Skip to main content

Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency

  • Chapter
  • First Online:
The Economics of Information Security and Privacy

Abstract

Proof-of-Work (PoW), a well-known principle to ration resource access in client-server relations, is about to experience a renaissance as a mechanism to protect the integrity of a global state in distributed transaction systems under decentralized control. Most prominently, the Bitcoin cryptographic currency protocol leverages PoW to (1) prevent double spending and (2) establish scarcity, two essential properties of any electronic currency. This chapter asks the important question whether this approach is generally viable. Citing actual data, it provides a first cut of an answer by estimating the resource requirements, in terms of operating cost and ecological footprint, of a suitably dimensioned PoW infrastructure and comparing them to three attack scenarios. The analysis is inspired by Bitcoin, but generalizes to potential successors, which fix Bitcoin’s technical and economic teething troubles discussed in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Ultimately the E-Gold company pled guilty to money laundering and to operating an unlicensed money-transmitting business [39] and was shut down immediately.

  2. 2.

    All assumptions of the analysis are debatable. Therefore we provide the spreadsheet of our estimation online and invite readers to come up with their refined scenarios. It can be accessed via: http://dl.dropbox.com/u/1168860/DoesProofOfWorkPayOff.xlsx

  3. 3.

    This is specific to the Bitcoin system as it currently is. It is also conceivable to design PoW functions that are better aligned with the optimization criteria of microprocessor architectures.

  4. 4.

    The list provided by the IEA (2012) includes an item “hydro” which consists to a large extent of energy produced by pumped storage plants. As electricity stored in these plants has been generated by other means, we exclude this item. We further exclude the items “waste” and “other sources” as their impact on the result is negligible.

  5. 5.

    For some carriers, Lübbert [31] provides minimum and maximum estimates for CO2 emissions. We use their averages in Fig. 7.3.

References

  1. Babaioff, M., et al.: On Bitcoin and red balloons. In: 13th ACM Conference on Electronic Commerce, Valencia (2011)

    Google Scholar 

  2. Bank for International Settlements: Statistics on payment, clearing and settlement systems in the CPSS countries – figures for 2010. http://www.bis.org/publ/cpss99.htm (2011)

  3. Barber, S., et al.: Bitter to better – how to make Bitcoin a better currency. In: 16th International Conference on Financial Cryptography and Data Security, Bonaire (2012)

    Google Scholar 

  4. Barok, D.: Bitcoin: censorship-resistant currency and domain system for the people. http://pzwart3.wdka.hro.nl/mediawiki/images/6/64/Barok.bitcoin.pdf (2011)

  5. Belady, C.L.: In the data center, power and cooling costs more than the IT equipment it supports. Electron. Cool. 13(1), 24–27 (2007)

    Google Scholar 

  6. Bitcoinwatch.com: Bitcoinwatch. http://bitcoinwatch.com/

  7. Boincstats.com: BOINC combined project statistics. http://boincstats.com/stats/project_graph.php?pr=bo

  8. Bradford, T., Hayashi, F.: Developments in interchange fees in the United States and abroad. http://www.kc.frb.org/Publicat/PSR/Briefings/PSR-BriefingApr08.pdf (2008)

  9. Chaum, D., et al.: Untraceable electronic cash. In: Goldwasser, S. (ed.) Advances in Cryptology – CRYPTO’88, Santa Barbara, pp. 319–327. Springer, New York (1988)

    Google Scholar 

  10. Chirgwin, R.: Bitcoin collapses on malicious trade – Mt.Gox scrambling to raise the Titanic. http://www.theregister.co.uk/2011/06/19/bitcoin_values_collapse_again/

  11. Clark, J., Essex, A.: CommitCoin: carbon dating commitments with Bitcoin. In: 16th International Conference on Financial Cryptography and Data Security, Bonaire (2012)

    Google Scholar 

  12. Dai, W.: b-money. http://www.weidai.com/bmoney.txt (1998)

  13. Doherty, S.: All your Bitcoins are ours – Symantec connect community. http://www.symantec.com/connect/blogs/all-your-bitcoins-are-ours

  14. Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) Advances in Cryptology – CRYPTO’92, Santa Barbara, pp. 139–147. Springer, New York (1992)

    Google Scholar 

  15. EIA: Electric power monthly. http://www.eia.gov/electricity/monthly/

  16. Enright, B.: Exposing stormworm. http://www.scribd.com/doc/2674816/exposing-storm (2007)

  17. EURO Kartensysteme GmbH: Händlerbedingungen – Bedingungen für die Teilnahme am electronic cash-System der deutschen Kreditwirtschaft. http://www.electronic-cash.de/media/pdf/haendlerbedingungen.pdf (2008)

  18. Europe’s Energy Portal: Retail (end-user) energy prices for households. http://www.energy.eu/#domestic

  19. Facebook: Fact sheet. http://newsroom.fb.com/content/default.aspx?NewsAreaId=22

  20. Franklin, M.K., Malkhi, D.: Auditable metering with lightweight security. In: 1st International Conference on Financial Cryptography, Anguilla, pp. 151–160 (1997)

    Google Scholar 

  21. Green500.org: Green500. http://www.green500.org/

  22. Grigg, I.: Financial cryptography: Bitcoin – the bad news. http://financialcryptography.com/mt/archives/001327.html

  23. Grinberg, R.: Bitcoin: an innovative alternative digital currency. Hastings Sci. Technol. Law J. 4, 160–208 (2011)

    Google Scholar 

  24. IEA: CO2 Emissions from Fuel Combustion. http://www.iea.org/media/statistics/CO2highlights.pdf (2011). Last Access: Oct 2012

  25. IEA: Electricity/heat in the world in 2009. http://www.iea.org/stats/electricitydata.asp?COUNTRY_CODE=29

  26. Kaminsky, D.: Some thoughts on Bitcoins. http://www.slideshare.net/dakami/bitcoin-8776098

  27. Krugman, P.: Golden cyberfetters. http://krugman.blogs.nytimes.com/2011/09/07/golden-cyberfetters/

  28. Laurie, B., Clayton, R.: Proof-of-Work proves not to work. In: 3rd Annual Workshop on the Economics of Information Security, Minnesota (2004)

    Google Scholar 

  29. Levy, S.: E-Money (That’s what I want). http://www.wired.com/wired/archive/2.12/emoney.html

  30. Liu, D., Camp, L.J.: Proof of work can work. In: 5th Annual Workshop on the Economics of Information Security, Cambridge (2006)

    Google Scholar 

  31. Lübbert, D.: CO2-Bilanzen verschiedener Energieträger im Vergleich – Zur Klimafreundlichkeit von fossilen Energien, Kernenergie und erneuerbaren Energien (2007)

    Google Scholar 

  32. McMillan, R.: Storm worm now just a squall. http://www.pcworld.com/article/138721/storm_worm_now_just_a_squall.html (2007)

  33. Mosenergosbyt: Electricity tariffs for the population of the city of Moscow in 2012. http://www.mosenergosbyt.ru/portal/page/portal/site/personal/tarif/msk

  34. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. https://www.crfdl.org/bitstream/handle/10838/959/bitcoin.pdf?sequence=1 (2008)

  35. Rajab, M.A., et al.: My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In: Provos, N. (ed.) 1st Workshop on Hot Topics in Understanding Botnets, Cambridge, p. 5 (2007)

    Google Scholar 

  36. Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. http://arxiv.org/abs/1107.4524 (2011)

  37. Scròfina, S.: How can Bitcoin be hacked? https://www.quora.com/How-can-Bitcoin-be-hacked

  38. TOP500.Org: Top500 http://top500.org/

  39. US District Court for the District of Columbia: E-Gold indictment. http://www.justice.gov/criminal/pr/2007/04/CRM_07-301_042707_egold_indict.pdf (2006). Last Access: Oct 2012

  40. Weiner, S., Wrigth, J.: Interchange fees in various countries: developments and determinants. Rev. Netw. Econ. 4(4), 290–323 (2005)

    Article  Google Scholar 

  41. Wikipedia: 15 February 2003 anti-war protest. http://en.wikipedia.org/wiki/February_15,_2003_anti-war_protest

  42. Wikipedia: 15 October 2011 global protests. http://en.wikipedia.org/wiki/15_October_2011_global_protests#cite_note-atlantic-10

  43. Wikipedia: Botnet. http://en.wikipedia.org/wiki/Botnet#cite_note-19

  44. Wikipedia: Electricity pricing. http://en.wikipedia.org/wiki/Electricity_pricing#Global_electricity_price_comparison

  45. Wikipedia: Protests against the Iraq war. http://en.wikipedia.org/wiki/Protests_against_the_Iraq_War

  46. Wikipedia: Timeline of Occupy Wall Street. http://en.wikipedia.org/wiki/Timeline_of_Occupy_Wall_Street

  47. Yang, J.: China to encourage solar use. http://webcache.googleusercontent.com/search?q=cache:deiCSQwS69cJ:online.wsj.com/article/SB124397202782578277.html+China+to+Encourage+Solar+Use&cd=1&hl=de&ct=clnk&gl=de

  48. Zetter, K.: Bullion and bandits: the improbable rise and fall of E-Gold. http://www.wired.com/threatlevel/2009/06/e-gold/

  49. Zhu, Z., et al.: Botnet research survey. In: Computer Software and Applications (COMPSAC’08), Turku, pp. 967–972 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dominic Breuker .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., Böhme, R. (2013). Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. In: Böhme, R. (eds) The Economics of Information Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39498-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39498-0_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39497-3

  • Online ISBN: 978-3-642-39498-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics