Skip to main content
Log in

Strongly nonoutsourceable scratch-off puzzles in blockchain

  • Foundation, algebraic, and analytical methods in soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Blockchain and its most selling point decentralization have attracted lots of attentions. However, the problem of centralized mining pools (also called outsourcing problem) is a serious threat to the fundamental security of Bitcoin and other blockchains that also use a scratch-off puzzle (Miller et al. in Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, 2015). Although there are some solutions proposing “nonoutsourceable puzzles” to stop the pool operators in the centralized mining pools from outsourcing their mining work to others, we find that none of them can be adopted in real world to support strong nonoutsourceability. In other words, through some special means, e.g., legal prosecution or a tainted public reputation, the pool operator still can outsource his mining work. In this paper, we study the formal definition of strong nonoutsourceability and present constructions that support strong nonoutsourceability. The experimental results also show that our concrete construction is practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

Notes

  1. https://www.statista.com/statistics/647374/worldwide-blockchain-wallet-users.

  2. https://www.blockchain.com/pools accessed on November 1, 2021.

  3. Bitcoin Network Shaken by Blockchain Fork. https://bitcoinmagazine.com/articles/bitcoin-network-shaken-by-blockchain-fork-1363144448 accessed on October 20, 2021.

  4. Decentralized Bitcoin Mining Pool, P2Pool. http://p2pool.org/.

  5. Litecoin Project. https://litecoin.org/.

  6. Bitcoin Developer Reference. https://bitcoin.org/en/developer-reference#block-headers.

  7. Block Size Limit Controversy. https://en.bitcoin.it/wiki/Block_size_limit_controversy.

References

  • Alam S, Shuaib M, Khan WZ, Garg S, Kaddoum G, Hossain MS, Zikria YB (2021) Blockchain-based initiatives: current state and challenges. Comput Netw 198:108395

    Article  Google Scholar 

  • Bhutta MNM, Khwaja AA, Nadeem A, Ahmad HF, Khan MK, Hanif MA, Song H, Alshamari M, Cao Y (2021) A survey on blockchain technology: evolution, architecture and security. IEEE Access 9:61048–61073

    Article  Google Scholar 

  • Boneh D, Shoup V (2020) A graduate course in applied cryptography, Draft 0.5

  • Chaum D, Pedersen TP (1992) Wallet databases with observers, CRYPTO 1992, Springer, pp 89–105

  • Chepurnoy A, Kharin V, Meshkov D (2020) Autolykos: The ergo platform pow scheme

  • Chepurnoy A, Saxena A (2020) Bypassing non-outsourceable proof-of-work schemes using collateralized smart contracts, International Conference on Financial Cryptography and Data Security, Springer, pp 423–435

  • Daian P, Eyal I, Juels A Sirer EG (2017) (short paper) piecework: generalized outsourcing control for proofs of work, International Conference on Financial Cryptography and Data Security, Springer, pp 182–190

  • De Aguiar EJ, Faiçal BS, Krishnamachari B, Ueyama J (2020) A survey of blockchain-based strategies for healthcare. ACM Comput Surv CSUR 53(2):1–27

    Google Scholar 

  • Du M, Ma X, Zhang Z, Wang X, Chen Q (2017) A review on consensus algorithm of blockchain, Systems Man and Cybernetics (SMC), 2017 IEEE International Conference on, IEEE, pp 2567–2572

  • Eyal I, Sirer EG (2018) Majority is not enough: bitcoin mining is vulnerable. Commun ACM 61(7):95–102

    Article  MATH  Google Scholar 

  • Fiat A, Shamir A (1986) How to prove yourself: practical solutions to identification and signature problems, CRYPTO 1986, Springer, pp 186–194

  • Han R, Lin H, Yu J (2020) Vrf-based mining simple non-outsourceable cryptocurrency mining. Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer, pp 287–304

    Google Scholar 

  • Harvey CR, Ramachandran A, Santoro J (2021) DeFi and the future of finance. John Wiley & Sons

    Google Scholar 

  • Javaid M, Haleem A, Singh RP, Khan S, Suman R (2021) Blockchain technology applications for industry 4.0: a literature-based review. Blockchain Res Appl 2(4):100027

    Article  Google Scholar 

  • Leng J, Ruan G, Jiang P, Xu K, Liu Q, Zhou X, Liu C (2020) Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey. Renew Sustain Energy Rev 132:110112

    Article  Google Scholar 

  • Luu L, Velner Y, Teutsch J, Saxena P (2017) Smart pool: practical decentralized pooled mining., IACR Cryptology ePrint Archive, 19

  • Miers I, Garman C, Green M, Rubin AD (2013) Zerocoin: anonymous distributed e-cash from bitcoin, Security and Privacy (SP), 2013 IEEE Symposium on, IEEE, pp 397–411

  • Miller A, Juels A, Shi E, Parno B, Katz J (2014) Permacoin: Repurposing bitcoin work for data preservation, Security and Privacy, IEEE, pp 475–490

  • Miller A, Kosba A, Katz J, Shi E (2015) Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp 680–691

  • Nakamoto S (2008). Bitcoin: A peer-to-peer electronic cash system

  • Rahmani M KI, Shuaib M, Alam S, Siddiqui ST, Ahmad S, Bhatia S, Mashat A (2022) Blockchain-based trust management framework for cloud computing-based internet of medical things (iomt): a systematic review, Computational Intelligence and Neuroscience

  • Ratta P, Kaur A, Sharma S, Shabaz M, Dhiman G (2021) Application of blockchain and internet of things in healthcare and medical sector: applications, challenges, and future perspectives, J Food Qual 1-20

  • Rogaway P, Shrimpton T (2004) Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Springer, International workshop on fast software encryption, pp 371–388

    MATH  Google Scholar 

  • Schnorr C (1989) Efficient identification and signatures for smart cards, CRYPTO 1989, Springer, pp 239–252

  • Siddiqui ST, Ahmad R, Shuaib M, Alam S (2020) Blockchain security threats, attacks and countermeasures. Springer, Ambient Communications and Computer Systems, pp 51–62

    Google Scholar 

  • Sompolinsky Y, Zohar A (2015) Secure high-rate transaction processing in bitcoin, International Conference on Financial Cryptography and Data Security, Springer, pp 507–527

  • Wang Q, Li R, Wang Q, Chen S (2021) Non-fungible token (NFT): overview, evaluation, opportunities and challenges, CoRR abs/2105.07447

  • Zeng G, Yiu SM, Zhang J, Kuzuno H, Au MH (2017) A nonoutsourceable puzzle under ghost rule, 2017 15th Annual Conference on Privacy, Security and Trust (PST), IEEE, pp 35–358

  • Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends, Big Data (BigData Congress), 2017 IEEE International Congress on, IEEE, pp 557–564

Download references

Funding

This work is supported by the National Natural Science Foundation of China (62106114).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by GZ, ZH, YW. The first draft of the manuscript was written by GZ, and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Zhengan Huang.

Ethics declarations

Competing interests

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zeng, G., Huang, Z., Wang, Y. et al. Strongly nonoutsourceable scratch-off puzzles in blockchain. Soft Comput 27, 11941–11960 (2023). https://doi.org/10.1007/s00500-023-08753-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-08753-1

Keywords

Navigation