File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers

TitleAnalysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
Authors
Keywordsbitcoin
blockchain
consensus protocol
delay
random oracle
Issue Date2020
Citation
Science China Information Sciences, 2020, v. 63, n. 3, article no. 130104 How to Cite?
AbstractBitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.
Persistent Identifierhttp://hdl.handle.net/10722/312061
ISSN
2021 Impact Factor: 7.275
2020 SCImago Journal Rankings: 0.557
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYuan, Quan-
dc.contributor.authorWei, Puwen-
dc.contributor.authorJia, Keting-
dc.contributor.authorXue, Haiyang-
dc.date.accessioned2022-04-06T04:32:05Z-
dc.date.available2022-04-06T04:32:05Z-
dc.date.issued2020-
dc.identifier.citationScience China Information Sciences, 2020, v. 63, n. 3, article no. 130104-
dc.identifier.issn1674-733X-
dc.identifier.urihttp://hdl.handle.net/10722/312061-
dc.description.abstractBitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.-
dc.languageeng-
dc.relation.ispartofScience China Information Sciences-
dc.subjectbitcoin-
dc.subjectblockchain-
dc.subjectconsensus protocol-
dc.subjectdelay-
dc.subjectrandom oracle-
dc.titleAnalysis of blockchain protocol against static adversarial miners corrupted by long delay attackers-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/s11432-019-9916-5-
dc.identifier.scopuseid_2-s2.0-85079572347-
dc.identifier.volume63-
dc.identifier.issue3-
dc.identifier.spagearticle no. 130104-
dc.identifier.epagearticle no. 130104-
dc.identifier.eissn1869-1919-
dc.identifier.isiWOS:000514919900001-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats