Abstract
With the increasing number of users in blockchain-based cryptocurrencies, the public has raised the demand for transaction throughput, and many protocols are designed to improve the throughput following the Nakamoto consensus. Although astonishing progress has been made in the on-chain throughput improvement, high throughput makes the blockchains suffer from the increasing blockchain size, hard forks, and possible attacks. In this work, we propose a quantitative model to describe and analyze the Nakamoto consensus. We then design a robust scheme named Ursa to reduce storage requirements and to reduce the forks by automatically adjusting block size according to users’ needs.
- Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing attacks on cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP’17). IEEE, 375--392.Google Scholar
Cross Ref
- Bitcoin Cash 2019. BCH. Retrieved from https://www.Bitcoincash.org/.Google Scholar
- Bitcoin Classic 2009. BTC. Retrieved from https://bitcoinclassic.com/.Google Scholar
- Bitcoin Gold 2017. BTG. Retrieved from https://Bitcoingold.org/.Google Scholar
- Bitcoin Hot 2018. BTH. Retrieved from http://www.bithot.org/.Google Scholar
- Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, and Arvind Narayanan. 2016. On the instability of Bitcoin without the block reward. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 154--167.Google Scholar
Digital Library
- Usman W. Chohan. 2017. The Double Spending Problem and Cryptocurrencies (December 19, 2017). Available at SSRN: https://ssrn.com/abstract=3090174.Google Scholar
- Coinmarketcap. 2013. Coinmarketcap. Retrieved from https://coinmarketcap.comGoogle Scholar
- Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, et al. 2016. On scaling decentralized blockchains. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 106--125.Google Scholar
Cross Ref
- Christian Decker and Roger Wattenhofer. 2013. Information propagation in the Bitcoin network. In Proceedings of the IEEE 13th International Conference on Peer-to-Peer Computing (P2P’13). IEEE, 1--10.Google Scholar
Cross Ref
- Christian Decker and Roger Wattenhofer. 2015. A fast and scalable payment network with Bitcoin duplex micropayment channels. In Proceedings of the Symposium on Self-stabilizing Systems. Springer, 3--18.Google Scholar
Digital Library
- Joan Antoni Donet Donet, Cristina Pérez-Sola, and Jordi Herrera-Joancomartí. 2014. The Bitcoin P2P network. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 87--102.Google Scholar
Cross Ref
- Ethereum. 2014. Ethereum. Retrieved from https://www.ethereum.org/.Google Scholar
- Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation. 45--59.Google Scholar
- Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Proceedings of the International Conference on Financial Cryptography and Data Security. 436--454.Google Scholar
Cross Ref
- Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin backbone protocol: Analysis and applications. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. 9057 (2015), 281--310.Google Scholar
Cross Ref
- Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 3--16.Google Scholar
Digital Library
- Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on Bitcoin’s peer-to-peer network. In Proceedings of the USENIX Security Symposium. 129--144.Google Scholar
- IOTA. 2018. IOTA. Retrieved from https://www.iota.org/.Google Scholar
- Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium (USENIX Security’16). 279--296.Google Scholar
- Lyudmila Kovalchuk, Dmytro Kaidalov, Oleksiy Shevtsov, Andrii Nastenko, Mariia Rodinko, and Roman Oliynykov. 2017. Analysis of splitting attacks on Bitcoin and GHOST consensus protocols. In Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’17), Vol. 2. IEEE, 978--982.Google Scholar
Cross Ref
- Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. 2015. Inclusive block chain protocols. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 528--547.Google Scholar
Cross Ref
- Kevin Liao and Jonathan Katz. 2017. Incentivizing blockchain forks via whale transactions. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 264--279.Google Scholar
Cross Ref
- Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 17--30.Google Scholar
Digital Library
- Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 31--42.Google Scholar
Digital Library
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf.Google Scholar
- Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS8P’16). IEEE, 305--320.Google Scholar
Cross Ref
- Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the blockchain protocol in asynchronous networks. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 643--673.Google Scholar
Cross Ref
- Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin lightning network: Scalable off-chain instant payments. Retrieved from https://lightning.network/lightning-network-paper.pdf.Google Scholar
- Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in Bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 515--532.Google Scholar
- Bitcoindeveloper, Six Comfirm. [n.d.]. The Network has Spent About an Hour Working to Protect the Transaction Against Double Spending when the Transaction is Buried Under Six Blocks. Retrieved from https://developer.bitcoin.org/devguide/payment_processing.html.Google Scholar
- Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in Bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 507--527.Google Scholar
Cross Ref
- Yonatan Sompolinsky and Aviv Zohar. 2018. PHANTOM: A Scalable BlockDAG Protocol. IACR Cryptol. ePrint Arch. 2018 (2018), 104.Google Scholar
- Itay Tsabary and Ittay Eyal. 2018. The gap game. CoRR abs/1805.05288 (2018).Google Scholar
- VISA 2016. Retrieved from https://usa.visa.com/about-visa/visanet.html.Google Scholar
- Jiaping Wang and Hao Wang. 2019. Monoxide: Scale out blockchains with asynchronous consensus zones. In Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI’19). 95--112.Google Scholar
- Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. Rapidchain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 931--948.Google Scholar
Digital Library
- Dongli Zhou, Na Ruan, and Weijia Jia. 2019. A robust throughput scheme for Bitcoin network without block reward. In Proceedings of the IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS’19). IEEE, 706--713.Google Scholar
Index Terms
Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput
Recommendations
Diablo: A Benchmark Suite for Blockchains
EuroSys '23: Proceedings of the Eighteenth European Conference on Computer SystemsWith the recent advent of blockchains, we have witnessed a plethora of blockchain proposals. These proposals range from using work to using time, storage or stake in order to select blocks to be appended to the chain. As a drawback it makes it ...
Goodput and throughput comparison of single-hop and multi-hop routing for IEEE 802.11 DCF-based wireless networks under hidden terminal existence
We investigate how multi-hop routing affects the goodput and throughput performances of IEEE 802.11 distributed coordination function-based wireless networks compared with direct transmission single hopping, when medium access control dynamics such as ...
RDV: An Alternative To Proof-of-Work And A Real Decentralized Consensus For Blockchain
BlockSys'18: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor SystemsA blockchain is a decentralized ledger where all transactions are recorded. For having a reliable blockchain and double-spending prevention, we need a decentralized consensus and agreement on a blockchain. Bitcoin uses proof-of-work (PoW). It is a ...






Comments