logo

SCIENCE CHINA Information Sciences, Volume 63 , Issue 3 : 130104(2020) https://doi.org/10.1007/s11432-019-9916-5

Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers

More info
  • ReceivedMar 1, 2019
  • AcceptedJun 4, 2019
  • PublishedFeb 11, 2020

Abstract

Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused onrigorous analyses of the security of Nakamoto's blockchain protocol in an asynchronous network wherenetwork delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delayattack against Nakamoto's blockchain protocol. However, their proof only holds in the honest miner setting.In this study, we improve Wei, Yuan and Zheng's result using a stronger model where the adversarycan perform long delay attacks and corrupt a certain fraction of the miners.We propose a method to analyze the convergeevent and demonstrate that the properties of chain growth, common prefix, and chain qualitystill hold with reasonable parameters in our stronger model.


Acknowledgment

Quan YUAN and Puwen WEI were supported by National Natural Science Foundation of China (Grant No. 61502276). Keting JIA was supported by National Key Research and Development Program of China (Grant No. 2017YFA0303903), National Cryptography Development Fund (Grant No. MMJJ20170121), and Zhejiang Province Key RD Project (Grant No. 2017C01062). Haiyang XUE was supported by National Natural Science Foundation of China (Grant No. 61602473) and National Cryptography Development Fund (Grant No. MMJJ20170116). We would like to thank the anonymous reviewers for their insightful comments.


References

[1] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2008. https://bitcoin.org/en/bitcoin-paper. Google Scholar

[2] Decker C, Wattenhofer R. Information propagation in the bitcoin network. In: Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013. 1--10. Google Scholar

[3] Eyal I, Sirer E G. Majority is not enough: bitcoin mining is vulnerable. In: Proceedings of International Conference on Financial Cryptography and Data Security, 2014. 436--454. Google Scholar

[4] Bonneau J, Miller A, Clark J, et al. SoK: research perspectives and challenges for Bitcoin and cryptocurrencies. In: Proceedings of IEEE Symposium on Security and Privacy, 2015. 104--121. Google Scholar

[5] Göbel J, Keeler H P, Krzesinski A E, et al. Bitcoin blockchain dynamics: the selfish-mine strategy in the presence of propagation delay. Perform Eval, 2016, 104: 23--41. Google Scholar

[6] Sompolinsky Y, Zohar A. Secure high-rate transaction processing in bitcoin. In: Proceedings of Financial Cryptography and Data Security, 2015. 507--527. Google Scholar

[7] Sapirshtein A, Sompolinsky Y, Zohar A. Optimal selfish mining strategies in bitcoin. In: Proceedings of Financial Cryptography and Data Security, 2016. 515--532. Google Scholar

[8] Gervais A, Karame G O, Wust K, et al. On the security and performance of proof of work blockchains. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2016. 3--16. Google Scholar

[9] Kiayias A, Koutsoupias E, Kyropoulou M, et al. Blockchain mining games. In: Proceedings of ACM Conference on Economics and Computation, 2016. 365--382. Google Scholar

[10] Natoli C, Gramoli V. The balance attack against proof-of-work blockchains: the R3 testbed as an example. In: Proceedings of Computing Research Repository, 2016. Google Scholar

[11] Nayak K, Kumar S, Miller A, et al. Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: Proceedings of IEEE European Symposium on Security and Privacy, 2016. 305--320. Google Scholar

[12] Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol: analysis and applications. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2015. 281--310. Google Scholar

[13] Wu Y, Fan H, Wang X. A regulated digital currency. Sci China Inf Sci, 2019, 62: 032109 CrossRef Google Scholar

[14] Pass R, Seeman L, shelat A. Analysis of the blockchain protocol in asynchronous networks. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2017. 643--673. Google Scholar

[15] Wei P W, Yuan Q, Zheng Y L. Security of the blockchain protocol against long delay attack. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2018. 250--275. Google Scholar

Copyright 2020  CHINA SCIENCE PUBLISHING & MEDIA LTD.  中国科技出版传媒股份有限公司  版权所有

京ICP备14028887号-23       京公网安备11010102003388号