Abstract
Blockchain and its most selling point decentralization have attracted lots of attentions. However, the problem of centralized mining pools (also called outsourcing problem) is a serious threat to the fundamental security of Bitcoin and other blockchains that also use a scratch-off puzzle (Miller et al. in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, 2015). Although there are some solutions proposing “nonoutsourceable puzzles” to stop the pool operators in the centralized mining pools from outsourcing their mining work to others, we find that none of them can be adopted in real world to support strong nonoutsourceability. In other words, through some special means, e.g., legal prosecution or a tainted public reputation, the pool operator still can outsource his mining work. In this paper, we study the formal definition of strong nonoutsourceability and present constructions that support strong nonoutsourceability. The experimental results also show that our concrete construction is practical.










Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
Notes
https://www.blockchain.com/pools accessed on November 1, 2021.
Bitcoin Network Shaken by Blockchain Fork. https://bitcoinmagazine.com/articles/bitcoin-network-shaken-by-blockchain-fork-1363144448 accessed on October 20, 2021.
Decentralized Bitcoin Mining Pool, P2Pool. http://p2pool.org/.
Litecoin Project. https://litecoin.org/.
Bitcoin Developer Reference. https://bitcoin.org/en/developer-reference#block-headers.
Block Size Limit Controversy. https://en.bitcoin.it/wiki/Block_size_limit_controversy.
References
Alam S, Shuaib M, Khan WZ, Garg S, Kaddoum G, Hossain MS, Zikria YB (2021) Blockchain-based initiatives: current state and challenges. Comput Netw 198:108395
Bhutta MNM, Khwaja AA, Nadeem A, Ahmad HF, Khan MK, Hanif MA, Song H, Alshamari M, Cao Y (2021) A survey on blockchain technology: evolution, architecture and security. IEEE Access 9:61048–61073
Boneh D, Shoup V (2020) A graduate course in applied cryptography, Draft 0.5
Chaum D, Pedersen TP (1992) Wallet databases with observers, CRYPTO 1992, Springer, pp 89–105
Chepurnoy A, Kharin V, Meshkov D (2020) Autolykos: The ergo platform pow scheme
Chepurnoy A, Saxena A (2020) Bypassing non-outsourceable proof-of-work schemes using collateralized smart contracts, International Conference on Financial Cryptography and Data Security, Springer, pp 423–435
Daian P, Eyal I, Juels A Sirer EG (2017) (short paper) piecework: generalized outsourcing control for proofs of work, International Conference on Financial Cryptography and Data Security, Springer, pp 182–190
De Aguiar EJ, Faiçal BS, Krishnamachari B, Ueyama J (2020) A survey of blockchain-based strategies for healthcare. ACM Comput Surv CSUR 53(2):1–27
Du M, Ma X, Zhang Z, Wang X, Chen Q (2017) A review on consensus algorithm of blockchain, Systems Man and Cybernetics (SMC), 2017 IEEE International Conference on, IEEE, pp 2567–2572
Eyal I, Sirer EG (2018) Majority is not enough: bitcoin mining is vulnerable. Commun ACM 61(7):95–102
Fiat A, Shamir A (1986) How to prove yourself: practical solutions to identification and signature problems, CRYPTO 1986, Springer, pp 186–194
Han R, Lin H, Yu J (2020) Vrf-based mining simple non-outsourceable cryptocurrency mining. Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer, pp 287–304
Harvey CR, Ramachandran A, Santoro J (2021) DeFi and the future of finance. John Wiley & Sons
Javaid M, Haleem A, Singh RP, Khan S, Suman R (2021) Blockchain technology applications for industry 4.0: a literature-based review. Blockchain Res Appl 2(4):100027
Leng J, Ruan G, Jiang P, Xu K, Liu Q, Zhou X, Liu C (2020) Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey. Renew Sustain Energy Rev 132:110112
Luu L, Velner Y, Teutsch J, Saxena P (2017) Smart pool: practical decentralized pooled mining., IACR Cryptology ePrint Archive, 19
Miers I, Garman C, Green M, Rubin AD (2013) Zerocoin: anonymous distributed e-cash from bitcoin, Security and Privacy (SP), 2013 IEEE Symposium on, IEEE, pp 397–411
Miller A, Juels A, Shi E, Parno B, Katz J (2014) Permacoin: Repurposing bitcoin work for data preservation, Security and Privacy, IEEE, pp 475–490
Miller A, Kosba A, Katz J, Shi E (2015) Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp 680–691
Nakamoto S (2008). Bitcoin: A peer-to-peer electronic cash system
Rahmani M KI, Shuaib M, Alam S, Siddiqui ST, Ahmad S, Bhatia S, Mashat A (2022) Blockchain-based trust management framework for cloud computing-based internet of medical things (iomt): a systematic review, Computational Intelligence and Neuroscience
Ratta P, Kaur A, Sharma S, Shabaz M, Dhiman G (2021) Application of blockchain and internet of things in healthcare and medical sector: applications, challenges, and future perspectives, J Food Qual 1-20
Rogaway P, Shrimpton T (2004) Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Springer, International workshop on fast software encryption, pp 371–388
Schnorr C (1989) Efficient identification and signatures for smart cards, CRYPTO 1989, Springer, pp 239–252
Siddiqui ST, Ahmad R, Shuaib M, Alam S (2020) Blockchain security threats, attacks and countermeasures. Springer, Ambient Communications and Computer Systems, pp 51–62
Sompolinsky Y, Zohar A (2015) Secure high-rate transaction processing in bitcoin, International Conference on Financial Cryptography and Data Security, Springer, pp 507–527
Wang Q, Li R, Wang Q, Chen S (2021) Non-fungible token (NFT): overview, evaluation, opportunities and challenges, CoRR abs/2105.07447
Zeng G, Yiu SM, Zhang J, Kuzuno H, Au MH (2017) A nonoutsourceable puzzle under ghost rule, 2017 15th Annual Conference on Privacy, Security and Trust (PST), IEEE, pp 35–358
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends, Big Data (BigData Congress), 2017 IEEE International Congress on, IEEE, pp 557–564
Funding
This work is supported by the National Natural Science Foundation of China (62106114).
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by GZ, ZH, YW. The first draft of the manuscript was written by GZ, and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zeng, G., Huang, Z., Wang, Y. et al. Strongly nonoutsourceable scratch-off puzzles in blockchain. Soft Comput 27, 11941–11960 (2023). https://doi.org/10.1007/s00500-023-08753-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-08753-1