Skip to main content

Revisiting the Incentive Mechanism of Bitcoin-NG

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10946))

Included in the following conference series:

Abstract

Recently, due to the inherent restriction of Bitcoin design, the throughput of Bitcoin blockchain protocol fails to meet the daily needs, leaving the scalability technology in dire need to provide better efficiency. To address this issue, numerous solutions have been proposed, including blocksize expansion, off-chain transactions and block structure modification. Among them, Bitcoin-NG, a scalable blockchain protocol introduced by Eyal et al. in USENIX 2016, improves scalability while simultaneously avoiding the deterioration of other metrics in the network. Bitcoin-NG has two types of blocks: key blocks for leader election and microblocks that contain ledger entries. Eyal et al. assert that the proportion of fee allocation of transactions in microblocks is bounded by miners’ mining power ratio out of all mining power in the system. Specifically, the upper bound is determined by the incentive sub-mechanism of longest chain extension, while the lower bound determined by the incentive sub-mechanism of transaction inclusion. We revisit the incentive mechanism of Bitcoin-NG. We point out that Eyal et al. neglect on the calculation of lower bound and manifest the over-simplification in the analysis of upper bound in detail. After that, the correct incentive mechanism is derived. Finally, we put forward an optimal proportion of transaction fee distribution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Andresen, G.: Increase maximum block size (bip 101) (2015). https://github.com/bitcoin/bips/blob/master/bip-0101.mediawiki

  2. Antonopoulos, A.M.: Mastering Bitcoin: Programming the Open Blockchain. O’Reilly Media Inc., Sebastopol (2017)

    Google Scholar 

  3. Croman, K., et al.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106–125. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_8

    Chapter  Google Scholar 

  4. Eyal, I., Gencer, A.E., Sirer, E.G., Van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016, pp. 45–59 (2016)

    Google Scholar 

  5. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28

    Chapter  Google Scholar 

  6. Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 279–296 (2016)

    Google Scholar 

  7. Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger. In: 39th IEEE Symposium on Security and Privacy. IEEE (2018)

    Google Scholar 

  8. Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 17–30. ACM (2016)

    Google Scholar 

  9. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  10. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)

    MATH  Google Scholar 

  11. Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 305–320. IEEE (2016)

    Google Scholar 

  12. Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2015). https://lightning.network/lightning-network-paper.pdf

  13. Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 507–527. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_32

    Chapter  Google Scholar 

  14. Syta, E., Tamas, I., Visher, D., Wolinsky, D.I., Jovanovic, P., Gasser, L., Gailly, N., Khoffi, I., Ford, B.: Keeping authorities “honest or bust” with decentralized witness cosigning. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 526–545. IEEE (2016)

    Google Scholar 

Download references

Acknowledgements

The author thank Ying Gao and Feng Wang for their valuable comments on earlier versions of this manuscript. Zongyang Zhang is supported by National Key R&D Program of China (2017YFB1400700), by Beijing Natural Science Foundation (4182033), by the fund of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, under grant No. 2017-MS-02, and the fund of the Beihang Jinhua Beidou Application Research Institute under grant No. BARI1702.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zongyang Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yin, J., Wang, C., Zhang, Z., Liu, J. (2018). Revisiting the Incentive Mechanism of Bitcoin-NG. In: Susilo, W., Yang, G. (eds) Information Security and Privacy. ACISP 2018. Lecture Notes in Computer Science(), vol 10946. Springer, Cham. https://doi.org/10.1007/978-3-319-93638-3_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93638-3_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93637-6

  • Online ISBN: 978-3-319-93638-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics