186 research outputs found
Majority is not Enough: Bitcoin Mining is Vulnerable
The Bitcoin cryptocurrency records its transactions in a public log called
the blockchain. Its security rests critically on the distributed protocol that
maintains the blockchain, run by participants called miners. Conventional
wisdom asserts that the protocol is incentive-compatible and secure against
colluding minority groups, i.e., it incentivizes miners to follow the protocol
as prescribed.
We show that the Bitcoin protocol is not incentive-compatible. We present an
attack with which colluding miners obtain a revenue larger than their fair
share. This attack can have significant consequences for Bitcoin: Rational
miners will prefer to join the selfish miners, and the colluding group will
increase in size until it becomes a majority. At this point, the Bitcoin system
ceases to be a decentralized currency.
Selfish mining is feasible for any group size of colluding miners. We propose
a practical modification to the Bitcoin protocol that protects against selfish
mining pools that command less than 1/4 of the resources. This threshold is
lower than the wrongly assumed 1/2 bound, but better than the current reality
where a group of any size can compromise the system
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
A widespread security claim of the Bitcoin system, presented in the original
Bitcoin white-paper, states that the security of the system is guaranteed as
long as there is no attacker in possession of half or more of the total
computational power used to maintain the system. This claim, however, is proved
based on theoretically flawed assumptions.
In the paper we analyze two kinds of attacks based on two theoretical flaws:
the Block Discarding Attack and the Difficulty Raising Attack. We argue that
the current theoretical limit of attacker's fraction of total computational
power essential for the security of the system is in a sense not
but a bit less than , and outline proposals for protocol change
that can raise this limit to be as close to as we want.
The basic idea of the Block Discarding Attack has been noted as early as
2010, and lately was independently though-of and analyzed by both author of
this paper and authors of a most recently pre-print published paper. We thus
focus on the major differences of our analysis, and try to explain the
unfortunate surprising coincidence. To the best of our knowledge, the second
attack is presented here for the first time
Questions related to Bitcoin and other Informational Money
A collection of questions about Bitcoin and its hypothetical relatives
Bitguilder and Bitpenny is formulated. These questions concern technical issues
about protocols, security issues, issues about the formalizations of
informational monies in various contexts, and issues about forms of use and
misuse. Some questions are formulated in the more general setting of
informational monies and near-monies.
We also formulate questions about legal, psychological, and ethical aspects
of informational money. Finally we formulate a number of questions concerning
the economical merits of and outlooks for Bitcoin.Comment: 31 pages. In v2 the section on patterns for use and misuse has been
improved and expanded with so-called contaminations. Other small improvements
were made and 13 additional references have been include
Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms
Existing permissionless blockchain solutions rely on peer-to-peer propagation
mechanisms, where nodes in a network transfer transaction they received to
their neighbors. Unfortunately, there is no explicit incentive for such
transaction propagation. Therefore, existing propagation mechanisms will not be
sustainable in a fully decentralized blockchain with rational nodes. In this
work, we formally define the problem of incentivizing nodes for transaction
propagation. We propose an incentive mechanism where each node involved in the
propagation of a transaction receives a share of the transaction fee. We also
show that our proposal is Sybil-proof. Furthermore, we combine the incentive
mechanism with smart routing to reduce the communication and storage costs at
the same time. The proposed routing mechanism reduces the redundant transaction
propagation from the size of the network to a factor of average shortest path
length. The routing mechanism is built upon a specific type of consensus
protocol where the round leader who creates the transaction block is known in
advance. Note that our routing mechanism is a generic one and can be adopted
independently from the incentive mechanism.Comment: 2018 Crypto Valley Conference on Blockchain Technolog
- β¦