机构地区:[1]Key Laboratory of Cryptologic Technology and Information Security,Ministry of Education,Shandong University,Jinan 250100,China [2]Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China [3]State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100864,China [4]Data Assurance and Communication Security Research Center,Chinese Academy of Sciences,Beijing 100864,China
出 处:《Science China(Information Sciences)》2020年第3期45-59,共15页中国科学(信息科学)(英文版)
基 金:supported by National Natural Science Foundation of China (Grant No. 61502276);supported by National Key Research and Development Program of China (Grant No. 2017YFA0303903);National Cryptography Development Fund (Grant No. MMJJ20170121);Zhejiang Province Key R&D Project (Grant No. 2017C01062);supported by National Natural Science Foundation of China (Grant No. 61602473);National Cryptography Development Fund (Grant No. MMJJ20170116)
摘 要:Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.
关 键 词:blockchain bitcoin random oracle DELAY consensus protocol
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...