Score: 0

On Sybil-proofness in Restaking Networks

Published: September 22, 2025 | arXiv ID: 2509.18338v1

By: Tarun Chitra, Paolo Penna, Manvir Schneider

Potential Business Impact:

Protects online money systems from fake accounts.

Business Areas:
E-Signature Information Technology, Privacy and Security

Restaking protocols expand validator responsibilities beyond consensus, but their security depends on resistance to Sybil attacks. We introduce a formal framework for Sybil-proofness in restaking networks, distinguishing between two types of attacks, one in which other Sybil identities are kept out of an attack and one where multiple Sybil identities attack. We analyze marginal and multiplicative slashing mechanisms and characterize the conditions under which each deters Sybil strategies. We then prove an impossibility theorem: no slashing mechanism can simultaneously prevent both attack types. Finally, we study the impact of network structure through random graph models: while Erd\"os-R\'enyi networks remain Sybil-proof, even minimal heterogeneity in a two-block stochastic block model makes Sybil attacks profitable. These results reveal fundamental limits of mechanism design for restaking and highlight the critical role of network topology.

Page Count
33 pages

Category
Computer Science:
CS and Game Theory