Proof-of-Stake node groups
Proof of Stake and node groups are at the core of the Swingby Skybridge protocol.
Last updated
Proof of Stake and node groups are at the core of the Swingby Skybridge protocol.
Last updated
The Swingby Network is a permissionless (i.e, anyone can join by downloading and running the Swingby node software), peer-to-peer (i.e, all nodes are equal and there is no leader) network of nodes who run the Swingby node software to communicate with one another.
The network exists to create and operate decentralized custodians.
TSS groups form on the network that runs two main processes.
The keygen process — It is the collaborative creation of a public key, from which custodial cryptocurrency addresses on both blockchains are derived. This is an initial set-up phase and is done once per “bridge” between two blockchains.
The transaction signing process — It is the collaborative signing of cryptocurrency transactions for making payments from those custodial addresses.
Both processes are implemented using TSS protocols. TSS groups can reform as nodes leave and join the network. This is known as dynamic re-grouping.
Each Swingby node operator needs to own and stake SWINGBY tokens for their metanodes to be considered eligible to:
Participate in the creation of custodial addresses
Sign transactions
Each node’s eligibility is signaled by broadcasting a signed message over the Swingby Network that includes a transaction hash from ETH Chain (also known as the “Ping” message).
We expect some amount of network churn in the Swingby network. If many peers leave, leaving fewer than t peers left to sign transactions, the TSS group has effectively lost control over the custodial wallets. This is a scenario that we want to avoid.
Dynamic re-grouping allows for parties to enter and leave the TSS group, without affecting the group’s ability to sign transactions.
For example, in a group of 100 nodes with threshold 60 (n = 100, t = 60), up to 40 parties can leave the group. In first instance, nodes that leave, go offline, or send malicious data, shall be replaced by new nodes in queue to uphold n = 100. The remaining parties, so long as there are the threshold number of them, can re-create a new group. This may be necessary if there are insufficient nodes in queue and active nodes are close to t during a longer time period, in effect risking to impact availability.
Say that the secret key x is currently shared by a set of players P_1,…,P_n with a threshold of t. This group can transfer ownership to a new set of players P_1,…,P_n with a new threshold of t.
This allows the network to rotate in new nodes as network churn happens, without loss of control over the custodial wallets. However, old nodes still possess a secret share, which could potentially be exploitable if network nodes fluctuates a lot. This needs to be mitigated by running keygen from time to time.