Explore the safety implications of Peras protocol parameter settings.
Commencing after a boosted block, the adversaries attempt to build a private fork that is longer then the honest chain. If the adversaries succeed, they reveal their chain so that honest parties abandon the honest chain they built, adopt the longer adversarial fork as their preferred chain, and build blocks upon it. Any blocks and transactions that were on the abandoned segment of the honest chain are rolled back.
Protocol | Scenario | Probability | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
B | U | L | n | τ / n | f | Adversary | Rollback after one boosting | Rollback in first U+L slots | Rollback after surviving U+L slots | No quorum |