The Cost of Secure Restaking vs. Proof-of-Stake
Akaki Mamageishvili, Benny Sudakov
Published: 2025/5/30
Abstract
We compare the efficiency of secure restaking and Proof-of-Stake (PoS) protocols in terms of stake requirements. First, we consider the sufficient condition for the restaking graph to be secure. We show that the condition implies that it is always possible to transform such a restaking graph into separate secure PoS protocols. Next, we derive two main results, giving upper and lower bounds on required extra stakes that one needs to add to validators of the secure restaking graph to be able to transform it into secure PoS protocols. In particular, we show that the restaking savings compared to PoS protocols can be very large and can asymptotically grow in the worst case as a square root of the number of validators. We also study a complementary question of aggregating secure PoS protocols into a secure restaking graph and provide lower and upper bounds on the PoS savings compared to restaking.