guarantee that the network cannot get stuck as long as
the number of Byzantine nodes within the system is
limited.
5 CONCLUSIONS
Understanding the fundamental mechanisms and
security properties of the structure underlying
blockchain-based protocols is becoming increasingly
important. Thus, detailed analyses and formalizations
of existing distributed ledger systems are crucial to
prove the correctness of the algorithms and gain con-
fidence that they achieve their goals.
In this paper, we have presented a formalization
of the XRP Ledger Consensus Protocol, whose func-
tioning has been studied in a rather superficial way
so far. To the best of our knowledge, our work is the
first one that describes the phases of the Ripple pro-
tocol in such great detail, trying to avoid ambiguities
in defining its behavior. We have included the analy-
sis of two key security properties, namely safety and
liveness, based upon which the efficacy of the proto-
col can be determined. Furthermore, we have shown
that the correlation between some protocol parame-
ters can be leveraged to meet a desired liveness/fault
tolerance. Our work represents the first step towards
the complete analysis of the XRP Ledger Consensus
Protocol and opens several research directions. For
instance, our set-theoretic approach could serve as the
basis for the construction of an extended formalism
that is capable of capturing the behaviour of the pro-
tocol by means of a strictly formal language. Also
the use of different model-driven approaches and au-
tomated verification tools can greatly benefit from our
specification efforts and facilitate the comprehensive
description of the protocol. For the immediate future,
we plan to extend our work considering the formal-
ization of additional security properties and using dif-
ferent models of computation.
REFERENCES
Armknecht, F., Karame, G. O., Mandal, A., Youssef, F.,
and Zenner, E. (2015). Ripple: Overview and Out-
look. In Conti, M., Schunter, M., and Askoxylakis,
I., editors, Trust and Trustworthy Computing, pages
163–180, Cham. Springer International Publishing.
Badertscher, C., Maurer, U., Tschudi, D., and Zikas, V.
(2017). Bitcoin as a Transaction Ledger: A Compos-
able Treatment. In Katz, J. and Shacham, H., editors,
Advances in Cryptology – CRYPTO 2017, pages 324–
356, Cham. Springer International Publishing.
Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., Mc-
Corry, P., Meiklejohn, S., and Danezis, G. (2017).
Consensus in the Age of Blockchains. CoRR,
abs/1711.03936.
Cachin, C. and Vukolic, M. (2017). Blockchain Consensus
Protocols in the Wild. CoRR, abs/1707.01873.
Chase, B. and MacBrough, E. (2018). Analysis of the XRP
Ledger Consensus Protocol. CoRR, abs/1802.07242.
Daian, P., Pass, R., and Shi, E. (2016). Snow White:
Provably Secure Proofs of Stake. Cryptology ePrint
Archive, Report 2016/919.
Fischer, M. J., Lynch, N. A., and Paterson, M. S. (1985).
Impossibility of Distributed Consensus with One
Faulty Process. J. ACM, 32(2):374–382.
Garay, J., Kiayias, A., and Leonardos, N. (2015). The Bit-
coin Backbone Protocol: Analysis and Applications.
In Oswald, E. and Fischlin, M., editors, Advances
in Cryptology - EUROCRYPT 2015, pages 281–310,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Garay, J., Kiayias, A., and Leonardos, N. (2017). The Bit-
coin Backbone Protocol with Chains of Variable Dif-
ficulty. In Katz, J. and Shacham, H., editors, Ad-
vances in Cryptology – CRYPTO 2017, pages 291–
323, Cham. Springer International Publishing.
Garay, J. A., Kiayias, A., Leonardos, N., and Panagiotakos,
G. (2018). Bootstrapping the Blockchain, with Appli-
cations to Consensus and Fast PKI Setup. In Abdalla,
M. and Dahab, R., editors, Public-Key Cryptography
– PKC 2018, pages 465–495, Cham. Springer Interna-
tional Publishing.
Gramoli, V. (2017). From Blockchain Consensus Back to
Byzantine Consensus. Future Generation Computer
Systems.
Halpin, H. and Piekarska, M. (2017). Introduction to Secu-
rity and Privacy on the Blockchain. EuroS&P 2017 -
2nd IEEE European Symposium on Security and Pri-
vacy, Workshops.
Kiayias, A., Russell, A., David, B., and Oliynykov, R.
(2017). Ouroboros: A Provably Secure Proof-of-
Stake Blockchain Protocol. In Katz, J. and Shacham,
H., editors, Advances in Cryptology – CRYPTO 2017,
pages 357–388, Cham. Springer International Pub-
lishing.
Mauri, L., Cimato, S., and Damiani, E. (2018). A Compar-
ative Analysis of Current Cryptocurrencies. In Pro-
ceedings of the 4th International Conference on In-
formation Systems Security and Privacy - Volume 1:
ICISSP, pages 127–138. INSTICC, SciTePress.
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic
Cash System.
Pass, R., Seeman, L., and Shelat, A. (2017). Analysis of
the Blockchain Protocol in Asynchronous Networks.
In Coron, J.-S. and Nielsen, J. B., editors, Advances
in Cryptology – EUROCRYPT 2017, pages 643–673,
Cham. Springer International Publishing.
Pass, R. and Shi, E. (2017). The Sleepy Model of Consen-
sus. In Takagi, T. and Peyrin, T., editors, Advances
in Cryptology – ASIACRYPT 2017, pages 380–409,
Cham. Springer International Publishing.
Pease, M., Shostak, R., and Lamport, L. (1980). Reach-
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
62