easier than the consensus problem, KSA is far from trivial under the regular computation models. A computation model is comprised of multiple facets, such as failure models (e.g., crash failures, Byzantine failures), communication models (e.g., shared memory, message passing), and timing models (e.g., synchronous processes, asynchronous processes). The literature (Herlihy et al., 2013) showed that a model is capable of solving a -set agreement task only when . To make this paper self-contained, we restate it here as the following lemma.
Lemma 4.2 (KSA is solvable if ).
A model is capable of solving a -set agreement task only if .
Proof.
See Theorem 5.6.14 in (Herlihy et al., 2013). ∎
In the remainder of this section, we call a KSA problem with and 2SA and 3SA, respectively. Similarly, we call a KDP problem with and 2DP and 3DP, respectively. In §4.5.2, we will show that a 2SA protocol can reduce to a 2DP protocol, which means a blockchain with two distinct pool sizes can reach an equilibrium. In §4.5.3, we will show that a 3DP protocol can reduce to a 3SA protocol, meaning that a blockchain with three or more distinct pool sizes does not have an equilibrium.
4.5.2. 2SA reduces to 2DP
We first provide the basic concepts and notations of computing theory in the context of reduction, much of which was elaborated in (Herlihy et al., 2013).
A task is a problem to be solved. Examples of tasks include finding the equilibrium of equal pools discussed in §3.1. For completeness, we formally define the task here.
Definition 4.3 (Task).
A task is a triple ), where is the input complex comprising all the possible input simplices, is the output complex comprising all the valid results represented by subcomplexes, and is a carrier map between the input and output complexes and satisfies monotonic property (i.e., closed on inclusion relationship):
A protocol is an algorithm that solves the task, i.e., a procedure to reach a subset of the valid subcomplex in . A protocol also takes the same input complex , and follow the application-specific procedure to end up in a protocol complex. The course of “following the application-specific procedure” is abstracted also by a carrier map, namely . Formally, a protocol is defined as follows.
Definition 4.4 (Protocol).
A protocol is a triple , where is the input complex, is a complex representing all the possible final results according to the algorithm, and is a carrier map:
We say that a protocol solves a task if the results in are encompassed by the expected outcomes , as stated in the following.
Definition 4.5.
A protocol solves a task if there is a simplicial map
such that for any simplex the following is satisfied333This property is called “carried by” in the literature. We here avoid using this terminology for less confusion between carried by and carrier map.:
By convention, we also write , and is usually called a decision map.
The relationship between protocols and tasks can be illustrated in the following diagram in the sense of category theory.
Having formalized the tasks and protocols, we are ready to define a computation model, as follows. Intuitively, a model is just a collection of protocols that are applicable to a specific input complex.
Definition 4.6 (Computation Model).
A computation model on an complex is a collection of triples , .
Now we are ready to portrait the relationship between computation models.
Definition 4.7 (Model Reduction).
Suppose there are two computation models, and . By convention, they are called real model and virtual model, respectively. Real model is said to reduce to virtual model if every protocol for implies a protocol in .
Usually, the reduction is implemented by a simulation of one protocol in another, as defined below.
Definition 4.8 (Model Simulation).
Let be a protocol for model and be a protocol for model , respectively. We call simulates if there exists a simplicial map
The map is called a simulation between and . For any , we have
From the perspective of category theory, the morphism can be illustrated in the following diagram.
We construct the simulation from 2SA to 2DP as follows. Suppose the 2SA is represented by task and has a protocol . We know such a protocol must exist because when , the -set-agreement problem turns to be a graph-theoretical problem and there are many algorithms (e.g., breadth-first, depth-first) to decide whether a pair of vertices (, ) has a path between and .
For the 2SA task, assume there are nodes in total, each of which is a vertex in . For its protocol , every time the protocol complex grows into the next step, the new complex is a subdivision of the previous complex. There must exist a sufficiently large integer such that
where . Therefore, the protocol for 2SA can be rewritten as a triple .
For each operation, we map it to the swap of pool assignment for a set of miners. We denote the following operation:
such that
Intuitively, we restrict the miners to switch to a new pool in a systematic manner. It should be clear that this manner is only a subset of all the possible movements; the point is that these movements are all allowed by , and any final assignment can be achieved by this operation as long as is sufficiently large. As a result, the protocol for 2DP can be stated as .
It remains to show that for any simplex , there exists a such that . Note that for any , the vertices in are still , where is the total number of miners. Of course, the simplex also contains all the higher-dimensional faces on the vertices. Therefore, we need to show that for sufficiently large , the resulting simplex consists of all vertices. As we will show in the following lemma, this is indeed the case.
Lemma 4.9.
For sufficiently large , There is at least one simplex such that .
Proof.
Suppose for contradiction that there is no simplex of dimension . Recall that in 2DP, there are only two partitions of pools with distinct number of miners. It follows that there is at least one “missing” vertex in a specific pool that is not exchanged by any pool of the other partition after times of pool swaps. However, the swap operation is defined in such a round-robin fashion that, as long as is larger than the pool size, all the vertices would be swapped. Since we assume is “sufficiently large,” it is larger than the pool size also, thus leading to a contradiction. ∎
We are now ready to make the first main conclusion for arbitrary-pool-size blockchains, as stated in the following theorem.
Theorem 4.10.
If a blockchain has pools of only two distinct sizes, then it has an equilibrium.
Proof.
If the blockchain does not has an equilibrium on the pools, then according to Lemma 4.9 there cannot be a protocol for the 2-set-agreement problem. However, it is known that there exist algorithms solving the 2-set-agreement problem. ∎
4.5.3. KDP reduces to KSA,
In contrast to the previous section, we will show that when the distinct pools are larger than or equal to three, there does not exist an equilibrium. In the remainder of this section, we will assume , and both KDP and KSA assume the number of underlying distinct sets/pools is at least three. Although the reduction approach is implemented through simulation, we show that this simulation can be constructed in the inverse direction: any protocol solving a KSA implies a protocol in KDP. If this is the case, and since we know that KSA’s protocol is undecidable (again, assuming ), KDP cannot have an equilibrium when . As before, we start with constructing the protocols for KSA and KDP, respectively.
Suppose a protocol solves the KDP problem. Based on the discussion in §4.4, the protocol complex is a union of subcomplexes:
where
and is the -th partition—the set of -simplices in the input complex . While we do not know the operational progress of because it depends on the specific algorithm, it is evident that the final complex must have such a -simplex that is disconnected from any other simplices because otherwise some vertices would have ambiguous views of values—not an equilibrium. Since the protocol complex is split into partitions, there must be distinct -simplices in .
Now, we switch our focus to the protocol that solves the KSA problem. It turns out that although the output complex is different for and , the protocol complex remains unchanged: the input complex is still subdivided444In the literature, Barycentric subdivision, denoted by , and Chronmatic subdivision, denoted by , are the most widely-used subdivisions. Here, we ignored the details and simply say . repeatedly. That is, the protocol can still be written for sufficiently large .
We are ready to construct the simplicial map (cf. Def. 4.8)
We need to first map the distinct -simplices to simplices in for some that are disjoint. It turns out that can suffice: is capable to hold such -simplices. To demonstrate this, we need the following lemma.
Lemma 4.11.
An -simplex can be subdivided into disjoint -dimensional simplices.
Proof.
We choose Chromatic subdivision, , to prove the claim. In the following we provide an informal definition of Chromatic subdivision; a full explanation can be found in (Kozlov, 2008). A Chromatic subdivision recursively divides the -dimensional simplex’s -skeletons, , into pieces plus the -areas. For a 1-dimensional line segment, the -area is a central segment confined by two new vertices in-between the original two endpoints. For a 2-dimensional triangle, an inner triangle with its three vertices is “locally” connected to the two new vertices in the 1-dimensional case and the three vertices in the original triangle.
Let be a -dimensional simplex. For each facet of , there must be new distinct vertices, which together with the vertex in the central -dimensional inner simplex constitute a local -simplex. Since there are exactly of -skeletons, we can find of these local -dimensional simplices, none of which is the original -simplex. Denote these simplices as Evidently, , . For any , none of its vertices is shared with others because vertices are from its local -skeleton and the -th vertex is from the central inner -simplex that is distinct for each local simplex. Similarly, none of ’s higher skeletons are shared with any other , , because these skeletons are encompassed by a “larger” simplex contributed by the original vertices in . Therefore, we have
which is claimed by the theorem. ∎
Now we are ready to state the main result of the solvability of -distinct-pool problem, .
Theorem 4.12.
If a blockchain has pools of at least three distinct sizes, it does not have an equilibrium.
Proof.
First, we show that there is a simulation from KDP to KSA. According to Lemma 4.11, generates disjoint -dimensional simplices555As other algebraic operations, is also simplified as in the literature. Here we explicitly spell it out to emphasize its power.. It should be noted that , because otherwise we cannot have more partitions than the total number of miners. It follows that has enough capacity to accommodate distinct pools, each of which cannot have more than vertices. It remains to show that all the simplices in other than the simplices of distinct pools can also be mapped to . This is a trivial task because we can always keep subdividing the simplices that are not chosen to hold the disjoint simplices in until we have enough capacity.
We know that KSA cannot be solved for . Because KDP can simulate KSA, KDP cannot be solved either. ∎
4.6. Blockchains with Arbitrary Pools
In this section, we summarize the main results for blockchains with arbitrary pools and discuss the relations with game-theoretical approaches.
If a blockchain has pools of only two distinct sizes, Theorem 4.10 states that an equilibrium indeed exists. It should be clear, however, that this claim says nothing about how the protocol’s complexity looks like; the algorithm could be polynomial, exponential, or NP-complete, which is not the scope of this paper. In practice, a two-distinct-pool blockchain network is, admittedly, rare. To this end, it is more interesting to draw some conclusions on the case where more than two pools are formed in the blockchain. Unfortunately, Theorem 4.12 tells us that no equilibrium exists for these more interesting cases. Of course, the impossibility result for distinct pools, although somewhat discouraging, is only based on the mainstream computing models nowadays. The authors, in their very humble opinions, still hold high hopes that future hardware and communication advances plus possibly more advanced mathematical tools would lead to equilibrium results.
Speaking of equilibria over groups of participants, we just cannot skip the discussion on game theory. From a game-theoretical point of view, the pooling strategies are aligned with the so-called coalitional games. Unlike non-cooperative games, where one is interested in the utility equilibrium for individual participants, a coalitional game deals with the utility of a coalition of participants—just like the pools of miners in blockchains. More importantly, the well-known Nash equilibrium that states an equilibrium always exists is only applicable to non-cooperative games; the counterpart equilibrium in coalitional games, namely core, is proven not to always exist. In this sense, a large portion of this section just tries to achieve a stronger result than that in game theory: when , such a core does not exist for -distinct-pool blockchains. In coalitional game theory, there are a few more relaxed equilibria than the core per se. For instance, a bargaining set might be a practical replacement that implies that a participant not in the core might still choose to stay in its current coalition because its claims (for higher utility, for example) can be countered. An extensive review of a coalitional game’s solution concepts can be found in (Peleg and Sudholter, 2007). For a general introduction to game theory, see (Maschler et al., 2013).
5. Additional Related Work
We briefly review important work on game-theoretical techniques and topological approaches in blockchains, distributed computing, and computer security.
After the pioneering work (Eyal, 2015) on the game-theoretical analysis of blockchain pools, game-theoretical approaches started to revive in computer security and blockchain communities. In (Nasr and Houmansadr, 2016), game theory is used to model the interactions between decoy router deployers and the censors. In (Tsabary and Eyal, 2018), authors studied miner’s behavior and blockchain’s status if the miners’ incentive lies only on transaction fees. In (Zhao, 2020c), a game-theoretical model was developed by considering Byzantine failures for permissioned blockchains.
Topological approaches have a long story in distributed computing and are recently used to design cross-blockchain transactions (Zhao, 2020b), such as distributed cross-blockchain protocols (Zhao and Li, 2020). In (Zhao, 2020d), a topological space is constructed to be homeogeneous to the cross-blockchain transactions using point-set topology. In (Zhao, 2020a), an algebraic-topological model shows that a naive message-passing protocol cannot complete a cross-blockchain transaction. In (Nowak et al., 2019), point-set topology was used to characterize the solvability of consensus problems in distributed systems. Recent work on modeling the data structure of blockchains through algebraic topology appears at (Meldman-Floch, 2018).
6. Conclusion
Our conventional wisdom on blockchain’s pooling equilibrium is limited: when the blockchain pools are abstracted as a non-cooperative game, two pools can reach a Nash equilibrium with a closed-form formula; an arbitrary number of pools still exhibit an equilibrium as long as the pools have an equal number of miners.
This paper studies the equilibrium in a blockchain of arbitrary pools. First, we show that the equilibrium among identical pools, coinciding the result demonstrated by (Eyal, 2015) through game theory, can be constructed using a topological approach. Second, if the pools are of different size, we show that (i) if the blockchain’s pools exhibit two distinct sizes, an equilibrium can be reached, and (ii) if the blockchain has at least three distinct pool sizes, there does not exist an equilibrium.
Acknowledgement
This work is, in part, supported by the U.S. Department of Energy under contract number DE-SC0020455. This work is also supported by a Google Cloud award and an Amazon research award. The authors are grateful for the valuable discussion with Mohammad Sadoghi (University of California, Davis) on an earlier version of this work.
References
- (1)
- Eyal (2015) Ittay Eyal. 2015. The Miner’s Dilemma. In Proceedings of the 2015 IEEE Symposium on Security and Privacy (SP).
- Herlihy et al. (2013) Maurice Herlihy, Dmitry Kozlov, and Sergio Rajsbaum. 2013. Distributed Computing Through Combinatorial Topology (1st ed.). Morgan Kaufmann Publishers Inc.
- Kozlov (2008) Dmitry N. Kozlov. 2008. Combinatorial Algebraic Topology. Algorithms and computation in mathematics, Vol. 21. Springer. https://doi.org/10.1007/978-3-540-71962-5
- Maschler et al. (2013) Michael Maschler, Eilon Solan, and Shmuel Zamir. 2013. Game Theory. Cambridge University Press.
- Meldman-Floch (2018) Wyatt Meldman-Floch. 2018. Blockchain Cohomology. CoRR abs/1805.07047 (2018). arXiv:1805.07047 http://arxiv.org/abs/1805.07047
- Munkres (1984) James Munkres. 1984. Elements Of Algebraic Topology. Westview Press.
- Munkres (2000) James Munkres. 2000. Topology. Prentice Hall.
- Nasr and Houmansadr (2016) Milad Nasr and Amir Houmansadr. 2016. GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). 1727–1738.
- Nowak et al. (2019) Thomas Nowak, Ulrich Schmid, and Kyrill Winkler. 2019. Topological Characterization of Consensus under General Message Adversaries. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing (PODC). 218–227.
- Peleg and Sudholter (2007) Bezalel Peleg and Peter Sudholter. 2007. Introduction to the Theory of Cooperative Games. Springer-Verlag Berlin Heidelberg.
- Tsabary and Eyal (2018) Itay Tsabary and Ittay Eyal. 2018. The Gap Game. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS). 713–728.
- Zhao (2020a) Dongfang Zhao. 2020a. Completeness of Cross-Blockchain Transactions: A Combinatorial-Algebraic-Topological Approach. CoRR abs/2004.08473 (2020). arXiv:2004.08473 https://arxiv.org/abs/2004.08473
- Zhao (2020b) Dongfang Zhao. 2020b. Cross-Blockchain Transactions. In Conference on Innovative Data Systems Research (CIDR).
- Zhao (2020c) Dongfang Zhao. 2020c. Permissioned Blockchain Revisited: A Byzantine Game-Theoretical Perspective. CoRR abs/2001.03822 (2020). arXiv:2001.03822 https://arxiv.org/abs/2001.03822
- Zhao (2020d) Dongfang Zhao. 2020d. Topological Properties of Multi-Party Blockchain Transactions. CoRR abs/2004.01045 (2020). arXiv:2004.01045 https://arxiv.org/abs/2004.01045
- Zhao and Li (2020) Dongfang Zhao and Tonglin Li. 2020. Distributed Cross-Blockchain Transactions. CoRR abs/2002.11771 (2020). arXiv:2002.11771 https://arxiv.org/abs/2002.11771