Avalanche is a prominent blockchain platform designed to provide high throughput, low latency, and strong decentralization without the energy costs of proof-of-work. Its core innovation lies in a family of randomized, leaderless, and scalable consensus protocols known as the Snow family—comprising Slush, Snowflake, Snowball, and culminating in Avalanche itself. This preliminary write-up provides a technical description of the Avalanche consensus protocol, followed by an in-depth security analysis, including its resilience properties, known vulnerabilities, and recent academic findings.


Technical Description of the Avalanche Consensus Protocol

1. The Snow Family: Core Concepts

Avalanche consensus is built on the Snow family of protocols, each introducing increasing sophistication and safety guarantees:

Protocol Parameters

Key parameters govern the protocol's behavior:

DAG Structure and Voting

In Avalanche, transactions are appended to the DAG by referencing parents (recent, non-conflicting transactions). When a node receives a transaction, it queries k random peers to check if the transaction and all its ancestors are preferred in their respective conflict sets. A transaction receives a "chit" if it passes this check in a majority of responses. The confidence in a transaction is then the sum of chits in its descendants, and a transaction is accepted when its confidence or consecutive successful queries reach the threshold β.

This DAG-based approach allows for: