Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Dishonest Majority

A security model in Multi-Party Computation (MPC) where the protocol is designed to remain secure and correct even if a majority of the participating parties are corrupted and act maliciously.
Chainscore © 2026
definition
CRYPTOGRAPHIC SECURITY MODEL

What is Dishonest Majority?

A security assumption in distributed systems where a protocol is designed to remain secure even if a majority of participants are malicious or adversarial.

In a dishonest majority model, a consensus protocol or cryptographic multiparty computation (MPC) is considered secure as long as the number of malicious participants does not exceed a certain threshold, often more than half (e.g., >50% or >2/3). This is a more pessimistic and robust security assumption than the honest majority model, which assumes most participants follow the rules. Protocols built for a dishonest majority are resilient to powerful Byzantine faults, where adversaries can collude and act arbitrarily to disrupt the system.

This model is critical for permissionless blockchains and systems with weak identity or Sybil resistance, where assuming most participants are honest is unrealistic. For example, Bitcoin's Proof of Work consensus is secure under a dishonest majority of computational power (hashrate), as an attacker would need to control >50% to perform a 51% attack. Similarly, many advanced zero-knowledge proof systems and secure computation protocols are designed to tolerate a majority of corrupt parties, ensuring liveness and correctness even under extreme adversarial conditions.

Achieving security with a dishonest majority often requires more complex cryptography, such as verifiable secret sharing (VSS) or Byzantine Agreement protocols, which can incur higher communication overhead and latency. The trade-off is between stronger security guarantees and practical performance. In contrast, many Proof of Stake systems and permissioned blockchains often operate under an honest or supermajority assumption, which allows for faster and more efficient consensus but requires stricter controls on participant identity and entry.

etymology
TERM ORIGINS

Etymology and Origin

The term 'dishonest majority' has its conceptual roots in the foundational problem of distributed consensus and the Byzantine Generals Problem, evolving into a core security assumption for blockchain protocols.

The phrase dishonest majority originates from the field of distributed computing and cryptography, specifically as a counterpoint to the honest majority assumption. Early consensus protocols, like those in classical Byzantine Fault Tolerance (BFT) systems, typically required that more than two-thirds of participants be honest to guarantee safety and liveness. The term gained prominence with the advent of Nakamoto consensus in Bitcoin, which introduced a different, probabilistic security model under the assumption that a majority of the network's hashing power is honest.

The etymology reflects a shift in modeling adversarial power. Instead of a fixed threshold of faulty nodes (e.g., f < n/3), a dishonest majority describes a scenario where over 50% of the relevant resource—be it computational power in Proof-of-Work, staked value in Proof-of-Stake, or voting power in a committee—is controlled by a single, coordinated adversarial entity. This is also known as a 51% attack in the context of Proof-of-Work blockchains. The term underscores that security is not binary but a game-theoretic equilibrium where dishonesty becomes profitable only at a specific, high threshold.

The concept is integral to understanding blockchain security guarantees. Protocols are formally analyzed to prove their resilience under a dishonest majority assumption, often specifying the exact percentage (e.g., tolerance for up to 49% adversarial power). This framework allows for the comparison of consensus mechanisms: classical BFT protocols often cannot recover from a dishonest majority, while Nakamoto consensus can tolerate it temporarily but may suffer from chain reorganizations and double-spends. The term's usage has expanded beyond consensus to areas like light client security and data availability, where a dishonest majority of network participants might withhold information.

key-features
SECURITY MODEL

Key Features and Characteristics

A dishonest majority is a security model assumption where a blockchain or protocol is designed to remain secure even if a majority of its validators or participants act maliciously.

01

Byzantine Fault Tolerance (BFT)

This is the foundational cryptographic framework. A protocol is Byzantine Fault Tolerant (BFT) if it can reach consensus despite the presence of Byzantine faults—nodes that act arbitrarily, including dishonestly. Dishonest majority models require super-majority BFT, tolerating more than 1/3 or even 2/3 of nodes being malicious.

  • Classic BFT: Tolerates up to f faulty nodes out of 3f+1 total (less than 1/3).
  • Dishonest Majority BFT: Designed to withstand n-1 malicious nodes in some theoretical models, though practical implementations have lower thresholds.
02

Cryptographic Assumptions

Security does not rely on honest node count alone but on strong cryptographic primitives that make coordination infeasible.

  • Verifiable Random Functions (VRFs): Used in leader election to make censorship and prediction attacks difficult.
  • Threshold Signatures: Require a large, coordinated subset of keys to sign, preventing a simple majority from forging transactions.
  • Zero-Knowledge Proofs (ZKPs): Allow state validity to be proven without revealing underlying data, decoupling security from validator honesty for specific operations.
03

Economic & Slashing Mechanisms

Protocols use cryptoeconomic incentives to disincentivize forming a dishonest majority, making it economically irrational.

  • Staking and Slashing: Validators must lock collateral (stake). Provably malicious actions (e.g., double-signing) trigger slashing, where a portion of their stake is destroyed.
  • Cost of Attack: The protocol is designed so that the cost of acquiring enough stake to form a dishonest majority and the subsequent slashing losses far outweigh any potential profit from an attack.
04

Contrast with Honest Majority

This highlights the key difference in security assumptions between major blockchain models.

  • Honest Majority (e.g., Nakamoto Consensus): Assumes >50% of hashing power or stake is honest. Security is probabilistic and relies on the longest chain rule.
  • Dishonest Majority (e.g., some BFT protocols): Can theoretically tolerate >50% malicious actors. Finality is absolute and immediate once consensus is reached, not probabilistic.

Trade-off: Dishonest majority models often require known validator sets and higher communication overhead.

05

Liveness vs. Safety Trade-off

In consensus theory, liveness means the network continues to produce new blocks; safety means validators never agree on conflicting blocks. Under a dishonest majority, this trade-off becomes critical.

  • FLP Impossibility: In an asynchronous network, it's impossible for a deterministic protocol to achieve both safety and liveness with even one faulty node.
  • Protocol Design: Systems choose resilience. Some prioritize safety (never finalize a bad block) even if halted, while others prioritize liveness (keep producing blocks) at a higher risk of forks.
06

Real-World Protocol Examples

Few protocols claim full dishonest majority tolerance in practice, but several incorporate its principles.

  • Algorand: Uses cryptographic sortition with VRFs for leader selection, claiming security against an adaptive adversary controlling most stake for a short time.
  • ThunderCore: Employs a confirmation mechanism that finalizes blocks even with a dishonest majority by leveraging a fallback slow chain.
  • Byzantine Agreement Protocols: Tendermint (BFT) and HotStuff tolerate up to 1/3 malicious voting power, a common benchmark for Byzantine systems.
how-it-works
CRYPTOGRAPHIC SECURITY MODEL

How Dishonest Majority Protocols Work

An exploration of the security assumptions and mechanisms that underpin blockchain consensus and cryptographic protocols designed to withstand a majority of malicious participants.

A dishonest majority protocol is a cryptographic system designed to remain secure and functional even when a majority of its participants are actively malicious or adversarial. This is a stark contrast to the honest majority assumption, which underpins protocols like Bitcoin's Proof-of-Work, where security collapses if over 50% of the mining power is controlled by a single entity. Dishonest majority models are essential for applications requiring robust security in permissionless or highly adversarial environments, such as secure multi-party computation (MPC), certain Byzantine Fault Tolerant (BFT) consensus variants, and threshold cryptography. The core challenge is achieving properties like liveness (transactions are eventually processed) and safety (transactions are not reversed) without relying on the goodwill of most nodes.

These protocols achieve resilience through advanced cryptographic primitives rather than economic incentives or social consensus. A foundational technique is secret sharing, where a private key or sensitive data is split into shares distributed among participants. Operations like signing a transaction or decrypting data then require a threshold of participants (e.g., 5 out of 9) to collaborate, a model known as threshold signatures. Even if a majority of share holders are dishonest, they cannot reconstruct the secret or forge a signature unless they meet the precise threshold. This creates security against rushing adversaries who can coordinate their actions, as the protocol's security proofs account for coordinated malicious behavior within the dishonest majority.

In blockchain consensus, practical dishonest majority protocols often employ asynchronous or partially synchronous network models and sophisticated quorum systems. For example, some Byzantine Agreement protocols can guarantee safety with up to n-1 faulty nodes out of n total, provided certain network timing assumptions hold. However, this extreme resilience often comes with trade-offs, such as higher communication complexity, slower finality, or the need for a known and fixed set of participants. Protocols like HoneyBadgerBFT demonstrate how to achieve consensus under a fully asynchronous network where a dishonest majority can delay messages but not break security, using techniques like asynchronous common subset and threshold encryption.

The implementation of these protocols has major implications for blockchain design. They enable the creation of permissioned consortium chains with high trust requirements among competitors, where no single entity is trusted. Furthermore, they are critical for decentralized custody solutions and cross-chain bridges, where a distributed set of validators must securely manage assets without any single party having full control. While computationally more intensive, the security guarantee—that compromise requires collusion exceeding a precise cryptographic threshold—provides a stronger, more deterministic foundation than probabilistic honest-majority models for high-value, adversarial applications.

security-considerations
DISHONEST MAJORITY

Security Considerations and Trade-offs

A dishonest majority is a threat model where a majority of network participants (validators, miners, or nodes) can collude to compromise the system's security guarantees, such as finality or censorship resistance.

01

The 51% Attack

The most common manifestation of a dishonest majority, where a single entity controls over 50% of the network's hashrate (Proof of Work) or stake (Proof of Stake). This allows them to:

  • Double-spend transactions by reorganizing the blockchain.
  • Censor transactions by excluding them from blocks.
  • Halt block production for other participants.
02

Nakamoto Consensus vs. BFT

Different consensus mechanisms have varying resilience to dishonest majorities.

  • Nakamoto Consensus (Bitcoin): Tolerates a dishonest majority in hashrate but provides only probabilistic finality. Reorgs are possible but become exponentially costly.
  • BFT-style (Tendermint, PBFT): Requires a strict supermajority (e.g., 2/3) of honest validators for absolute finality. A dishonest supermajority can halt the chain or finalize invalid blocks.
03

Economic vs. Cryptographic Security

Blockchains mitigate dishonest majorities by making attacks economically irrational or cryptographically impossible.

  • Economic Security (PoS): Attackers must acquire and stake a majority of the native token, risking slashing (loss of stake) and devaluation of their holdings.
  • Cryptographic Security (Threshold Signatures): Schemes like DKG (Distributed Key Generation) can require a dishonest supermajority to break, which is computationally infeasible.
04

Long-Range Attacks

A specific risk in Proof of Stake systems where a past dishonest majority can create an alternative chain history. Defenses include:

  • Weak Subjectivity: Requiring new nodes to trust a recent, valid checkpoint.
  • Slashing with Longevity: Penalizing validators for signing conflicting blocks, even far in the past.
  • Checkpointing: Periodically finalizing blocks via a social consensus or more secure layer.
05

Decentralization as a Defense

The primary practical defense is maximizing decentralization to make collusion difficult. Key metrics include:

  • Validator/Node Distribution: Geographic, client, and jurisdictional diversity.
  • Stake Distribution: The Gini coefficient of staked tokens; avoiding concentrated ownership.
  • Barriers to Entry: Low cost for running a node or becoming a validator.
06

Related Concept: Liveness vs. Safety

A dishonest majority forces a trade-off between two core guarantees:

  • Safety: The chain never finalizes two conflicting states. Compromised by a dishonest supermajority in BFT systems.
  • Liveness: The chain can always produce new blocks. Compromised by a dishonest majority that censors or halts production. The CAP theorem analog: during a partition, blockchain consensus must choose between safety (halt) or liveness (fork).
CONSENSUS MODEL COMPARISON

Dishonest Majority vs. Honest Majority

A comparison of two fundamental security assumptions in distributed consensus protocols.

Security AssumptionDishonest Majority (Byzantine Fault Tolerance)Honest Majority (Nakamoto Consensus)

Core Definition

Protocol remains secure as long as a strict supermajority (e.g., >2/3) of validators are honest.

Protocol remains secure as long as >50% of the network's computational power (hash rate) or stake is honest.

Primary Use Case

Permissioned/Enterprise Blockchains, Consortium Chains

Public, Permissionless Blockchains (e.g., Bitcoin, Ethereum PoS)

Finality

Probabilistic Finality

Typical Fault Tolerance Threshold

< 1/3 Byzantine (Dishonest) Nodes

< 1/2 Adversarial Hash Power/Stake

Communication Overhead

High (All-to-all voting rounds)

Low (Proof-of-Work/Stake competition)

Example Protocols

PBFT, Tendermint, HotStuff

Bitcoin, Ethereum (PoW), Litecoin

Sybil Resistance Mechanism

Known Validator Set, Identity-Based

Proof-of-Work, Proof-of-Stake

examples
DISHONEST MAJORITY

Real-World Examples and Use Cases

A dishonest majority is a security failure scenario where more than a threshold of participants in a consensus or cryptographic system act maliciously. These examples illustrate how protocols are designed to withstand or mitigate this threat.

02

Byzantine Generals' Problem

The foundational computer science problem that defines dishonest majority tolerance. It models a scenario where traitors (Byzantine faults) within a distributed system can send conflicting messages. A protocol achieves Byzantine Fault Tolerance (BFT) if it reaches consensus despite up to a certain fraction (e.g., <1/3) of participants being malicious. This theoretical framework underpins the security models of Practical BFT (PBFT) and modern blockchain consensus.

03

Threshold Cryptography & Multi-Party Computation

Cryptographic primitives explicitly designed to operate securely with a dishonest majority among participants. Examples include:

  • Threshold Signatures: A private key is split among n parties; any t+1 can collaborate to sign, but fewer than t cannot. The system remains secure even if n-t-1 parties are malicious.
  • Secure Multi-Party Computation (MPC): Allows a group to compute a function on their private inputs without revealing them, with guarantees even if some participants are dishonest. These are used in institutional custody and decentralized key management.
04

Optimistic Rollup Fraud Proofs

A Layer 2 scaling solution that assumes an honest majority of users (or at least one honest verifier) for security. In Optimistic Rollups:

  • Transactions are processed off-chain and posted to L1 with the assumption they are correct.
  • A challenge period (e.g., 7 days) allows any watcher to submit a fraud proof if they detect invalid state transitions. The system is secure as long as at least one honest participant is monitoring and can challenge within the time window—a weaker assumption than needing an honest majority of validators.
05

DKG with Dishonest Majority

A Distributed Key Generation (DKG) protocol allows a group to collectively generate a public/private key pair where the private key is never assembled in one place. Advanced DKG schemes, like those based on Pedersen's Verifiable Secret Sharing, can tolerate a dishonest majority of participants during the generation phase. This is critical for setting up the initial keys for threshold signature schemes in a trustless manner, ensuring security even if most participants are corrupted at setup.

06

Limits of Nakamoto Consensus

Nakamoto Consensus (Proof-of-Work) provides probabilistic security against a dishonest majority, but with caveats:

  • Safety (no reversal) is guaranteed only if the honest majority controls >50% hashrate.
  • Liveness (new blocks) is guaranteed as long as one honest miner finds a block. If the dishonest majority threshold is breached, safety fails completely. This contrasts with BFT-style consensus (e.g., Tendermint), which provides absolute finality and can tolerate up to 1/3 malicious validators, but halts if that threshold is exceeded.
ecosystem-usage
DISHONEST MAJORITY

Ecosystem Usage and Protocols

A dishonest majority is a security model assumption where a protocol must remain secure even if a majority of its validators or participants are malicious or Byzantine. This section explores how different blockchain protocols and cryptographic systems are designed to operate under this stringent threat model.

01

Byzantine Fault Tolerance (BFT)

Byzantine Fault Tolerance (BFT) is the foundational property that enables a distributed system to reach consensus despite malicious actors. A protocol is tolerant to a dishonest majority if it can withstand more than one-third (for some) or even more than half (for others) of its validators acting arbitrarily.

  • Classic BFT: Protocols like PBFT can tolerate up to f faulty nodes out of 3f+1 total nodes (i.e., < 33% dishonest).
  • Optimal Resilience: Some modern BFT variants, used in blockchains like Cosmos (Tendermint) and Binance Smart Chain, achieve safety with >1/3 dishonest nodes and liveness with >2/3 honest nodes.
02

Proof of Stake (PoS) Security

In Proof of Stake (PoS), the dishonest majority threat is often economic. Security relies on the cost of attacking the network exceeding the potential reward.

  • Slashing: Protocols like Ethereum 2.0 implement slashing conditions that destroy the staked assets of validators who act maliciously, making a coordinated majority attack prohibitively expensive.
  • Long-Range Attacks: A key concern is a dishonest majority from a historical state attempting to rewrite the chain. Defenses include weak subjectivity checkpoints and proof-of-stake finality gadgets.
03

Cryptographic Assumptions & MPC

Advanced cryptographic protocols are built to be secure against a dishonest majority of participants.

  • Multi-Party Computation (MPC): Allows a group to compute a function over their private inputs without revealing them. Threshold signatures and distributed key generation can be secure even if a majority of parties are compromised.
  • ZK-SNARKs & ZK-STARKs: Zero-knowledge proofs allow one party to prove statement validity to another without revealing underlying data. The security holds even if all verifiers are potentially dishonest, as it's based on cryptographic soundness.
04

Nakamoto Consensus & Longest Chain Rule

Nakamoto Consensus, used in Bitcoin, operates under a different assumption: it is secure against a dishonest majority of hashing power, but only probabilistically and with explicit limitations.

  • 51% Attack: If a single entity controls >50% of the network's hash rate, they can double-spend and censor transactions. The protocol is not BFT.
  • Security Model: Safety is guaranteed only if the honest majority controls the hash power. Finality is not immediate but converges probabilistically over time as blocks are buried deeper in the chain.
05

Data Availability & Fraud Proofs

Scalability solutions like rollups and validiums must ensure data availability to prevent a dishonest majority of sequencers or operators from hiding transaction data.

  • Data Availability Sampling (DAS): Used in Ethereum's danksharding and Celestia. Light nodes can probabilistically verify that all data is published, preventing a majority from withholding it.
  • Fraud Proofs: In optimistic rollups, a single honest validator can challenge invalid state transitions, ensuring security even if all other participants are malicious, as long as data is available.
06

Trusted Execution Environments (TEEs)

Trusted Execution Environments (TEEs) like Intel SGX or ARM TrustZone create hardware-isolated secure enclaves. They can be used to create systems where the logic inside the TEE is correct even if the host operating system and all other software are malicious—a form of local dishonest majority.

  • Use Case: Projects like Oasis Network and Secret Network use TEEs for confidential smart contract execution.
  • Trust Assumption: Security reduces to trust in the hardware manufacturer and the integrity of the enclave, rather than a majority of software nodes.
DISHONEST MAJORITY

Common Misconceptions

The 'Dishonest Majority' is a fundamental security assumption in distributed systems, but its implications are often misunderstood. This section clarifies key misconceptions about Byzantine fault tolerance, consensus models, and their real-world application in blockchain protocols.

A dishonest majority is a security model where a protocol must remain secure and functional even if more than half of its participants are Byzantine—meaning they act arbitrarily or maliciously. This contrasts with a simple majority (or honest majority), where the system only guarantees safety if a majority (e.g., 51%) of participants are honest. In blockchain, Proof of Work (Bitcoin) operates under an honest majority assumption for consensus, as an attacker with >51% of the hash rate can double-spend. In contrast, Byzantine Fault Tolerance (BFT) protocols, like those used in Tendermint or PBFT, can tolerate up to one-third of validators being dishonest, which is a specific dishonest minority threshold, not a majority.

DISHONEST MAJORITY

Technical Deep Dive

A dishonest majority is a critical security assumption in distributed systems where more than half of the network's validators or participants are assumed to be malicious or adversarial. This glossary explores the implications, protocols that withstand it, and its role in blockchain security models.

A dishonest majority is a security model assumption where more than 50% of a network's validators or consensus participants are adversarial and can collude to attack the system. This contrasts with the honest majority assumption, which underpins protocols like Bitcoin's Proof of Work, where security relies on the premise that the majority of hashing power is honest. A system resilient to a dishonest majority can maintain safety (no two valid blocks are finalized) and liveness (new blocks continue to be produced) even if the majority of validators are actively malicious. This is a stronger security guarantee, often achieved through advanced cryptographic techniques like threshold signatures and Byzantine Fault Tolerance (BFT) variants.

DISHONEST MAJORITY

Frequently Asked Questions (FAQ)

A dishonest majority is a fundamental security assumption in distributed systems, particularly in blockchain consensus. This section answers common questions about its implications, mechanisms, and real-world applications.

A dishonest majority is a security model in distributed computing where a protocol is designed to remain secure and functional even if more than half of the network participants are malicious or Byzantine. This is in stark contrast to the honest majority assumption, which requires over 50% of participants to be honest for security. In a dishonest majority model, the system can tolerate a Byzantine fault where nodes may act arbitrarily, including colluding to attack the network. This model is crucial for understanding the resilience of consensus mechanisms like Proof of Work (PoW) and Proof of Stake (PoS), which actually rely on an honest majority of hashing power or stake, not a majority of nodes. True dishonest majority tolerance is a property of advanced cryptographic protocols such as Byzantine Agreement under certain conditions or secure multi-party computation (MPC).

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Dishonest Majority: MPC Security Model Explained | ChainScore Glossary