Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers  被引量:3

Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers

在线阅读下载全文

作  者:Quan YUAN Puwen WEI Keting JIA Haiyang XUE 

机构地区:[1]Key Laboratory of Cryptologic Technology and Information Security,Ministry of Education,Shandong University,Jinan 250100,China [2]Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China [3]State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100864,China [4]Data Assurance and Communication Security Research Center,Chinese Academy of Sciences,Beijing 100864,China

出  处:《Science China(Information Sciences)》2020年第3期45-59,共15页中国科学(信息科学)(英文版)

基  金:supported by National Natural Science Foundation of China (Grant No. 61502276);supported by National Key Research and Development Program of China (Grant No. 2017YFA0303903);National Cryptography Development Fund (Grant No. MMJJ20170121);Zhejiang Province Key R&D Project (Grant No. 2017C01062);supported by National Natural Science Foundation of China (Grant No. 61602473);National Cryptography Development Fund (Grant No. MMJJ20170116)

摘  要:Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.

关 键 词:blockchain bitcoin random oracle DELAY consensus protocol 

分 类 号:TP309[自动化与计算机技术—计算机系统结构] TP311.13[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象