SLIDE 1 On the Necessity of a Prescribed Block Validity Consensus: Analyzing BU Mining Protocol
Ren Zhang & Bart Preneel ren.zhang@esat.kuleuven.be bart.preneel@esat.kuleuven.be
SLIDE 2
SLIDE 3 What is
A peer-to-peer network of public nodes Maintaining a public decentralized ledger Of transactions that transfer value (bitcoin)
among its users
Integrity of the ledger is secured by miners
Audit transactions Use proof-of-work to arrive at consensus about
the transactions
Successful miner receives new bitcoins as reward
SLIDE 4 Bitcoin transactions
4
f f f
t1 t2 t3
block chain (200 GB)
nonce1 nonce2 nonce3 “small” “small” “small”
Block 1 Block 2 Block 3
In every block: new transactions, hash of the previous block, nonce, so that H(tx||prev_hash||nonce)<d
The Ledger: a Hash Chain of Blocks
SLIDE 5 Prescribed Block Validity Consensus
A block is either valid or invalid to all miners
Mine on the longest chain or the first received block during a tie
Blockchain blocks ; orphaned blocks
time “orphaned” “fork”
BVC Resolve Forks? Rewards?
SLIDE 6
(Once) Bitcoin Cannot Scale
Transactions per second 2000; 56000 in stress test 256000 (double eleven shopping festival, 2017) 7 in theory, < 4 in practice (1 MB block/10 min) People disagreed on how to fix it
SLIDE 7 : no Prescribed Block Size
“A tool to raise the blocksize limit without
splitting the network” “the blocksize limit should never have been a consensus rule in the first place”
Miners decide the block size limit
collectively through a deliberative process
Largest mining power support (40%) until
late June, 2017 What? How? Who?
SLIDE 8 block size limit = EB
BU Mining Protocol
Maximum acceptable block size (of a miner, local) Length of a chain starting with a “> EB” block
before the miner accepts (local)
Once AD is reached, opens SG and accepts large
blocks until 144 consecutive “≤ EB” blocks appear
≤ EB block > EB block block that the miner tries to mine time block size limit = 32MB
EB Acceptance Depth (in figure: 3) Sticky Gate
SLIDE 9 BU Mining Protocol: Rationale
Economic factors can
drive miners to the same EB which is the actual network capacity Attacks “cost the attacker far more than the
victim”
time
Emergent Consensus Security?
SLIDE 10 Two Observations
Block validity consensus (BVC) is not
necessary for security
BVC will emerge as the system goes BVC will be formed/driven by attacks Supporters: compliant & profit-driven Objectors: arbitrary
BU supporters’ different security claims Different incentive models
SLIDE 11
What We Did: Compare BU and Bitcoin
Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven
SLIDE 12 Is Consensus Necessary? (Is BU secure when BVC is absent?)
For each incentive model, pick a most famous
attack, define the attacker’s goal/utility
Evaluate effectiveness of these attacks in a
most simple “BVC absent” setting: two different EBs, one small attacker
Compute the optimal strategy and the utility
- f the attacker (math magic, see paper)
Compare results with Bitcoin
Technical approach
SLIDE 13 Is Consensus Necessary? (Is BU secure when BVC is absent?)
The setting:
Three (groups of) miners Alice, Bob, Carol with mining power
share 𝛽, 𝛾, 𝛿; 𝛽 + 𝛾 + 𝛿 = 1, 𝛽 ≤ min{𝛾, 𝛿}
Bob and Carol have the same AD=6, same block size = EBb<EBc Alice may mine blocks of size EBb, EBc or >EBc, to strategically
split Bob and Carol to different chains Example: (mine EBc block)
(when Bob opens SG, mine >EBc block) time
SLIDE 14
What We Did: Compare BU and Bitcoin
Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven
?
Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven
SLIDE 15
Is Consensus Necessary?
Compliant & Profit-Driven Alice To maximize block reward share without deviating from the protocol (no selfish mining, no double-spending) Alice orphans two Bob’s blocks by mining an EBc block; relative block reward: 1/8 → 1/6 B time C A B B C C B Goal Typical execution (AD=3)
SLIDE 16 BU is Not Incentive Compatible
Compliant & Profit-Driven Alice Results (optimal Strategy) Alice’s expected relative block reward
Alice 10%, Bob 45%, Carol 45%
SLIDE 17
What We Did: Compare BU and Bitcoin
Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven
?
Not meaningful Non-Profit-Driven
SLIDE 18 to maximize block reward + double-spending reward Alice bought something on B1, the transaction is accepted at A2; note that Alice mines a block A2
- n Bob’s chain to help it reach 4* confirmations
*: to simplify the comparison
Is Consensus Necessary?
Non-Compliant & Profit-Driven Alice time C A1 B1 B C C B A2 C C C Goal Typical execution
SLIDE 19 Double-Spending is Easier and More Profitable
Non-Compliant & Profit-Driven Alice Results (optimal Strategy, DS reward = block reward×10)
Alice’s expected mining+DS reward/10min (in block reward)
SLIDE 20
What We Did: Compare BU and Bitcoin
Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven
?
SLIDE 21
Is Consensus Necessary?
Non-Profit-Driven Alice to orphan as many Bob and Carol’s blocks as possible with the least number of Alice’s blocks Alice orphans two Carol’s blocks with only one block B time C A B B C C B Goal Typical execution B
SLIDE 22 “Cost the Attacker Far More Than the Victim”
Non-Profit-Driven Alice Results (optimal strategy, 𝛽 = 1%)
Expected # of Bob and Carol’s blocks
each Alice’s block
SLIDE 23
What We Did: Compare BU and Bitcoin
Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven
SLIDE 24 Will BVC Emerge on the Run?
The block size increasing game: moving closer to reality
Every miner has a maximum profitable block
size (MPB); if most blocks >MPB, the miner is forced to leave the game
Miners with large MPBs might form a coalition
to raise the block size and kick others out; succeed if the coalition controls >50% mining power
Rewards are shared among those who survive
till the end Definition
SLIDE 25
BU May Damage Decentralization
The block size increasing game: moving closer to reality Termination State (MPB1<MPB2 <MPB3<MPB4) In most initial settings, the block size will be raised
SLIDE 26 Results Summary
No, new attack vectors in BU weakens Bitcoin’s security within all three incentive models
BVC will not emerge in most occasions Even when a BVC is reached and all miners are
compliant, the BVC is very fragile
Strong miners have both the incentive and the
ability to break BVC, raise the block size for higher reward share BU secure when BVC is absent? Will BVC emerge?
SLIDE 27
SLIDE 28 Larger Blocks Mean
↑ txs: hard to quantify ↑ percentage of small txs: hard to quantify
For public nodes:
↑ bandwidth, ↑ bandwidth/byte ↑ verification cost, ↑ memory for UTXO
Do we really want to find out via trial-and-error? What if strong miners don’t listen? ↓ fees -> ↑ (small) txs ->
SLIDE 29 Reflection on Governance
Rule setting Execution In Bitcoin Block validity rules prescribed by developers (according to some) Decentralized construction of the blockchain In BU Block validity rules dynamically decided by big miners In favor of big miners (if they are rational)
SLIDE 30 Response by BU Supporters
Our work “does not take miners’ interest in a healthy network into consideration”
Destruction of Coiledcoin Double spending on Krypton BU miners were planning to “attack” Bitcoin
- nce they would achieve 75%
Bribery attack need not be against the miner’s
interests Malicious miners exist … Including you Attacks can be profitable
SLIDE 31 Miners Changed Their Mind?
Our paper
SLIDE 32 We Are All Jon Snow
Maybe not:
Prove that the system is secure against 51%
attacker
Definition of decentralization, consensus Evaluation of consensus protocol security Design principles/elements, e.g., timestamp
Is Prescribed BVC indispensable? On consensus protocol