Skip to main content

A Combined Micro-block Chain Truncation Attack on Bitcoin-NG

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11547))

Abstract

Bitcoin-NG, introduced by Eyal et al. in NSDI 2016, divides a blockchain into key-blocks and micro-blocks to improve transaction process efficiency. In this paper, we propose a novel attack on Bitcoin-NG, called a micro-block chain truncation attack. Combined with key-block selfish and stubborn mining, and an eclipse attack, this attack is able to bring extra reward to attackers in Bitcoin-NG than in Bitcoin through a colluded strategy or a “destroyed if no stake” strategy. Our evaluation calculates the reward proportion of an attacker by these attacks on both Bitcoin-NG and Bitcoin, which helps us figure out whether Bitcoin-NG sacrifices security for efficiency promotion. We also evaluate 18 strategy combinations by traversing different values of computation power and practical truncation rate. In a setting with reasonable parameters, the optimal combined micro-block chain truncation attack obtains at most 5.28% more reward proportion in Bitcoin-NG than in Bitcoin.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.techinasia.com/china-singles-day-2017-record-spending.

  2. 2.

    https://www.blockchain.com/en/pools.

References

  1. Croman, K., et al.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106–125. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_8

    Chapter  Google Scholar 

  2. Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: NSDI 2016, Santa Clara, CA, USA, 16–18 March 2016, pp. 45–59 (2016)

    Google Scholar 

  3. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28

    Chapter  Google Scholar 

  4. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security 2015, Washington, D.C., USA, 12–14 August 2015, pp. 129–144 (2015)

    Google Scholar 

  5. Kokoris-Kogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: USENIX Security 2016, Austin, TX, USA, 10–12 August 2016, pp. 279–296 (2016)

    Google Scholar 

  6. Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: S&P 2018, San Francisco, California, USA, 21–23 May 2018, pp. 583–598 (2018)

    Google Scholar 

  7. Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016, pp. 17–30 (2016)

    Google Scholar 

  8. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  9. Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: EuroS&P 2016, Saarbrücken, Germany, 21–24 March 2016, pp. 305–320 (2016)

    Google Scholar 

  10. Vukolić, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdoğan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112–125. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39028-4_9

    Chapter  Google Scholar 

  11. Yin, J., Wang, C., Zhang, Z., Liu, J.: Revisiting the incentive mechanism of bitcoin-NG. In: Susilo, W., Yang, G. (eds.) ACISP 2018. LNCS, vol. 10946, pp. 706–719. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93638-3_40

    Chapter  Google Scholar 

  12. Yu, H., Zhang, Z., Liu, J.: Research on scaling technology of bitcoin blockchain. J. Comput. Res. Dev. 54(10), 2390–2403 (2017)

    Google Scholar 

Download references

Acknowledgment

This work is partly supported by the National Key R&D Program of China (2017YFB1400700), National Cryptography Development Fund (MMJJ20180215), and CCF-NSFOCUS KunPeng Research Fund (2018013).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zongyang Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Z. et al. (2019). A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. In: Jang-Jaccard, J., Guo, F. (eds) Information Security and Privacy. ACISP 2019. Lecture Notes in Computer Science(), vol 11547. Springer, Cham. https://doi.org/10.1007/978-3-030-21548-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21548-4_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21547-7

  • Online ISBN: 978-3-030-21548-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics