區(qū)塊鏈長延時協(xié)議技術(shù)研究_第1頁
區(qū)塊鏈長延時協(xié)議技術(shù)研究_第2頁
區(qū)塊鏈長延時協(xié)議技術(shù)研究_第3頁
區(qū)塊鏈長延時協(xié)議技術(shù)研究_第4頁
區(qū)塊鏈長延時協(xié)議技術(shù)研究_第5頁
已閱讀5頁,還剩23頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、1區(qū)塊鏈長延時協(xié)議技術(shù)研究Analysis of the Blockchain Protocol with Long Delays Nakamotos blockchainBitcoinDecentralized payment systemLedger maintained by the public in a decentralized mannerAttractive propertiesDecentralization, Pseudonymity, Robustness BlockchainChain-structured ledger maintained by all the pa

2、rticipants (miners)2 Nakamotos blockchainBlockchainBasic security requirementAll the miners maintain the same recordAchieve consensus in the permissionless settingB1B2B3B1B2B3B1B2B3permissionlessanyone can join (or leave) the protocol execution3 Nakamotos blockchainProof of work (PoW)Solve a “crypto

3、graphic puzzle”Bitcoin Backbone Protocol GKL15 blockchain C=(!, !$, , !&)block!( = (,$, -(, .( , ()( = /(,$|-(| .( , s. t. ( DH(h |-? 6h0 m1 r1Block 1h1 m2 r2Block 24 Nakamotos blockchainProof of work (PoW)Integrity:More difficult for the adversary to modify the chainSynchronism:help the distributed

4、 miners to synchronizeSlowdown the generation of blocksLongest chain ruleH(h |? %5 Nakamotos blockchainCommon prefixChain growthChain qualitySecurityGaray, Kiayias and Leonardos GKL15 provide a rigorous analysis of blockchain protocolSynchronous modelPass, Seeman and shelat PSS17 analyze the securit

5、y in an asynchronous network with a-priori bounded delayAsynchronous modelWhy consider the delay?6 Blockchain protocol with delays7Bitcoin P2P networkDelays are inevitableNew blockThe propagation delay in the network is the primary cause for blockchain forks DW13Decker and WattenhoferInformation pro

6、pagation in the bitcoin network (2013) Blockchain protocol with delaysResults PSS17,0/1Chain growth: (,-.)/,where 2 *+Consistency: 4 with probability 1 *789(4)Chain quality:1 (1 + ;) 1 ./(1 + 2)For TreeMC with common prefix of depth d-T1 ./ 1 + 2520 Long Delay Attack on Common PrefixConcrete attack

7、on the common prefix of TreeMCwhen and are “too” large relative to a fixed TGoal of attack: increase the length of the two branches by T21 Long Delay Attack on Common PrefixWith inappropriate parameters, adversaries without any hash power can threaten the commonprefix propertyFor = 0.8 and T = 6, th

8、e success probability increases as gets larger.the success probability grows much faster when 60 (10 min). When 120 (20 min), the success probability can reach about 1%.22Corrupted miner setting?23 Corrupted miner settingThe adversary can corrupt some miners and have certain fraction of the total co

9、mputational powerCommon prefixChain growthChain quality24 Security proof in corrupted miners settingChain growthCommon prefixChain qualityConsecutive blocks cannot be mined by the same miner25 Security proof in corrupted miners settingMain ideaprove that the rate of mining by corrupted miners is slower than the rate of converge with overwhelming probability26 PublicationsPuwen Wei, Quan Yuan and Yuliang Zheng. Security of the blockchain against long delay attack. In: Advances in Cryptology ASIACRYPT 2018.Quan Yuan, Puwen Wei, Keting Jia and Haiyang Xue. Analysis of the bloc

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論