Analysis of the Blockchain Protocol with Long Delays
Pu Puwen We Wei 1, Quan Yuan 1, Yuliang Zheng 2
- 1. Shandong University
Key Lab of Cryptologic T echnology and Information Security, Ministry of Education
- 2. University of Alabama at Birmingham
Analysis of the Blockchain Protocol with Long Delays Pu Puwen We - - PowerPoint PPT Presentation
Analysis of the Blockchain Protocol with Long Delays Pu Puwen We Wei 1 , Quan Yuan 1 , Yuliang Zheng 2 1. Shandong University Key Lab of Cryptologic T echnology and Information Security, Ministry of Education 2. University of Alabama at
Key Lab of Cryptologic T echnology and Information Security, Ministry of Education
Ø Decentralization, Pseudonymity, Robustness … 2
3
permissionless anyone can join (or leave) the protocol execution
4/47
blockchain C=(𝐶", 𝐶$, … , 𝐶&) block 𝐶( = (ℎ(,$, 𝑛(, 𝑠
(, ℎ()
ℎ( = 𝐼(ℎ(,$||𝑛(| 𝑠
( , s. t. ℎ( <D
Bitcoin Backbone Protocol [GKL15]
l Synchronous model
l Asynchronous model 5
Common prefix Chain growth Chain quality
New block 6
rounds
New block Adversary within △ rounds Corrupted miners
The proof holds for a relatively small delay only 𝑜: the number of miners
𝑞: the probability that a miner succeeds
in mining a block at a round 7
($,B)C $DCE ,where 𝑔 ≈ 𝑜𝑞
PQ($DCE) C
Convergence opportunity 𝜠 silence 𝜠 silence unique success
l eclipse attacks [HKZG15], which allow an adversary to control 32 IP addresses to monopolize all connections to and from a target bitcoin node with 85% probability Eclipse attacks [HKZG15]
8
9
New block Adversary Distribution Within △ rounds with probability α 10
l Wit Within hin Δ ro rounds
Adversary
New block New block
delayed α 1-α 1
next round within Δ round
11
12
13
l majority 𝜇 ∈ (
$ T , 1]
l Exclude the “bad” honest minority l Chain growth in [PSS17] is a special case of ours when λ = 1 14
ity of the honest miners have the sa same history
l Allow so some miners’ chains to be inc incons nsis istent with the main chain l majority 𝜇 ∈ (
$ T , 1]
15
𝑼
16
l Only store the current state of the main chains l Delayed chains are not recorded in TreeMC l Basic operations: AddBlock, DeleteBlock 𝑛" 𝑛$
($)
𝑛$
(T)
𝑛T
($)
𝑛$
(W)
𝑛T
(T)
𝑛T
(W)
𝑛T
(X)
𝐷$ = (𝑛", 𝑛$
$ , 𝑛$ $ )
𝐷T = (𝑛", 𝑛$
T , 𝑛T T )
𝐷W = (𝑛", 𝑛$
W , 𝑛T W )
𝐷X = (𝑛", 𝑛$
W , 𝑛T X )
17
l When the adversary broadcasts 𝐷$ = (𝑛", 𝑛$
$ , 𝑛T $ , 𝑛W $ ) and 𝐷T =
(𝑛", 𝑛$
T , 𝑛T T , 𝑛W T )
𝑛" 𝑛$
($)
𝑛$
(T)
𝑛T
($)
𝑛$
(W)
𝑛T
(T)
𝑛T
(W)
𝑛T
(X)
𝑛" 𝑛$
($)
𝑛$
(T)
𝑛T
($)
𝑛$
(W)
𝑛T
(T)
𝑛T
(W)
𝑛T
(X)
𝑛W
($)
𝑛W
(T)
18
l Remove the useless nodes
𝑛" 𝑛$
($)
𝑛$
(T)
𝑛T
($)
𝑛T
(T)
𝑛W
($)
𝑛W
(T)
𝑛" 𝑛$
($)
𝑛$
(T)
𝑛T
($)
𝑛$
(W)
𝑛T
(T)
𝑛T
(W)
𝑛T
(X)
𝑛W
($)
𝑛W
(T)
19
20
21
22
Pr 𝐝𝐩𝐨𝐰𝐟𝐬𝐡𝐟 > 1 − 𝑜𝑞(1 + 𝛽Δ)
1 − 𝑜𝑞 1 + 𝛽Δ
h
23
the success probability grows much faster when Δ > 60 (10 min). When Δ > 120 (20 min), the success probability can reach about 1%. 24
25
27