🤖 AI Summary
This work investigates the theoretical relationship between restaking and proof-of-stake (PoS) regarding staked capital efficiency. Method: We propose a graph-theoretic security framework for restaking and formally characterize— for the first time—the tight upper and lower bounds on additional stake required to bootstrap PoS protocol security from restaking, as well as the stake savings achievable when migrating from PoS to restaking. Contribution/Results: Our asymptotic analysis shows that restaking achieves Ω(√n) worst-case total stake savings, and this bound is tight. Both forward (restaking → PoS) and reverse (PoS → restaking) conversion bounds are rigorously derived. Integrating game-theoretic security analysis with asymptotic complexity methods, our work establishes the first systematic theoretical benchmark and quantitative foundation for cross-chain staking economic mechanism design.
📝 Abstract
We compare the efficiency of restaking and Proof-of-Stake (PoS) protocols in terms of stake requirements. First, we consider the sufficient condition for the restaking graph to be secure. We show that the condition implies that it is always possible to transform such a restaking graph into secure PoS protocols. Next, we derive two main results, giving upper and lower bounds on required extra stakes that one needs to add to validators of the secure restaking graph to be able to transform it into secure PoS protocols. In particular, we show that the restaking savings compared to PoS protocols can be very large and can asymptotically grow in the worst case as a square root of the number of validators. We also study a complementary question of transforming secure PoS protocols into an aggregate secure restaking graph and provide lower and upper bounds on the PoS savings compared to restaking.