On Trees, Chains and Fast Transactions in the Blockchain

نویسندگان

  • Aggelos Kiayias
  • Giorgos Panagiotakos
چکیده

A fundamental open problem in the area of blockchain protocols is whether the Bitcoin protocol is the only solution for building a secure transaction ledger. A recently proposed and widely considered alternative is the GHOST protocol which, notably, was proposed to be at the core of Ethereum as well as other recent proposals for improved Bitcoin-like systems. The GHOST variant is touted as o ering superior performance compared to Bitcoin (potentially o ering block production speed up by a factor of more than 40) without a security loss. Motivated by this, in this work, we study from a provable security point of view the GHOST protocol. We introduce a new formal framework for the analysis of blockchain protocols that relies on trees (rather than chains) and we showcase the power of the framework by providing a uni ed description of the GHOST and Bitcoin protocols, the former of which we extract and formally describe. We then prove that GHOST implements a robust transaction ledger (i.e., possesses liveness and persistence) and hence it is a provably secure alternative to Bitcoin; moreover, our bound for the liveness parameter is superior to that proven for the bitcoin backbone in line with the original expectation for GHOST. Our proof follows a novel methodology for establishing that GHOST is a robust transaction ledger compared to previous works, which may be of independent interest and can be applicable to other blockchain variants.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Domus Tower Blockchain (DRAFT) March 28, 2016

The purpose of this work is to demonstrate a fast, efficient, highly scalable blockchain. Current blockchain implementations have performance limitations that make them unsuitable for high speed record keeping. For example, the Bitcoin blockchain has a global maximum sustained transaction rate of 7tps [1][2]. Other blockchain implementations have maximum transaction rates in the hundreds or pos...

متن کامل

Double-spending Prevention for Bitcoin zero-confirmation transactions

Zero-confirmation transactions, i.e., transactions that have been broadcast but are still pending to be included in the blockchain, have gained attention in order to enable fast payments in Bitcoin, shortening the time for performing payments. Fast payments are desirable in certain scenarios, for instance, when buying in vending machines, fast food restaurants, or withdrawing from an ATM. Despi...

متن کامل

Upstream Oil and Gas Project Financing using Oil-Backed Cryptocurrency

In recent few years, some endogenous and exogenous barriers caused different challenges in oil and gas project financing. Since appearance and development of innovative ideas such as DLT and blockchain in financial business models, this methods are replacing with traditional models. A blockchain is a decentralized, distributed and oftentimes public, digital ledger consisting of records called b...

متن کامل

Teechain: Scalable Blockchain Payments using Trusted Execution Environments

Blockchain protocols such as Bitcoin are gaining traction for exchanging payments in a secure and decentralized manner. Their need to achieve consensus across a large number of participants, however, fundamentally limits their performance. We describe Teechain, a new off-chain payment protocol that utilizes trusted execution environments (TEEs) to perform secure, efficient and scalable fund tra...

متن کامل

On the Danger of Private Blockchains

Consensus is a fundamental problem of distributed computing. While this problem has been known to be unsolvable since 1985, existing protocols were designed these past three decades to solve consensus under various assumptions. Today, with the recent advent of blockchains, new consensus implementations were proposed to make replicas reach an agreement on the order of transactions updating what ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016