🤖 AI Summary
This paper investigates the design of Sybil-resilient security mechanisms in re-staking networks. Addressing safety challenges arising from scaling validator responsibilities in existing protocols, it formally distinguishes— for the first time—two fundamentally distinct Sybil attack classes: *isolating* (where a single identity blocks others’ participation) and *colluding* (where multiple identities coordinate to launch attacks). It establishes an impossibility theorem: no universal slashing mechanism can simultaneously defend against both attack types. Leveraging random graph models—specifically Erdős–Rényi and bipartite block models—the paper analyzes the effectiveness boundaries of marginal and multiplicative slashing schemes, revealing that network homogeneity preserves Sybil resistance, whereas even minor heterogeneity drastically reduces attack costs. Key contributions include: (i) a rigorous classification framework for Sybil attacks; (ii) identification of an intrinsic limitation in incentive-compatible mechanism design; and (iii) quantitative characterization of how network topology decisively governs security guarantees.
📝 Abstract
Restaking protocols expand validator responsibilities beyond consensus, but their security depends on resistance to Sybil attacks. We introduce a formal framework for Sybil-proofness in restaking networks, distinguishing between two types of attacks, one in which other Sybil identities are kept out of an attack and one where multiple Sybil identities attack. We analyze marginal and multiplicative slashing mechanisms and characterize the conditions under which each deters Sybil strategies. We then prove an impossibility theorem: no slashing mechanism can simultaneously prevent both attack types. Finally, we study the impact of network structure through random graph models: while Erdös-Rényi networks remain Sybil-proof, even minimal heterogeneity in a two-block stochastic block model makes Sybil attacks profitable. These results reveal fundamental limits of mechanism design for restaking and highlight the critical role of network topology.