Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3590003.3590008acmotherconferencesArticle/Chapter ViewAbstractPublication PagescacmlConference Proceedingsconference-collections
research-article

Optimized model analysis of blockchain PoW procotol under long delay attack

Published: 29 May 2023 Publication History

Abstract

Abstract:Proof of work(POW) is one of the most widely used consensus method of bitcoin. In some chains, because of the large number of users, the huge amount of information interaction data, equipment hardware failure or malicious attacks on some nodes may cause communication delay, All of these may engender forks on the blockchain resulting data lose. Therefore, whether the blockchain protocol can achieve sufficient security in the asynchronous network environment with long delay, so how to reduce fork and user's data loss caused by long delay attack are important issue related to blockchain protocol. In this study,we optimized the existing model and proposed TOD to describe the evolution state of the main chain accurately.

References

[1]
Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Consulted, 2008.
[2]
Ittay Eyal and Emin G.Sirer.Majority is not enough:Bitcoin mining is vulnerable.In Financial Crupotography and Data Security,volume 8437 of Lecture Notes in Computer Science,Pages 436-454.Springer-Verlag.2014
[3]
Yonatan Sompolinsky and Aviv Zohar.Secure high-rate trancaction processing in bitcoin.In Financial Cryptography and Data Security,volume 8975 of Lecture Notes in Computer Science,pages 507-527
[4]
Trom J. Cuckoo cycle: a memory bound graph-theoretic proof-of-work[C]//International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2015: 49-62.
[5]
Arthur Gervais,Ghassan O.Karame,Karl Wust,Vasileios Glykantzis,Hubert Ritzdorf, and Srdjan Capkun.On the security and performance of proof of work blockchains.In ACM SIGSAC Conference on Computer and Communications Security,Press,2016.
[6]
Bastiaan M. Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin.2015.
[7]
Nayak K, Kumar S, Miller A, Stubborn mining: generalizing selfifish mining and combining with an eclipse attack. In: Proceedings of IEEE European Symposium on Security and Privacy, 2016. 305–320.
[8]
Aggelos Kiayas and Giorgos Panagiotakos.Speed-Security Tradeoffs inBlockchain Protocols.In IACR ePrint Archive Report:2015/1019.2016.
[9]
Juan Garay,Aggelos Kiayias.and Nikos Leonardos. The bitcoin backbone protocol with chains of variable difficulty. In Advances in Cryptology - CRYP.TO 2017,volume 10401 of Lecture Notes in Computer Science,pages 291-323.Springer-Verlag, 2017.
[10]
Pass R, Seeman L, shelat A. Analysis of the blockchain protocol in asynchronous networks. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2017. 643–673.
[11]
Wei P W, Yuan Q, Zheng Y L. Security of the blockchain protocol against long delay attack. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2018. 250–275.
[12]
Fork Rate-based Analysis of the Longest Chain Growth Time Interval of a PoW Blockchain, International Conference on Blockchain (Blockchain), 2019 IEEE DOI 10.1109/Blockchain.2019.00040.
[13]
Delay Analysis of Consensus Communication for Blockchain-Based Applications Using Network Calculus .IEEE Wireless Communications Letters.DOI 10.1109/LWC.2022.3183197.
[14]
Moustapha BA.The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain.In:Digital Communications and NetworksVolume 6, Issue 2. 2020. PP 157-166.
[15]
Ziyu Zhou, Zongyang Zhang, Jianwei Liu .Research Method of Nakamoto Consensus Security Properties.SCIENTIA SINICA Informationis. 2022.53(05)

Cited By

View all

Index Terms

  1. Optimized model analysis of blockchain PoW procotol under long delay attack
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        CACML '23: Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
        March 2023
        598 pages
        ISBN:9781450399449
        DOI:10.1145/3590003
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 29 May 2023

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Blockchain;delay
        2. bitcoin
        3. security

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        CACML 2023

        Acceptance Rates

        CACML '23 Paper Acceptance Rate 93 of 241 submissions, 39%;
        Overall Acceptance Rate 93 of 241 submissions, 39%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 27
          Total Downloads
        • Downloads (Last 12 months)22
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 30 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media