Analyzing BU Mining Protocol Ren Zhang & Bart Preneel - - PowerPoint PPT Presentation

analyzing bu mining protocol
SMART_READER_LITE
LIVE PREVIEW

Analyzing BU Mining Protocol Ren Zhang & Bart Preneel - - PowerPoint PPT Presentation

On the Necessity of a Prescribed Block Validity Consensus: Analyzing BU Mining Protocol Ren Zhang & Bart Preneel ren.zhang@esat.kuleuven.be bart.preneel@esat.kuleuven.be What is A peer-to-peer network of public nodes Maintaining a


slide-1
SLIDE 1

On the Necessity of a Prescribed Block Validity Consensus: Analyzing BU Mining Protocol

Ren Zhang & Bart Preneel ren.zhang@esat.kuleuven.be bart.preneel@esat.kuleuven.be

slide-2
SLIDE 2
slide-3
SLIDE 3

What is

 A peer-to-peer network of public nodes  Maintaining a public decentralized ledger  Of transactions that transfer value (bitcoin)

among its users

 Integrity of the ledger is secured by miners

 Audit transactions  Use proof-of-work to arrive at consensus about

the transactions

 Successful miner receives new bitcoins as reward

slide-4
SLIDE 4

Bitcoin transactions

4

f f f

t1 t2 t3

block chain (200 GB)

nonce1 nonce2 nonce3 “small” “small” “small”

Block 1 Block 2 Block 3

In every block: new transactions, hash of the previous block, nonce, so that H(tx||prev_hash||nonce)<d

The Ledger: a Hash Chain of Blocks

slide-5
SLIDE 5

Prescribed Block Validity Consensus

A block is either valid or invalid to all miners

 Mine on the longest chain  or the first received block during a tie

Blockchain blocks ; orphaned blocks

time “orphaned” “fork”

BVC Resolve Forks? Rewards?

slide-6
SLIDE 6

(Once) Bitcoin Cannot Scale

Transactions per second 2000; 56000 in stress test 256000 (double eleven shopping festival, 2017) 7 in theory, < 4 in practice (1 MB block/10 min) People disagreed on how to fix it

slide-7
SLIDE 7

: no Prescribed Block Size

 “A tool to raise the blocksize limit without

splitting the network” “the blocksize limit should never have been a consensus rule in the first place”

 Miners decide the block size limit

collectively through a deliberative process

 Largest mining power support (40%) until

late June, 2017 What? How? Who?

slide-8
SLIDE 8

block size limit = EB

BU Mining Protocol

 Maximum acceptable block size (of a miner, local)  Length of a chain starting with a “> EB” block

before the miner accepts (local)

 Once AD is reached, opens SG and accepts large

blocks until 144 consecutive “≤ EB” blocks appear

≤ EB block > EB block block that the miner tries to mine time block size limit = 32MB

EB Acceptance Depth (in figure: 3) Sticky Gate

slide-9
SLIDE 9

BU Mining Protocol: Rationale

Economic factors can

 drive miners to the same EB  which is the actual network capacity  Attacks “cost the attacker far more than the

victim”

time

Emergent Consensus Security?

slide-10
SLIDE 10

Two Observations

 Block validity consensus (BVC) is not

necessary for security

 BVC will emerge as the system goes  BVC will be formed/driven by attacks  Supporters: compliant & profit-driven  Objectors: arbitrary

BU supporters’ different security claims Different incentive models

slide-11
SLIDE 11

What We Did: Compare BU and Bitcoin

Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven

slide-12
SLIDE 12

Is Consensus Necessary? (Is BU secure when BVC is absent?)

 For each incentive model, pick a most famous

attack, define the attacker’s goal/utility

 Evaluate effectiveness of these attacks in a

most simple “BVC absent” setting: two different EBs, one small attacker

 Compute the optimal strategy and the utility

  • f the attacker (math magic, see paper)

 Compare results with Bitcoin

Technical approach

slide-13
SLIDE 13

Is Consensus Necessary? (Is BU secure when BVC is absent?)

The setting:

 Three (groups of) miners Alice, Bob, Carol with mining power

share 𝛽, 𝛾, 𝛿; 𝛽 + 𝛾 + 𝛿 = 1, 𝛽 ≤ min{𝛾, 𝛿}

 Bob and Carol have the same AD=6, same block size = EBb<EBc  Alice may mine blocks of size EBb, EBc or >EBc, to strategically

split Bob and Carol to different chains Example: (mine EBc block)

(when Bob opens SG, mine >EBc block) time

slide-14
SLIDE 14

What We Did: Compare BU and Bitcoin

Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven

?

Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven

slide-15
SLIDE 15

Is Consensus Necessary?

Compliant & Profit-Driven Alice To maximize block reward share without deviating from the protocol (no selfish mining, no double-spending) Alice orphans two Bob’s blocks by mining an EBc block; relative block reward: 1/8 → 1/6 B time C A B B C C B Goal Typical execution (AD=3)

slide-16
SLIDE 16

BU is Not Incentive Compatible

Compliant & Profit-Driven Alice Results (optimal Strategy) Alice’s expected relative block reward

Alice 10%, Bob 45%, Carol 45%

slide-17
SLIDE 17

What We Did: Compare BU and Bitcoin

Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven

?

Not meaningful Non-Profit-Driven

slide-18
SLIDE 18

to maximize block reward + double-spending reward Alice bought something on B1, the transaction is accepted at A2; note that Alice mines a block A2

  • n Bob’s chain to help it reach 4* confirmations

*: to simplify the comparison

Is Consensus Necessary?

Non-Compliant & Profit-Driven Alice time C A1 B1 B C C B A2 C C C Goal Typical execution

slide-19
SLIDE 19

Double-Spending is Easier and More Profitable

Non-Compliant & Profit-Driven Alice Results (optimal Strategy, DS reward = block reward×10)

Alice’s expected mining+DS reward/10min (in block reward)

slide-20
SLIDE 20

What We Did: Compare BU and Bitcoin

Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven

?

slide-21
SLIDE 21

Is Consensus Necessary?

Non-Profit-Driven Alice to orphan as many Bob and Carol’s blocks as possible with the least number of Alice’s blocks Alice orphans two Carol’s blocks with only one block B time C A B B C C B Goal Typical execution B

slide-22
SLIDE 22

“Cost the Attacker Far More Than the Victim”

Non-Profit-Driven Alice Results (optimal strategy, 𝛽 = 1%)

Expected # of Bob and Carol’s blocks

  • rphaned by

each Alice’s block

slide-23
SLIDE 23

What We Did: Compare BU and Bitcoin

Incentive models Security claims BU is secure when BVC is absent BVC will emerge Compliant & Profit-Driven Non-Compliant & Profit-Driven Not meaningful Non-Profit-Driven

slide-24
SLIDE 24

Will BVC Emerge on the Run?

The block size increasing game: moving closer to reality

 Every miner has a maximum profitable block

size (MPB); if most blocks >MPB, the miner is forced to leave the game

 Miners with large MPBs might form a coalition

to raise the block size and kick others out; succeed if the coalition controls >50% mining power

 Rewards are shared among those who survive

till the end Definition

slide-25
SLIDE 25

BU May Damage Decentralization

The block size increasing game: moving closer to reality Termination State (MPB1<MPB2 <MPB3<MPB4) In most initial settings, the block size will be raised

slide-26
SLIDE 26

Results Summary

No, new attack vectors in BU weakens Bitcoin’s security within all three incentive models

 BVC will not emerge in most occasions  Even when a BVC is reached and all miners are

compliant, the BVC is very fragile

 Strong miners have both the incentive and the

ability to break BVC, raise the block size for higher reward share BU secure when BVC is absent? Will BVC emerge?

slide-27
SLIDE 27
slide-28
SLIDE 28

Larger Blocks Mean

 ↑ txs: hard to quantify  ↑ percentage of small txs: hard to quantify

For public nodes:

 ↑ bandwidth, ↑ bandwidth/byte  ↑ verification cost, ↑ memory for UTXO

Do we really want to find out via trial-and-error? What if strong miners don’t listen? ↓ fees -> ↑ (small) txs ->

slide-29
SLIDE 29

Reflection on Governance

Rule setting Execution In Bitcoin Block validity rules prescribed by developers (according to some) Decentralized construction of the blockchain In BU Block validity rules dynamically decided by big miners In favor of big miners (if they are rational)

slide-30
SLIDE 30

Response by BU Supporters

Our work “does not take miners’ interest in a healthy network into consideration”

 Destruction of Coiledcoin  Double spending on Krypton  BU miners were planning to “attack” Bitcoin

  • nce they would achieve 75%

 Bribery attack need not be against the miner’s

interests Malicious miners exist … Including you Attacks can be profitable

slide-31
SLIDE 31

Miners Changed Their Mind?

Our paper

slide-32
SLIDE 32

We Are All Jon Snow

Maybe not:

 Prove that the system is secure against 51%

attacker

 Definition of decentralization, consensus  Evaluation of consensus protocol security  Design principles/elements, e.g., timestamp

Is Prescribed BVC indispensable? On consensus protocol