Publication Type
Journal Article
Version
publishedVersion
Publication Date
2-2020
Abstract
Bitcoin, which was initially introduced by Nakamoto, is the most disruptive and impactive cryptocurrency. The core Bitcoin technology is the so-called blockchain protocol. In recent years, several studies have focused on rigorous analyses of the security of Nakamoto’s blockchain protocol in an asynchronous network where network delay must be considered. Wei, Yuan, and Zheng investigated the effect of a long delay attack against Nakamoto’s blockchain protocol. However, their proof only holds in the honest miner setting. In this study, we improve Wei, Yuan and Zheng’s result using a stronger model where the adversary can perform long delay attacks and corrupt a certain fraction of the miners. We propose a method to analyze the converge event and demonstrate that the properties of chain growth, common prefix, and chain quality still hold with reasonable parameters in our stronger model.
Keywords
blockchain, bitcoin, random oracle, delay, consensus protocol
Discipline
Information Security
Research Areas
Cybersecurity
Areas of Excellence
Digital transformation
Publication
SCIENCE CHINA Information Sciences
Volume
63
Issue
3
First Page
1
Last Page
15
ISSN
1674-733X
Identifier
10.1007/s11432-019-9916-5
Publisher
Springer
Citation
YUAN, Quan; WEI, Puwen; JIA, Keting; and XUE, Haiyang.
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. (2020). SCIENCE CHINA Information Sciences. 63, (3), 1-15.
Available at: https://ink.library.smu.edu.sg/sis_research/9182
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1007/s11432-019-9916-5