An Analysis of Attacks on Blockchain Consensus
نویسندگان
چکیده
We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. We account for an attacker capable of increasing profits by targeting multiple merchants simultaneously. Our model quantifies the importance of several factors that determine the attack’s success, including confirmation depth, attacker mining power, and a confirmation deadline set by the merchant. In general, the security of a transaction against a double-spend attack increases roughly logarithmically with the depth of the block, made easier by the increasing potential profits, but more difficult by the increasing proof of work required. We find that a merchant requiring a single confirmation is protected against attackers that possess as much as 10% of the mining power, but only provided that the total value of goods at risk for double-spend is less than 100 BTC. A merchant that requires a much longer 55 confirmations (≈9 hours) will prevent an attacker from breaking even unless he possesses more than 35% of the current mining power, or the value of goods at risk exceeds 1M BTC.
منابع مشابه
Are blockchains immune to all malicious attacks?
Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchai...
متن کاملBlockchain - From the Anarchy of Cryptocurrencies to the Enterprise (Keynote Abstract)
A blockchain is a public ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Distributed protocols tolerating faults and adversarial attacks, cou...
متن کاملAnalysis of the Blockchain Protocol in Asynchronous Networks
Nakamoto’s famous blockchain protocol enables achieving consensus in a so-called permissionless setting—anyone can join (or leave) the protocol execution, and the protocol instructions do not depend on the identities of the players. His ingenious protocol prevents “sybil attacks” (where an adversary spawns any number of new players) by relying on computational puzzles (a.k.a. “moderately hard f...
متن کاملWhen Cryptocurrencies Mine Their Own Business
Bitcoin and hundreds of other cryptocurrencies employ a consensus protocol called Nakamoto consensus which reward miners for maintaining a public blockchain. In this paper, we study the security of this protocol with respect to rational miners and show how a minority of the computation power can incentivize the rest of the network to accept a blockchain of the minority’s choice. By deviating fr...
متن کاملCP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite
Bitcoin, the first decentralized cryptocurrency, achieves great success but also encounters many challenges. In this paper, we mainly focus on Bitcoin’s five challenges: low network synchronization; poor throughput; high information propagation delay; vulnerabilities to fork-based attacks and consumption of a large amount of computational power to maintain the blockchain. To address these chall...
متن کاملA Review on Consensus Algorithms in Blockchain
Block chain technology is a decentralized data storage structure based on a chain of data blocks that are related to each other. Block chain saves new blocks in the ledger without trusting intermediaries through a competitive or voting mechanism. Due to the chain structure or the graph between each block with its previous blocks, it is impossible to change blocking data. Block chain architectur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1610.07985 شماره
صفحات -
تاریخ انتشار 2016