ABSTRACT
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of variant (forked) PoW blockchains (which were instantiated with different parameters) have not received much attention in the literature. This opens the question whether existing security analysis of Bitcoin's PoW applies to other implementations which have been instantiated with different consensus and/or network parameters.
In this paper, we introduce a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains. Based on our framework, we devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints such as network propagation, different block sizes, block generation intervals, information propagation mechanism, and the impact of eclipse attacks. Our framework therefore allows us to capture existing PoW-based deployments as well as PoW blockchain variants that are instantiated with different parameters, and to objectively compare the tradeoffs between their performance and security provisions.
- Bitcoin block size limit controversy, 2016. Available from: https://en.bitcoin.it/wiki/Block_size_limit_controversy.Google Scholar
- Frederik Armknecht, Jens-Matthias Bohli, Ghassan O Karame, Zongren Liu, and Christian A Reuter. Outsourced proofs of retrievability. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 831--843. ACM, 2014. Google ScholarDigital Library
- Bitnodes. Bitnodes ip crawler. Available from: https://github.com/ayeowch/bitnodes.Google Scholar
- V. Buterin. A next-generation smart contract and decentralized application platform, 2014.Google Scholar
- Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173--186, 1999. Google ScholarDigital Library
- Coinmarketcap. Coinmarketcap. Available from: https://coinmarketcap.com/.Google Scholar
- Matt Corallo. Bitcoin relay network. Available from: http://bitcoinrelaynetwork.org/.Google Scholar
- Nicolas T. Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs/1402.1718, 2014.Google Scholar
- Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, and Emin Gün. On scaling decentralized blockchains. In Proc. 3rd Workshop on Bitcoin and Blockchain Research, 2016.Google ScholarCross Ref
- C. Decker and R. Wattenhofer. Information Propagation in the Bitcoin Network. In 13-th IEEE International Conference on Peer-to-Peer Computing, 2013.Google Scholar
- Ethereum. Ethereum tie breaking. Available from: https://github.com/ethereum/go-ethereum/commit/bcf565730b1816304947021080981245d084a930.Google Scholar
- Ethereum. ethernodes. Available from: https://www.ethernodes.org/network/1.Google Scholar
- Ethereum. ethstats. Available from: https://ethstats.net/.Google Scholar
- Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert van Renesse. Bitcoin-ng: A scalable blockchain protocol. arXiv preprint arXiv:1510.02037, 2015.Google Scholar
- Ittay Eyal and Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436--454. Springer, 2014.Google Scholar
- The Finney Attack, 2013. Available from: https://en.bitcoin.it/wiki/Weaknesses#The_.22Finney.22_attack.Google Scholar
- Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 281--310. Springer, 2015.Google ScholarCross Ref
- Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 692--705. ACM, 2015. Google ScholarDigital Library
- E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on bitcoin's peer-to-peer network. 2015.Google Scholar
- Ronald A Howard. Dynamic Probabilistic Systems, Volume I: Markov Models, volume 1. Courier Corporation, 2012.Google Scholar
- IBM. Ibm openblockchain. Available from: http://www.ibm.com/blockchain/.Google Scholar
- Intel. Proof of elapsed time (poet). Available from: http://intelledger.github.io/.Google Scholar
- Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- John G Kemeny, J Laurie Snell, and Gerald L Thompson. Finite mathematics. DC Murdoch, Linear Algebra for Undergraduates, 1974.Google Scholar
- Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16), pages 279--296, Austin, TX, August 2016. USENIX Association.Google ScholarDigital Library
- D. Mazieres. The stellar consensus protocol: A federated model for internet-level consensus. Available from: https://www.stellar.org/papers/stellar-consensus-protocol.pdf.Google Scholar
- Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. Discovering bitcoin's public topology and influential nodes.Google Scholar
- S. Nakamoto. Bitcoin: A p2p electronic cash system, 2009.Google Scholar
- Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. Technical report, IACR Cryptology ePrint Archive 2015, 2015.Google Scholar
- QuantumMechanic. Proof of stake. Available from: https://bitcointalk.org/index.php?topic=27787.0.Google Scholar
- Meni Rosenfeld. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009, 2014.Google Scholar
- Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. Optimal selfish mining strategies in bitcoin. Proceedings of the 2016 Conference on Financial Crypto (FC), 2016.Google Scholar
- Yonatan Sompolinsky and Aviv Zohar. Secure high-rate transaction processing in bitcoin. In Financial Cryptography and Data Security, pages 507--527. Springer, 2015.Google ScholarCross Ref
- testmy.net. testmy.net. Available from: http://testmy.net/country.Google Scholar
- Jonathan Toomim. blocktorrent. Available from: http://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-September/011176.html.Google Scholar
- Verizon. Verizon latency. Available from: http://www.verizonenterprise.com/about/network/latency/.Google Scholar
- Marko Vukolic. The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. In Proceedings of the IFIP WG 11.4 Workshop iNetSec 2015. 2015.Google Scholar
Index Terms
- On the Security and Performance of Proof of Work Blockchains
Recommendations
Reinforcing Immutability of Permissioned Blockchains with Keyless Signatures' Infrastructure
ICDCN '17: Proceedings of the 18th International Conference on Distributed Computing and NetworkingWith the emergence of Bitcoin, businesses are focusing on leveraging Bitcoin's blockchain technology to non-cryptocurrency based applications to improve efficiency of the operations. These business applications operate in environments where participants ...
Deconstructing Blockchains: Concepts, Systems, and Insights
DEBS '18: Proceedings of the 12th ACM International Conference on Distributed and Event-based SystemsPopularly known for powering cryptocurrencies such as Bitcoin and Ethereum, blockchains is seen as a disruptive technology capable of impacting a wide variety of domains, ranging from finance to governance, by offering superior security, reliability, ...
User perception of Bitcoin usability and security across novice users
Highlights- Users perceived the usability of credit/debit cards higher than Bitcoin.
- Low ...
AbstractThis paper investigates users’ perceptions and experiences of an anonymous digital payment system (Bitcoin) and its influence on users in terms of usability and security in comparison to other non-anonymous payment systems such as ...
Comments