Abstract
Bitcoin-NG, introduced by Eyal et al. in NSDI 2016, divides a blockchain into key-blocks and micro-blocks to improve transaction process efficiency. In this paper, we propose a novel attack on Bitcoin-NG, called a micro-block chain truncation attack. Combined with key-block selfish and stubborn mining, and an eclipse attack, this attack is able to bring extra reward to attackers in Bitcoin-NG than in Bitcoin through a colluded strategy or a “destroyed if no stake” strategy. Our evaluation calculates the reward proportion of an attacker by these attacks on both Bitcoin-NG and Bitcoin, which helps us figure out whether Bitcoin-NG sacrifices security for efficiency promotion. We also evaluate 18 strategy combinations by traversing different values of computation power and practical truncation rate. In a setting with reasonable parameters, the optimal combined micro-block chain truncation attack obtains at most 5.28% more reward proportion in Bitcoin-NG than in Bitcoin.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Croman, K., et al.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106–125. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_8
Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: NSDI 2016, Santa Clara, CA, USA, 16–18 March 2016, pp. 45–59 (2016)
Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security 2015, Washington, D.C., USA, 12–14 August 2015, pp. 129–144 (2015)
Kokoris-Kogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: USENIX Security 2016, Austin, TX, USA, 10–12 August 2016, pp. 279–296 (2016)
Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: S&P 2018, San Francisco, California, USA, 21–23 May 2018, pp. 583–598 (2018)
Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016, pp. 17–30 (2016)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: EuroS&P 2016, Saarbrücken, Germany, 21–24 March 2016, pp. 305–320 (2016)
Vukolić, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdoğan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112–125. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39028-4_9
Yin, J., Wang, C., Zhang, Z., Liu, J.: Revisiting the incentive mechanism of bitcoin-NG. In: Susilo, W., Yang, G. (eds.) ACISP 2018. LNCS, vol. 10946, pp. 706–719. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93638-3_40
Yu, H., Zhang, Z., Liu, J.: Research on scaling technology of bitcoin blockchain. J. Comput. Res. Dev. 54(10), 2390–2403 (2017)
Acknowledgment
This work is partly supported by the National Key R&D Program of China (2017YFB1400700), National Cryptography Development Fund (MMJJ20180215), and CCF-NSFOCUS KunPeng Research Fund (2018013).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Z. et al. (2019). A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. In: Jang-Jaccard, J., Guo, F. (eds) Information Security and Privacy. ACISP 2019. Lecture Notes in Computer Science(), vol 11547. Springer, Cham. https://doi.org/10.1007/978-3-030-21548-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-21548-4_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21547-7
Online ISBN: 978-3-030-21548-4
eBook Packages: Computer ScienceComputer Science (R0)