On secure chain selection rules from physical resources in a permissionless setting
Baig MA. 2026. On secure chain selection rules from physical resources in a permissionless setting. Institute of Science and Technology Austria.
Download
Thesis
| PhD
| Published
| English
Author
Supervisor
Corresponding author has ISTA affiliation
Department
Series Title
ISTA Thesis
Abstract
Blockchains enable distributed consensus in permissionless settings, where participants
are unknown, dynamically changing, and do not trust each other. While Bitcoin,
based on Proof-of-Work (PoW), was the first protocol in this model, significant
research has focused on permissionless protocols using alternative physical resources,
specifically Proof-of-Space (PoSpace) and Verifiable Delay Functions (VDFs). This
thesis investigates the theoretical limits and design space of longest-chain protocols in
the fully permissionless and dynamically available settings using these three resources.
First, we address the feasibility of blockchains relying solely on storage as a resource.
We prove a fundamental impossibility result: there exists no secure longest-chain
protocol based exclusively on Proof-of-Space in the fully permissionless or dynamically
available settings. Further, we quantify the adversarial capabilities required to execute
a double-spend attack. Our result formally justifies the necessity of coupling PoSpace
with time-dependent primitives (such as VDFs) or to move to less permissive settings
(quasi-permissionless or permissioned) to ensure security.
Second, we generalize Nakamoto-like heaviest chain consensus to protocols utilizing
combinations of multiple physical resources. We analyze chain selection rules governed
by a weight function Γ(S, V,W), which assigns weight to blocks based on recorded
Space (S), VDF speed (V ), and Work (W). We provide a complete classification
of secure weight functions, proving that a weight function is secure against private
double-spend attacks if and only if it is homogeneous in the timed resources (V,W)
and sub-homogeneous in S. This framework unifies existing protocols like Bitcoin and
Chia under a single theoretical model and provides a powerful tool for designing new
longest-chain blockchains from a mix of physical resources.
Publishing Year
Date Published
2026-03-04
Publisher
Institute of Science and Technology Austria
ISBN
ISSN
IST-REx-ID
Cite this
Baig MA. On secure chain selection rules from physical resources in a permissionless setting. 2026. doi:10.15479/AT-ISTA-21651
Baig, M. A. (2026). On secure chain selection rules from physical resources in a permissionless setting. Institute of Science and Technology Austria. https://doi.org/10.15479/AT-ISTA-21651
Baig, Mirza Ahad. “On Secure Chain Selection Rules from Physical Resources in a Permissionless Setting.” Institute of Science and Technology Austria, 2026. https://doi.org/10.15479/AT-ISTA-21651.
M. A. Baig, “On secure chain selection rules from physical resources in a permissionless setting,” Institute of Science and Technology Austria, 2026.
Baig MA. 2026. On secure chain selection rules from physical resources in a permissionless setting. Institute of Science and Technology Austria.
Baig, Mirza Ahad. On Secure Chain Selection Rules from Physical Resources in a Permissionless Setting. Institute of Science and Technology Austria, 2026, doi:10.15479/AT-ISTA-21651.
All files available under the following license(s):
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0):
Main File(s)
File Name
2026_Baig_Mirza_Ahad_Thesis.pdf
1.94 MB
Access Level
Open Access
Date Uploaded
2026-04-03
MD5 Checksum
292a5989262521f7c145a109d1f348cb
Source File
File Name
Access Level
Closed Access
Date Uploaded
2026-04-03
MD5 Checksum
c3986dba90653dac97adba662ebff238
Material in ISTA:
Part of this Dissertation
Part of this Dissertation
