Skip to main content

2019 | OriginalPaper | Buchkapitel

On Trees, Chains and Fast Transactions in the Blockchain

verfasst von : Aggelos Kiayias, Giorgos Panagiotakos

Erschienen in: Progress in Cryptology – LATINCRYPT 2017

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A fundamental open problem in the area of blockchain protocols is whether the Bitcoin protocol is the only solution for building a secure transaction ledger. A recently proposed and widely considered alternative is the GHOST protocol which, notably, was proposed to be at the core of Ethereum as well as other recent proposals for improved Bitcoin-like systems. The GHOST variant is touted as offering superior performance compared to Bitcoin (potentially offering block production speed up by a factor of more than 40) without a security loss. Motivated by this, in this work, we study from a provable security point of view the GHOST protocol.
We introduce a new formal framework for the analysis of blockchain protocols that relies on trees (rather than chains) and we showcase the power of the framework by providing a unified description of the GHOST and Bitcoin protocols, the former of which we extract and formally describe. We then prove that GHOST implements a “robust transaction ledger” (i.e., possesses liveness and persistence) and hence it is a provably secure alternative to Bitcoin; moreover, our bound for the liveness parameter is superior to that proven for the bitcoin backbone in line with the original expectation for GHOST. Our proof follows a novel methodology for establishing that GHOST is a robust transaction ledger compared to previous works, which may be of independent interest and can be applicable to other blockchain variants.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
As in [9], a block \(B = \langle s,x,ctr \rangle \) is valid if it satisfies two conditions: \(H(ctr,G(s,x)) <D\) and \(ctr \le q\), where D is the block’s difficulty level and HG are cryptographic hash functions.
 
2
This is exactly Algorithm 1 with a minor modification. At line 6 the subtree \(\mathcal{T}\) that is chosen maximizes \(w(\mathcal{T})\).
 
3
Throughout this work, we only consider executions that run for a polynomial number of rounds in the security parameter \(\kappa \).
 
Literatur
2.
Zurück zum Zitat Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing Computationally-Challenged Byzantine Impostors. Department of Computer Science, Yale University, New Haven, CT, Technical Report (2005) Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing Computationally-Challenged Byzantine Impostors. Department of Computer Science, Yale University, New Haven, CT, Technical Report (2005)
3.
4.
Zurück zum Zitat Bonneau, J.: Ethiks: Using ethereum to audit a coniks key transparency log Bonneau, J.: Ethiks: Using ethereum to audit a coniks key transparency log
5.
7.
Zurück zum Zitat Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-ng: a scalable blockchain protocol. CoRR, abs/1510.02037 (2015) Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-ng: a scalable blockchain protocol. CoRR, abs/1510.02037 (2015)
8.
Zurück zum Zitat Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Financial Cryptography (2014) Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Financial Cryptography (2014)
10.
Zurück zum Zitat Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. Cryptology ePrint Archive, Report 2016/555 (2016). http://eprint.iacr.org/2016/555 Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. Cryptology ePrint Archive, Report 2016/555 (2016). http://​eprint.​iacr.​org/​2016/​555
11.
Zurück zum Zitat Juels, A., Kosba, A., Shi, E.: The ring of gyges: Using smart contracts for crime. aries, 40:54 (2015) Juels, A., Kosba, A., Shi, E.: The ring of gyges: Using smart contracts for crime. aries, 40:54 (2015)
12.
Zurück zum Zitat Kiayias, A., Panagiotakos, G.: Speed-security tradeoffs in blockchain protocols. Technical report, IACR: Cryptology ePrint Archive (2015) Kiayias, A., Panagiotakos, G.: Speed-security tradeoffs in blockchain protocols. Technical report, IACR: Cryptology ePrint Archive (2015)
13.
Zurück zum Zitat Kiayias, A., Zhou, H.-S., Zikas, V.: Fair and robust multi-party computation using a global transaction ledger (2015) Kiayias, A., Zhou, H.-S., Zikas, V.: Fair and robust multi-party computation using a global transaction ledger (2015)
14.
Zurück zum Zitat Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. Technical report, Cryptology ePrint Archive, Report 2015/675 (2015). http://eprint.iacr.org Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. Technical report, Cryptology ePrint Archive, Report 2015/675 (2015). http://​eprint.​iacr.​org
15.
Zurück zum Zitat Lamport, L., Shostak, R.E., Pease, M.C.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)CrossRef Lamport, L., Shostak, R.E., Pease, M.C.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)CrossRef
19.
Zurück zum Zitat Omohundro, S.: Cryptocurrencies, smart contracts, and artificial intelligence. AI Matters 1(2), 19–21 (2014)MathSciNetCrossRef Omohundro, S.: Cryptocurrencies, smart contracts, and artificial intelligence. AI Matters 1(2), 19–21 (2014)MathSciNetCrossRef
20.
21.
Zurück zum Zitat Pease, M.C., Shostak, R.E., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)MathSciNetCrossRef Pease, M.C., Shostak, R.E., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)MathSciNetCrossRef
22.
Zurück zum Zitat Percival, C.: Stronger key derivation via sequential memory-hard functions. Self-published, pp. 1–16 (2009) Percival, C.: Stronger key derivation via sequential memory-hard functions. Self-published, pp. 1–16 (2009)
23.
Zurück zum Zitat Peterson, J., Krug, J.: Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv:1501.01042 (2015) Peterson, J., Krug, J.: Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv:​1501.​01042 (2015)
24.
Zurück zum Zitat Simplicio Jr., M.A., Almeida, L.C., Andrade, E.R., dos Santos, P.C., Barreto, P.S.: The lyra2 reference guide. Technical report, version 2.3. 2. Technical report (2014) Simplicio Jr., M.A., Almeida, L.C., Andrade, E.R., dos Santos, P.C., Barreto, P.S.: The lyra2 reference guide. Technical report, version 2.3. 2. Technical report (2014)
Metadaten
Titel
On Trees, Chains and Fast Transactions in the Blockchain
verfasst von
Aggelos Kiayias
Giorgos Panagiotakos
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-25283-0_18