Abstract
Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.
Similar content being viewed by others
References
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2008. https://bitcoin.org/en/bitcoin-paper
Decker C, Wattenhofer R. Information propagation in the bitcoin network. In: Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013. 1–10
Eyal I, Sirer E G. Majority is not enough: bitcoin mining is vulnerable. In: Proceedings of International Conference on Financial Cryptography and Data Security, 2014. 436–454
Bonneau J, Miller A, Clark J, et al. SoK: research perspectives and challenges for Bitcoin and cryptocurrencies. In: Proceedings of IEEE Symposium on Security and Privacy, 2015. 104–121
Gobel J, Keeler H P, Krzesinski A E, et al. Bitcoin blockchain dynamics: the selfish-mine strategy in the presence of propagation delay. Perform Eval, 2016, 104: 23–41
Sompolinsky Y, Zohar A. Secure high-rate transaction processing in bitcoin. In: Proceedings of Financial Cryptography and Data Security, 2015. 507–527
Sapirshtein A, Sompolinsky Y, Zohar A. Optimal selfish mining strategies in bitcoin. In: Proceedings of Financial Cryptography and Data Security, 2016. 515–532
Gervais A, Karame G O, Wust K, et al. On the security and performance of proof of work blockchains. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2016. 3–16
Kiayias A, Koutsoupias E, Kyropoulou M, et al. Blockchain mining games. In: Proceedings of ACM Conference on Economics and Computation, 2016. 365–382
Natoli C, Gramoli V. The balance attack against proof-of-work blockchains: the R3 testbed as an example. In: Proceedings of Computing Research Repository, 2016
Nayak K, Kumar S, Miller A, et al. Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: Proceedings of IEEE European Symposium on Security and Privacy, 2016. 305–320
Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol: analysis and applications. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2015. 281–310
Wu Y B, Fan H N, Wang X Y, et al. A regulated digital currency. Sci China Inf Sci, 2019, 62: 032109
Pass R, Seeman L, Shelat A. Analysis of the blockchain protocol in asynchronous networks. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2017. 643–673
Wei P W, Yuan Q, Zheng Y L. Security of the blockchain protocol against long delay attack. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2018. 250–275
Acknowledgements
Quan YUAN and Puwen WEI were supported by National Natural Science Foundation of China (Grant No. 61502276). Keting JIA was supported by National Key Research and Development Program of China (Grant No. 2017YFA0303903), National Cryptography Development Fund (Grant No. MMJJ20170121), and Zhejiang Province Key R&D Project (Grant No. 2017C01062). Haiyang XUE was supported by National Natural Science Foundation of China (Grant No. 61602473) and National Cryptography Development Fund (Grant No. MMJJ20170116). We would like to thank the anonymous reviewers for their insightful comments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yuan, Q., Wei, P., Jia, K. et al. Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. Sci. China Inf. Sci. 63, 130104 (2020). https://doi.org/10.1007/s11432-019-9916-5
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-9916-5