Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3590003.3590008acmotherconferencesArticle/Chapter ViewAbstractPublication PagescacmlConference Proceedingsconference-collections
research-article

Optimized model analysis of blockchain PoW procotol under long delay attack

Published: 29 May 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Abstract:Proof of work(POW) is one of the most widely used consensus method of bitcoin. In some chains, because of the large number of users, the huge amount of information interaction data, equipment hardware failure or malicious attacks on some nodes may cause communication delay, All of these may engender forks on the blockchain resulting data lose. Therefore, whether the blockchain protocol can achieve sufficient security in the asynchronous network environment with long delay, so how to reduce fork and user's data loss caused by long delay attack are important issue related to blockchain protocol. In this study,we optimized the existing model and proposed TOD to describe the evolution state of the main chain accurately.

    References

    [1]
    Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Consulted, 2008.
    [2]
    Ittay Eyal and Emin G.Sirer.Majority is not enough:Bitcoin mining is vulnerable.In Financial Crupotography and Data Security,volume 8437 of Lecture Notes in Computer Science,Pages 436-454.Springer-Verlag.2014
    [3]
    Yonatan Sompolinsky and Aviv Zohar.Secure high-rate trancaction processing in bitcoin.In Financial Cryptography and Data Security,volume 8975 of Lecture Notes in Computer Science,pages 507-527
    [4]
    Trom J. Cuckoo cycle: a memory bound graph-theoretic proof-of-work[C]//International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2015: 49-62.
    [5]
    Arthur Gervais,Ghassan O.Karame,Karl Wust,Vasileios Glykantzis,Hubert Ritzdorf, and Srdjan Capkun.On the security and performance of proof of work blockchains.In ACM SIGSAC Conference on Computer and Communications Security,Press,2016.
    [6]
    Bastiaan M. Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin.2015.
    [7]
    Nayak K, Kumar S, Miller A, Stubborn mining: generalizing selfifish mining and combining with an eclipse attack. In: Proceedings of IEEE European Symposium on Security and Privacy, 2016. 305–320.
    [8]
    Aggelos Kiayas and Giorgos Panagiotakos.Speed-Security Tradeoffs inBlockchain Protocols.In IACR ePrint Archive Report:2015/1019.2016.
    [9]
    Juan Garay,Aggelos Kiayias.and Nikos Leonardos. The bitcoin backbone protocol with chains of variable difficulty. In Advances in Cryptology - CRYP.TO 2017,volume 10401 of Lecture Notes in Computer Science,pages 291-323.Springer-Verlag, 2017.
    [10]
    Pass R, Seeman L, shelat A. Analysis of the blockchain protocol in asynchronous networks. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2017. 643–673.
    [11]
    Wei P W, Yuan Q, Zheng Y L. Security of the blockchain protocol against long delay attack. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2018. 250–275.
    [12]
    Fork Rate-based Analysis of the Longest Chain Growth Time Interval of a PoW Blockchain, International Conference on Blockchain (Blockchain), 2019 IEEE DOI 10.1109/Blockchain.2019.00040.
    [13]
    Delay Analysis of Consensus Communication for Blockchain-Based Applications Using Network Calculus .IEEE Wireless Communications Letters.DOI 10.1109/LWC.2022.3183197.
    [14]
    Moustapha BA.The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain.In:Digital Communications and NetworksVolume 6, Issue 2. 2020. PP 157-166.
    [15]
    Ziyu Zhou, Zongyang Zhang, Jianwei Liu .Research Method of Nakamoto Consensus Security Properties.SCIENTIA SINICA Informationis. 2022.53(05)

    Cited By

    View all

    Index Terms

    1. Optimized model analysis of blockchain PoW procotol under long delay attack
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          CACML '23: Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
          March 2023
          598 pages
          ISBN:9781450399449
          DOI:10.1145/3590003
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 29 May 2023

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Blockchain;delay
          2. bitcoin
          3. security

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Funding Sources

          Conference

          CACML 2023

          Acceptance Rates

          CACML '23 Paper Acceptance Rate 93 of 241 submissions, 39%;
          Overall Acceptance Rate 93 of 241 submissions, 39%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 26
            Total Downloads
          • Downloads (Last 12 months)22
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 27 Jul 2024

          Other Metrics

          Citations

          Cited By

          View all

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media