Analysis of the Blockchain Protocol with Long Delays Pu Puwen We - - PowerPoint PPT Presentation

analysis of the blockchain protocol with long delays
SMART_READER_LITE
LIVE PREVIEW

Analysis of the Blockchain Protocol with Long Delays Pu Puwen We - - PowerPoint PPT Presentation

Analysis of the Blockchain Protocol with Long Delays Pu Puwen We Wei 1 , Quan Yuan 1 , Yuliang Zheng 2 1. Shandong University Key Lab of Cryptologic T echnology and Information Security, Ministry of Education 2. University of Alabama at


slide-1
SLIDE 1

Analysis of the Blockchain Protocol with Long Delays

Pu Puwen We Wei 1, Quan Yuan 1, Yuliang Zheng 2

  • 1. Shandong University

Key Lab of Cryptologic T echnology and Information Security, Ministry of Education

  • 2. University of Alabama at Birmingham
slide-2
SLIDE 2

Nakamoto’s blockchain

n Bitcoin introduced by Nakamoto in 2008 Ø Decentralized payment system

l Ledger maintained by the public in a decentralized manner l Attractive properties

Ø Decentralization, Pseudonymity, Robustness … 2

slide-3
SLIDE 3

Nakamoto’s blockchain

n Blockchain

Ø Chain-structured ledger maintained by all the participants (miners) l Blocks can only be added to the end of the chain Ø Basic security requirement l All the miners maintain the same record l Achieve co consensus in the pe perm rmissionl nless setting

3

B1 B2 B3 B1 B2 B3 B1 B’2 B’3

permissionless anyone can join (or leave) the protocol execution

slide-4
SLIDE 4

Nakamoto’s blockchain

4/47

n Proof of work (POW) Ø Solve a “cryptographic puzzle”

l Integrity:More difficult for the adversary to modify the chain l Synchronism:help the distributed miners to synchronize Ø Slowdown the generation of blocks Ø Longest chain rule

blockchain C=(𝐶", 𝐶$, … , 𝐶&) block 𝐶( = (ℎ(,$, 𝑛(, 𝑠

(, ℎ()

ℎ( = 𝐼(ℎ(,$||𝑛(| 𝑠

( , s. t. ℎ( <D

Bitcoin Backbone Protocol [GKL15]

H(h |𝑛 ? < 𝐸

slide-5
SLIDE 5

Nakamoto’s blockchain

n Security

Ø Garay, Kiayias and Leonardos [GKL15] provide a rigorous analysis

  • f blockchain protocol

l Synchronous model

Ø Pass, Seeman and shelat [PSS17] analyze the security in an asynchronous network with a-priori bounded delay

l Asynchronous model 5

Why consider the delay?

Common prefix Chain growth Chain quality

slide-6
SLIDE 6

Blockchain protocol with delays

n Bitcoin P2P network

Ø Delays are inevitable

New block 6

n The propagation delay in the network is the primary cause for blockchain forks [DW13]

slide-7
SLIDE 7

Blockchain protocol with delays

n Adversary in [PSS17]

Ø Responsible for the all message delivery

  • All the message can be delayed within Δ

rounds

Ø Has certain factions of hash power

New block Adversary within △ rounds Corrupted miners

  • Limitation: 𝜠 ≪ 𝑷(𝟐/𝒐𝒒)

The proof holds for a relatively small delay only 𝑜: the number of miners

𝑞: the probability that a miner succeeds

in mining a block at a round 7

  • Chain growth:

($,B)C $DCE ,where 𝑔 ≈ 𝑜𝑞

  • Consistency: 𝑈 with probability 1 − 𝑜𝑓𝑕𝑚(𝑈)
  • Chain quality:1 − (1 + 𝜗)

PQ($DCE) C

Convergence opportunity 𝜠 silence 𝜠 silence unique success

slide-8
SLIDE 8

Blockchain potocol with delays n In In th the r e rea eal w wor

  • rld, lo

long ng de dela lays, say ∆ ∆ ≥ 1/n /np, , could be ca caused easily!

Ø “bad” asynchronous networks, equipment failure,… Ø malicious attacks

l eclipse attacks [HKZG15], which allow an adversary to control 32 IP addresses to monopolize all connections to and from a target bitcoin node with 85% probability Eclipse attacks [HKZG15]

8

slide-9
SLIDE 9

Blockchain protocol with delays

.

Is the blockchain protocol based on POW still secure in the asynchronous network, where long delay, say Δ ≥1/np, is allowed?

9

slide-10
SLIDE 10

Our contribution

n Focus on the effect of long delay, especially Δ ≥ 1/np

Ø Prove that the common prefix property and the chain growth property can still hold in our model when considering long delay l define chain growth and common prefix in a more subtle way l simplified proof method for POW based blockchain

New block Adversary Distribution Within △ rounds with probability α 10

slide-11
SLIDE 11

Our blockchain model

n The adversary A

Ø Deliver all messages sent by miners Ø Delay the target chains with pr proba babi bility α

l Wit Within hin Δ ro rounds

Ø Do not have any hash power

Adversary

New block New block

delayed α 1-α 1

next round within Δ round

11

slide-12
SLIDE 12

Our blockchain model

n Modification to blockchain protocol

Ø Consecutive blocks cannot be mined by the same miner (not the same mining pool)

la single miner

Ø an independent communication node of the network Ø has a unit computational power Ø May lead to possible forks Ø In practice It is unlikely that a miner can mine two consecutive blocks l large number of miners n l small difficulty parameter p

12

slide-13
SLIDE 13

Our blockchain model

n Honest miners setting

Ø The adversary does not corrupt any miners (No hash power) Ø Our model captures a class of practical attacks in the real world

n For the adversary in a large-scaled blockchain protocol

Ø More difficult to control a sizable fraction of hashing power Ø Much easier to disrupt communications among miners Ø Present a concrete attack in which an adversary without any hash power may threaten the common prefix property

13

Too weak?

slide-14
SLIDE 14

Security requirements

n Ch Chain Growth

Ø Previous work: the minimum length increase of all all ho hone nest m mine ners’ chains during T rounds Ø Our work: the length increase of the ma majority y of ho hone nest m mine ners’ chains

l majority 𝜇 ∈ (

$ T , 1]

l Exclude the “bad” honest minority l Chain growth in [PSS17] is a special case of ours when λ = 1 14

3 3 3 1 3

slide-15
SLIDE 15

Security requirements

n Co Common Prefix

Ø Previous work: Al All the honest miners have the sa same history (prefix) Ø Our work: Th The maj ajor

  • rit

ity of the honest miners have the sa same history

l Allow so some miners’ chains to be inc incons nsis istent with the main chain l majority 𝜇 ∈ (

$ T , 1]

15

B1 B2 B3 B4 B5 B6 B1 B2 B3 B4 B5 B6

𝑼

slide-16
SLIDE 16

Se Secur urit ity pr proof

16

n How to capture the evolution of the main chains?

slide-17
SLIDE 17

St State of

  • f th

the M e Main C Chain

n TreeMC to capture the evolution of the main chains

Ø Inspired by Ftree model [PSS17], record all the branches (or forks) Ø TreeMC in our model

l Only store the current state of the main chains l Delayed chains are not recorded in TreeMC l Basic operations: AddBlock, DeleteBlock 𝑛" 𝑛$

($)

𝑛$

(T)

𝑛T

($)

𝑛$

(W)

𝑛T

(T)

𝑛T

(W)

𝑛T

(X)

𝐷$ = (𝑛", 𝑛$

$ , 𝑛$ $ )

𝐷T = (𝑛", 𝑛$

T , 𝑛T T )

𝐷W = (𝑛", 𝑛$

W , 𝑛T W )

𝐷X = (𝑛", 𝑛$

W , 𝑛T X )

17

slide-18
SLIDE 18

St State of the he Main ain Chain hain

n AddBlock:

l When the adversary broadcasts 𝐷$ = (𝑛", 𝑛$

$ , 𝑛T $ , 𝑛W $ ) and 𝐷T =

(𝑛", 𝑛$

T , 𝑛T T , 𝑛W T )

𝑛" 𝑛$

($)

𝑛$

(T)

𝑛T

($)

𝑛$

(W)

𝑛T

(T)

𝑛T

(W)

𝑛T

(X)

𝑛" 𝑛$

($)

𝑛$

(T)

𝑛T

($)

𝑛$

(W)

𝑛T

(T)

𝑛T

(W)

𝑛T

(X)

𝑛W

($)

𝑛W

(T)

18

slide-19
SLIDE 19

St State of the he Main ain Chain hain

n DeleteBlock:

l Remove the useless nodes

𝑛" 𝑛$

($)

𝑛$

(T)

𝑛T

($)

𝑛T

(T)

𝑛W

($)

𝑛W

(T)

𝑛" 𝑛$

($)

𝑛$

(T)

𝑛T

($)

𝑛$

(W)

𝑛T

(T)

𝑛T

(W)

𝑛T

(X)

𝑛W

($)

𝑛W

(T)

19

slide-20
SLIDE 20

Difference between TreeMC and the miners’ view

n Each miner has their own view of the main chain, which may be different with TreeMC n In terms of chain growth and common prefix , the difference is negligible

Ø Reduced to the security of TreeMC Ø Simple proof for TreeMC l Useful properties on the depth of TreeMC

20

slide-21
SLIDE 21

Security proof

n Ch Chain Gr Growth

21

Main idea of proof

slide-22
SLIDE 22

Security proof

n Co Common Pr Prefix

22

Main idea of proof The event converge

  • Only one miner succeeds in mining at round r∗.
  • C∗ is delayable while there is no new block mined in following Δ rounds

OR The chain C∗ is undelayable

Pr 𝐝𝐩𝐨𝐰𝐟𝐬𝐡𝐟 > 1 − 𝑜𝑞(1 + 𝛽Δ)

For TreeMC with common prefix of depth d-T

1 − 𝑜𝑞 1 + 𝛽Δ

h

slide-23
SLIDE 23

Lo Long Delay y Attack k on Co Common Prefix

n Concrete attack on the common prefix of TreeMC

Ø when Δ and α are “too” large relative to a fixed T Ø Goal of attack: increase the length of the two branches by T

23

slide-24
SLIDE 24

Lo Long Delay y Attack k on Co Common Prefix

Ø With inappropriate parameters, adversaries without any hash power can threaten the common prefix property

n For α = 0.8 and T = 6, the success probability increases as Δ gets larger.

the success probability grows much faster when Δ > 60 (10 min). When Δ > 120 (20 min), the success probability can reach about 1%. 24

slide-25
SLIDE 25

Future work

25

n Stronger security model

Ø Convert honest miner setting to regular miner setting

n Robustness of blockchain for data storage

Ø Provide reliable storage with provable robustness

slide-26
SLIDE 26

Welcome to visit! & Welcome to join us!

pwei@sdu.edu.cn

School of Cyber Security

Shandong University, Qingdao

slide-27
SLIDE 27

Thanks! & Questions?

27