Cornell Researchers Uncover Potential Threats to Decentralized Autonomous Organizations: “Dark” Voting Systems

Cornell researchers, including Vitalik Buterin, are investigating potential threats to decentralized autonomous organizations (DAOs) posed by bribery attacks on voting protocols, introducing new cryptographic methods to mitigate these risks.
Dot
August 17, 2024
Dean Fankhauser

Dean has an economics and startup background which led him to create Bitcompare. He primarly writes opinion pieces for Bitcompare. He's also been a guest on BBC World, and interviewed by The Guardian and many other publications.

TABLE OF CONTENTS

A team of researchers from Cornell University, including Ethereum co-founder Vitalik Buterin and PhD students Mahimna Kelkar, Kushal Babel, Philip Daian, and James Austgen, is delving into the potential risks that decentralized autonomous organizations (DAOs) may face as they become more mainstream. Their focus is on the looming threat of unified attacks on protocols through smart contract bribery, which could lead to the emergence of “dark” voting systems.

During the Science of Blockchain Conference at Columbia University in early August, Mahimna Kelkar spoke about the group's groundbreaking research on proofs of complete knowledge (CK), a novel cryptographic concept they introduced in 2023.

Kelkar explained the foundational idea behind proof of knowledge, a widely used cryptographic method in the crypto industry that allows one party (the prover) to convince another party (the verifier) that they possess secret information, such as a secret key, without actually revealing the information. However, the team identified a significant vulnerability in this concept. Kelkar noted:

“When the secret key is held inside trusted hardware, in what we call encumbrance of the secret key, you can still complete this proof of knowledge without actually having knowledge of the underlying secret key.”

This subtle gap in standard proofs of knowledge definitions could leave voting protocols susceptible to bribery attacks, a significant concern in DAOs where governance is decentralized. Kelkar elaborated,

“A voting platform may be vulnerable to bribery attacks, where users can sort of sell their votes to bribers in a dark marketplace. What our work tries to do is establish an individual, real person kind of ownership of data.”
Source: The Initiative for Contracts and CryptoCurrencies (IC3)

The researchers proposed two methods to enforce proof of complete knowledge, thereby mitigating the risk of these attacks. One approach involves using a trusted execution environment (TEE) to prove that a voter possesses a key and can use it. Even if an attacker attempts to lock the key away, the key remains under the control of the voting system’s own TEE, ensuring that the tokenholder maintains complete control.

The second method involves using application-specific integrated circuits (ASICs), typically employed in Bitcoin mining. By sending a key to an ASIC, which lacks a TEE environment, the key remains accessible to the user, ensuring they retain control while still proving that the key was used by the ASIC.

While this research is still in the prototype stage, the team has demonstrated that these threats are realistic. Kelkar concluded with

"We show that this is a realistic threat to DAOs, and we show this by demonstrating a practically deployable dark DAO, which can facilitate vote buying in existing DAOs. It’s not something that you can deploy tomorrow, but it’s like practically instantiable as a research prototype today.”

Cornell Researchers Uncover Potential Threats to Decentralized Autonomous Organizations: “Dark” Voting Systems

HomeNews
Contents

A team of researchers from Cornell University, including Ethereum co-founder Vitalik Buterin and PhD students Mahimna Kelkar, Kushal Babel, Philip Daian, and James Austgen, is delving into the potential risks that decentralized autonomous organizations (DAOs) may face as they become more mainstream. Their focus is on the looming threat of unified attacks on protocols through smart contract bribery, which could lead to the emergence of “dark” voting systems.

During the Science of Blockchain Conference at Columbia University in early August, Mahimna Kelkar spoke about the group's groundbreaking research on proofs of complete knowledge (CK), a novel cryptographic concept they introduced in 2023.

Kelkar explained the foundational idea behind proof of knowledge, a widely used cryptographic method in the crypto industry that allows one party (the prover) to convince another party (the verifier) that they possess secret information, such as a secret key, without actually revealing the information. However, the team identified a significant vulnerability in this concept. Kelkar noted:

“When the secret key is held inside trusted hardware, in what we call encumbrance of the secret key, you can still complete this proof of knowledge without actually having knowledge of the underlying secret key.”

This subtle gap in standard proofs of knowledge definitions could leave voting protocols susceptible to bribery attacks, a significant concern in DAOs where governance is decentralized. Kelkar elaborated,

“A voting platform may be vulnerable to bribery attacks, where users can sort of sell their votes to bribers in a dark marketplace. What our work tries to do is establish an individual, real person kind of ownership of data.”
Source: The Initiative for Contracts and CryptoCurrencies (IC3)

The researchers proposed two methods to enforce proof of complete knowledge, thereby mitigating the risk of these attacks. One approach involves using a trusted execution environment (TEE) to prove that a voter possesses a key and can use it. Even if an attacker attempts to lock the key away, the key remains under the control of the voting system’s own TEE, ensuring that the tokenholder maintains complete control.

The second method involves using application-specific integrated circuits (ASICs), typically employed in Bitcoin mining. By sending a key to an ASIC, which lacks a TEE environment, the key remains accessible to the user, ensuring they retain control while still proving that the key was used by the ASIC.

While this research is still in the prototype stage, the team has demonstrated that these threats are realistic. Kelkar concluded with

"We show that this is a realistic threat to DAOs, and we show this by demonstrating a practically deployable dark DAO, which can facilitate vote buying in existing DAOs. It’s not something that you can deploy tomorrow, but it’s like practically instantiable as a research prototype today.”
Dean Fankhauser

Dean has an economics and startup background which led him to create Bitcompare. He primarly writes opinion pieces for Bitcompare. He's also been a guest on BBC World, and interviewed by The Guardian and many other publications.

A team of researchers from Cornell University, including Ethereum co-founder Vitalik Buterin and PhD students Mahimna Kelkar, Kushal Babel, Philip Daian, and James Austgen, is delving into the potential risks that decentralized autonomous organizations (DAOs) may face as they become more mainstream. Their focus is on the looming threat of unified attacks on protocols through smart contract bribery, which could lead to the emergence of “dark” voting systems.

During the Science of Blockchain Conference at Columbia University in early August, Mahimna Kelkar spoke about the group's groundbreaking research on proofs of complete knowledge (CK), a novel cryptographic concept they introduced in 2023.

Kelkar explained the foundational idea behind proof of knowledge, a widely used cryptographic method in the crypto industry that allows one party (the prover) to convince another party (the verifier) that they possess secret information, such as a secret key, without actually revealing the information. However, the team identified a significant vulnerability in this concept. Kelkar noted:

“When the secret key is held inside trusted hardware, in what we call encumbrance of the secret key, you can still complete this proof of knowledge without actually having knowledge of the underlying secret key.”

This subtle gap in standard proofs of knowledge definitions could leave voting protocols susceptible to bribery attacks, a significant concern in DAOs where governance is decentralized. Kelkar elaborated,

“A voting platform may be vulnerable to bribery attacks, where users can sort of sell their votes to bribers in a dark marketplace. What our work tries to do is establish an individual, real person kind of ownership of data.”
Source: The Initiative for Contracts and CryptoCurrencies (IC3)

The researchers proposed two methods to enforce proof of complete knowledge, thereby mitigating the risk of these attacks. One approach involves using a trusted execution environment (TEE) to prove that a voter possesses a key and can use it. Even if an attacker attempts to lock the key away, the key remains under the control of the voting system’s own TEE, ensuring that the tokenholder maintains complete control.

The second method involves using application-specific integrated circuits (ASICs), typically employed in Bitcoin mining. By sending a key to an ASIC, which lacks a TEE environment, the key remains accessible to the user, ensuring they retain control while still proving that the key was used by the ASIC.

While this research is still in the prototype stage, the team has demonstrated that these threats are realistic. Kelkar concluded with

"We show that this is a realistic threat to DAOs, and we show this by demonstrating a practically deployable dark DAO, which can facilitate vote buying in existing DAOs. It’s not something that you can deploy tomorrow, but it’s like practically instantiable as a research prototype today.”
Written by
Dean Fankhauser