Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3558535.3559773acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaftConference Proceedingsconference-collections
research-article
Open access

Parallel Proof-of-Work with Concrete Bounds

Published: 05 July 2023 Publication History

Abstract

Authorization is challenging in distributed systems that cannot rely on the identification of nodes. Proof-of-work offers an alternative gate-keeping mechanism, but its probabilistic nature is incompatible with conventional security definitions. Recent related work establishes concrete bounds for the failure probability of Bitcoin's sequential proof-of-work mechanism. We propose a new family of state replication protocols that use parallel proof-of-work. Our bottom-up design from an agreement sub-protocol allows us to give concrete bounds for the failure probability in adversarial synchronous networks. State updates can be sufficiently secure to support commits after one block, removing the risk of double-spending in many applications. We offer guidance on the optimal choice of parameters for a wide range of network and attacker assumptions. Simulations show that the proposed construction is robust even against partial violations of our design assumptions.

References

[1]
Ittai Abraham, T.-H. Hubert Chan, Danny Dolev, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. 2019. Communication Complexity of Byzantine Agreement, Revisited. In Symposium on Principles of Distributed Computing. ACM, 317--326.
[2]
Ittai Abraham and Dahlia Malkhi. 2017. The Blockchain Consensus Layer and BFT. Bulletin of the EATCS 123 (2017).
[3]
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. 2017. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus. arXiv:1612.02916 [cs]
[4]
Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, and Pramod Viswanath. 2019. Prism: Deconstructing the Blockchain to Approach Physical Limits. In Conference on Computer and Communications Security. ACM, 585--602.
[5]
Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. 2019. SoK: Consensus in the Age of Blockchains. In Conference on Advances in Financial Technologies. ACM, 183--198.
[6]
Mathieu Baudet, George Danezis, and Alberto Sonnino. 2020. FastPay: High-Performance Byzantine Fault Tolerant Settlement. In Conference on Advances in Financial Technologies. ACM, 163--177.
[7]
Juan Benet, David Dalrymple, and Nicola Greco. 2017. Proof of Replication. Technical Report. Protocol Labs.
[8]
George Bissias. 2020. Radium: Improving Dynamic PoW Targeting. In Workshop on Cryptocurrencies and Blockchain Technology (Lecture Notes in Computer Science, Vol. 12484), Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, and Jordi Herrera-Joancomarti (Eds.). Springer, 374--389.
[9]
George Bissias, Rainer Böhme, David Thibodeau, and Brian Levine. 2022. Pricing Security in Proof-of-Work Systems. In Workshop on the Economics of Information Security.
[10]
George Bissias and Brian N Levine. 2020. Bobtail: Improved Blockchain Security with Low-Variance Mining. In Network and Distributed Systems Security Symposium. Internet Society.
[11]
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In Symposium on Security and Privacy. IEEE, 104--121.
[12]
Christian Cachin and Marko Vukolic. 2017. Blockchain Consensus Protocols in the Wild (Keynote Talk). In Symposium on Distributed Computing (Leibniz International Proceedings in Informatics, Vol. 91), Andréa W. Richa (Ed.). 1:1--1:16.
[13]
Miguel Castro and Barbara Liskov. 2002. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computer Systems 20, 4 (2002), 398--461.
[14]
Jing Chen and Silvio Micali. 2019. Algorand: A Secure and Efficient Distributed Ledger. Theoretical Computer Science 777 (2019), 155--183.
[15]
Mauro Conti, E. Sandeep Kumar, Chhagan Lal, and Sushmita Ruj. Fourthquarter 2018. A Survey on Security and Privacy Issues of Bitcoin. IEEE Communications Surveys Tutorials 20, 4 (Fourthquarter 2018), 3416--3452.
[16]
Phil Daian, Rafael Pass, and Elaine Shi. 2019. Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. In Financial Cryptography and Data Security (Lecture Notes in Computer Science, Vol. 11598), Ian Goldberg and Tyler Moore (Eds.). Springer, 23--41.
[17]
Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2018. Ouroboros Praos: An Adaptively-Secure, Semi-Synchronous Proof-of-Stake Blockchain. In Advances in Cryptology - EUROCRYPT 2018 (Lecture Notes in Computer Science, Vol. 10821), Jesper Buus Nielsen and Vincent Rijmen (Eds.). Springer, 66--98.
[18]
Christian Decker, Jochen Seidel, and Roger Wattenhofer. 2016. Bitcoin Meets Strong Consistency. In International Conference on Distributed Computing and Networking. ACM, 1--10.
[19]
Sergi Delgado-Segura, Surya Bakshi, Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee. 2019. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. In Financial Cryptography and Data Security (Lecture Notes in Computer Science, Vol. 11598), Ian Goldberg and Tyler Moore (Eds.). Springer, 550--566.
[20]
Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, and Ofer Zeitouni. 2020. Everything Is a Race and Nakamoto Always Wins. In Conference on Computer and Communications Security. ACM, 859--878.
[21]
Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. 1988. Consensus in the Presence of Partial Synchrony. J. ACM 35, 2 (1988), 288--323.
[22]
Cynthia Dwork and Moni Naor. 1993. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology - CRYPTO '92 (Lecture Notes in Computer Science, Vol. 740), Ernest F. Brickell (Ed.). Springer, 139--147.
[23]
Attah Elikem. 2019. Five Most Prolific 51% Attacks in Crypto: Verge, Ethereum Classic, Bitcoin Gold, Feathercoin, Vertcoin. https://cryptoslate.com/prolific-51-attacks-crypto-verge-ethereum-classic-bitcoin-gold-feathercoin-vertcoin/.
[24]
Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In Symposium on Networked Systems Design and Implementation. USENIX, 45--59.
[25]
Ittay Eyal and Emin Gün Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Financial Cryptography and Data Security (Lecture Notes in Computer Science, Vol. 8437), Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer, 436--454.
[26]
Matthias Fitzi, Peter Gaži, Aggelos Kiayias, and Alexander Russell. 2020. Ledger Combiners for Fast Settlement. In Theory of Cryptography (Lecture Notes in Computer Science, Vol. 12550), Rafael Pass and Krzysztof Pietrzak (Eds.). Springer, 322--352.
[27]
Bryan Ford and Rainer Böhme. 2019. Rationality Is Self-Defeating in Permission-less Systems. arXiv:1910.08820 [cs]
[28]
Daniel Fullmer and A. Stephen Morse. 2018. Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains. In Conference on Decision and Control. IEEE, 5988--5992.
[29]
Juan Garay and Aggelos Kiayias. 2020. SoK: A Consensus Taxonomy in the Blockchain Era. In Topics in Cryptology - CT-RSA 2020 (Lecture Notes in Computer Science, Vol. 12006), Stanislaw Jarecki (Ed.). Springer, 284--318.
[30]
Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In Advances in Cryptology - EUROCRYPT 2015 (Lecture Notes in Computer Science, Vol. 9057), Elisabeth Oswald and Marc Fischlin (Eds.). Springer, 281--310.
[31]
Hector Garcia-Molina. 1982. Elections in a Distributed Computing System. IEEE Trans. Comput. C-31, 1 (1982), 48--59.
[32]
Peter Gaži, Aggelos Kiayias, and Alexander Russell. 2020. Tight Consistency Bounds for Bitcoin. In Conference on Computer and Communications Security. ACM, 819--838.
[33]
Peter Gaži, Ling Ren, and Alexander Russell. 2021. Practical Settlement Bounds for Proof-of-Work Blockchains. Cryptology ePrint 805. IACR.
[34]
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. In Conference on Computer and Communications Security. ACM, 3--16.
[35]
Seth Gilbert and Nancy Lynch. 2002. Brewer's Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services. ACM SIGACT News 33, 2 (2002), 51--59.
[36]
Rachid Guerraoui, Petr Kuznetsov, Matteo Monti, Matej Pavlovič, and Dragos-Adrian Seredinschi. 2019. The Consensus Number of a Cryptocurrency. In Symposium on Principles of Distributed Computing. ACM, 307--316.
[37]
Dongning Guo and Ling Ren. 2022. Bitcoin's Latency-Security Analysis Made Simple. In Conference on Advances in Financial Technologies. ACM.
[38]
Amir Haleem, Andrew Allen, Andrew Thompson, Marc Nijdam, and Rahul Garg. 2018. Helium: A Decentralized Wireless Network. Technical Report. Helium Systems. 20 pages.
[39]
Thomas M. Harding. 2020. Real-Time Block Rate Targeting. Ledger 5 (2020).
[40]
Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, and Ari Juels. 2021. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. In Network and Distributed Systems Security Symposium. Internet Society.
[41]
Geir Hovland and Jan Kucera. 2017. Nonlinear Feedback Control and Stability Analysis of a Proof-of-Work Blockchain. Modeling, Identification and Control 38, 4 (2017), 157--168.
[42]
Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-Spending Fast Payments in Bitcoin. In Conference on Computer and Communications Security. ACM, 906--917.
[43]
Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography (second ed.). CRC Press.
[44]
Patrik Keller. 2021. Protocol implementation and network simulator. https://github.com/pkel/hotpow/tree/ppow.
[45]
Lucianna Kiffer, Rajmohan Rajaraman, and Abhi Shelat. 2018. A Better Method to Analyze Blockchain Consistency. In Conference on Computer and Communications Security. ACM, 729--744.
[46]
Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In Security Symposium. USENIX, 279--296.
[47]
Daniel Kraft. 2016. Difficulty Control for Blockchain-Based Consensus Systems. Peer-to-Peer Networking and Applications 9, 2 (2016), 397--413.
[48]
Leslie Lamport. 1978. Time, Clocks, and the Ordering of Events in a Distributed System. Commun. ACM 21, 7 (1978), 558--565.
[49]
Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems 4, 3 (1982), 382--401.
[50]
Jing Li, Dongning Guo, and Ling Ren. 2021. Close Latency-Security Trade-off for the Nakamoto Consensus. In Conference on Advances in Financial Technologies. ACM, 100--113.
[51]
Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, and Bernhard Haslhofer. 2020. All That Glitters Is Not Bitcoin - Unveiling the Centralized Nature of the BTC (IP) Network. In Network Operations and Management Symposium. IEEE.
[52]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Technical Report.
[53]
Arvind Narayanan and Jeremy Clark. 2017. Bitcoin's Academic Pedigree. Commun. ACM 60, 12 (2017), 36--45.
[54]
Fernando Nogueira. 2021. Bayesian Optimization: Open source constrained global optimization tool for Python. https://github.com/fmfn/BayesianOptimization.
[55]
Diego Ongaro and John Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In Annual Technical Conference. USENIX, 305--319.
[56]
Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the Blockchain Protocol in Asynchronous Networks. In Advances in Cryptology - EUROCRYPT 2017 (Lecture Notes in Computer Science, Vol. 10211), Jean-Sébastien Coron and Jesper Buus Nielsen (Eds.). Springer, 643--673.
[57]
Rafael Pass and Elaine Shi. 2017. Hybrid Consensus: Efficient Consensus in the Permissionless Model. In International Symposium on Distributed Computing (Leibniz International Proceedings in Informatics, Vol. 91), Andréa W. Richa (Ed.). 39:1--39:16.
[58]
Rafael Pass and Elaine Shi. 2018. Thunderella: Blockchains with Optimistic Instant Confirmation. In Advances in Cryptology - EUROCRYPT 2018 (Lecture Notes in Computer Science, Vol. 10821), Jesper Buus Nielsen and Vincent Rijmen (Eds.). Springer, 3--33.
[59]
Marshall Pease, Robert Shostak, and Leslie Lamport. 1980. Reaching Agreement in the Presence of Faults. J. ACM 27, 2 (1980), 228--234.
[60]
Ling Ren. 2019. Analysis of Nakamoto Consensus. Cryptology ePrint 943. IACR.
[61]
Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security (Lecture Notes in Computer Science, Vol. 9603), Jens Grossklags and Bart Preneel (Eds.). Springer, 515--532.
[62]
Fred B. Schneider. 1990. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. Comput. Surveys 22, 4 (1990), 299--319.
[63]
Jakub Sliwinski and Roger Wattenhofer. 2021. Asynchronous Proof-of-Stake. In Stabilization, Safety, and Security of Distributed Systems (Lecture Notes in Computer Science, Vol. 13046), Colette Johnen, Elad Michael Schiller, and Stefan Schmid (Eds.). Springer, 194--208.
[64]
Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. Cryptology ePrint 1159. IACR.
[65]
Yonatan Sompolinsky, Shai Wyborski, and Aviv Zohar. 2021. Phantom Ghostdag: A Scalable Generalization of Nakamoto Consensus. In Conference on Advances in Financial Technologies. ACM, 57--70.
[66]
Yonatan Sompolinsky and Aviv Zohar. 2015. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security (Lecture Notes in Computer Science, Vol. 8975), Rainer Böhme and Tatsuaki Okamoto (Eds.). Springer, 507--527.
[67]
Volker Strassen. 1969. Gaussian Elimination Is Not Optimal. Numer. Math. 13, 4 (1969), 354--356.
[68]
Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. HotStuff: BFT Consensus with Linearity and Responsiveness. In Symposium on Principles of Distributed Computing. ACM, 347--356.
[69]
H. Yu, I. Nikolic, R. Hou, and P. Saxena. 2020. OHIE: Blockchain Scaling Made Simple. In Symposium on Security and Privacy. IEEE, 112--127.
[70]
Ren Zhang and Bart Preneel. 2019. Lay down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security. In Symposium on Security and Privacy. IEEE, 1190--1207.
[71]
Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, and Bart Preneel. 2022. NC-max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus. In Network and Distributed Systems Security Symposium. Internet Society.
[72]
Roi Bar Zur, Ittay Eyal, and Aviv Tamar. 2020. Efficient MDP Analysis for Selfish-Mining in Blockchains. In Conference on Advances in Financial Technologies. ACM, 113--131.

Cited By

View all
  • (2023)Verification of cryptocurrency consensus protocols: reenterable colored Petri net model designInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2023.227345239:1(32-50)Online publication date: 24-Oct-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial Technologies
September 2022
330 pages
ISBN:9781450398619
DOI:10.1145/3558535
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 July 2023

Check for updates

Qualifiers

  • Research-article

Conference

AFT '22

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)127
  • Downloads (Last 6 weeks)17
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Verification of cryptocurrency consensus protocols: reenterable colored Petri net model designInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2023.227345239:1(32-50)Online publication date: 24-Oct-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media