skip to main content
10.1145/2976749.2978341acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the Security and Performance of Proof of Work Blockchains

Published:24 October 2016Publication History

ABSTRACT

Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of variant (forked) PoW blockchains (which were instantiated with different parameters) have not received much attention in the literature. This opens the question whether existing security analysis of Bitcoin's PoW applies to other implementations which have been instantiated with different consensus and/or network parameters.

In this paper, we introduce a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains. Based on our framework, we devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints such as network propagation, different block sizes, block generation intervals, information propagation mechanism, and the impact of eclipse attacks. Our framework therefore allows us to capture existing PoW-based deployments as well as PoW blockchain variants that are instantiated with different parameters, and to objectively compare the tradeoffs between their performance and security provisions.

References

  1. Bitcoin block size limit controversy, 2016. Available from: https://en.bitcoin.it/wiki/Block_size_limit_controversy.Google ScholarGoogle Scholar
  2. Frederik Armknecht, Jens-Matthias Bohli, Ghassan O Karame, Zongren Liu, and Christian A Reuter. Outsourced proofs of retrievability. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 831--843. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bitnodes. Bitnodes ip crawler. Available from: https://github.com/ayeowch/bitnodes.Google ScholarGoogle Scholar
  4. V. Buterin. A next-generation smart contract and decentralized application platform, 2014.Google ScholarGoogle Scholar
  5. Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173--186, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Coinmarketcap. Coinmarketcap. Available from: https://coinmarketcap.com/.Google ScholarGoogle Scholar
  7. Matt Corallo. Bitcoin relay network. Available from: http://bitcoinrelaynetwork.org/.Google ScholarGoogle Scholar
  8. Nicolas T. Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs/1402.1718, 2014.Google ScholarGoogle Scholar
  9. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, and Emin Gün. On scaling decentralized blockchains. In Proc. 3rd Workshop on Bitcoin and Blockchain Research, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. Decker and R. Wattenhofer. Information Propagation in the Bitcoin Network. In 13-th IEEE International Conference on Peer-to-Peer Computing, 2013.Google ScholarGoogle Scholar
  11. Ethereum. Ethereum tie breaking. Available from: https://github.com/ethereum/go-ethereum/commit/bcf565730b1816304947021080981245d084a930.Google ScholarGoogle Scholar
  12. Ethereum. ethernodes. Available from: https://www.ethernodes.org/network/1.Google ScholarGoogle Scholar
  13. Ethereum. ethstats. Available from: https://ethstats.net/.Google ScholarGoogle Scholar
  14. Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert van Renesse. Bitcoin-ng: A scalable blockchain protocol. arXiv preprint arXiv:1510.02037, 2015.Google ScholarGoogle Scholar
  15. Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436--454. Springer, 2014.Google ScholarGoogle Scholar
  16. The Finney Attack, 2013. Available from: https://en.bitcoin.it/wiki/Weaknesses#The_.22Finney.22_attack.Google ScholarGoogle Scholar
  17. Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 281--310. Springer, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  18. Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 692--705. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on bitcoin's peer-to-peer network. 2015.Google ScholarGoogle Scholar
  20. Ronald A Howard. Dynamic Probabilistic Systems, Volume I: Markov Models, volume 1. Courier Corporation, 2012.Google ScholarGoogle Scholar
  21. IBM. Ibm openblockchain. Available from: http://www.ibm.com/blockchain/.Google ScholarGoogle Scholar
  22. Intel. Proof of elapsed time (poet). Available from: http://intelledger.github.io/.Google ScholarGoogle Scholar
  23. Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. John G Kemeny, J Laurie Snell, and Gerald L Thompson. Finite mathematics. DC Murdoch, Linear Algebra for Undergraduates, 1974.Google ScholarGoogle Scholar
  25. Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16), pages 279--296, Austin, TX, August 2016. USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Mazieres. The stellar consensus protocol: A federated model for internet-level consensus. Available from: https://www.stellar.org/papers/stellar-consensus-protocol.pdf.Google ScholarGoogle Scholar
  27. Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. Discovering bitcoin's public topology and influential nodes.Google ScholarGoogle Scholar
  28. S. Nakamoto. Bitcoin: A p2p electronic cash system, 2009.Google ScholarGoogle Scholar
  29. Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. Technical report, IACR Cryptology ePrint Archive 2015, 2015.Google ScholarGoogle Scholar
  30. QuantumMechanic. Proof of stake. Available from: https://bitcointalk.org/index.php?topic=27787.0.Google ScholarGoogle Scholar
  31. Meni Rosenfeld. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009, 2014.Google ScholarGoogle Scholar
  32. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in bitcoin. Proceedings of the 2016 Conference on Financial Crypto (FC), 2016.Google ScholarGoogle Scholar
  33. Yonatan Sompolinsky and Aviv Zohar. Secure high-rate transaction processing in bitcoin. In Financial Cryptography and Data Security, pages 507--527. Springer, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  34. testmy.net. testmy.net. Available from: http://testmy.net/country.Google ScholarGoogle Scholar
  35. Jonathan Toomim. blocktorrent. Available from: http://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-September/011176.html.Google ScholarGoogle Scholar
  36. Verizon. Verizon latency. Available from: http://www.verizonenterprise.com/about/network/latency/.Google ScholarGoogle Scholar
  37. Marko Vukolic. The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. In Proceedings of the IFIP WG 11.4 Workshop iNetSec 2015. 2015.Google ScholarGoogle Scholar

Index Terms

  1. On the Security and Performance of Proof of Work Blockchains

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
          October 2016
          1924 pages
          ISBN:9781450341394
          DOI:10.1145/2976749

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 October 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CCS '16 Paper Acceptance Rate137of831submissions,16%Overall Acceptance Rate1,261of6,999submissions,18%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader