DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy

09/02/2021
by   Martin Perešíni, et al.
0

In response to the bottleneck of processing throughput inherent to single chain PoW blockchains, several proposals have substituted a single chain for Directed Acyclic Graphs (DAGs). In this work, we investigate two notable DAG-oriented designs. We focus on PHANTOM (and its optimization GHOSTDAG), which proposes a custom transaction selection strategy that enables to increase the throughput of the network. However, the related work lacks a thorough investigation of corner cases that deviate from the protocol in terms of transaction selection strategy. Therefore, we build a custom simulator that extends open source simulation tools to support multiple chains and enables us to investigate such corner cases. Our experiments show that malicious actors who diverge from the proposed transaction selection strategy make more profit as compared to honest miners. Moreover, they have a detrimental effect on the processing throughput of the PHANTOM (and GHOSTDAG) due to same transactions being included in more than one block of different chains. Finally, we show that multiple miners not following the transaction selection strategy are incentivized to create a shared mining pool instead of mining independently, which has a negative impact on decentralization.

READ FULL TEXT

page 1

page 6

research
05/26/2023

Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection

Several blockchain consensus protocols proposed to use of Directed Acycl...
research
09/04/2023

Synchro: Block-generation Protocol to Synchronously Process Cross-shard Transactions in State Sharding

Traditional blockchains cannot achieve the same transaction throughput a...
research
03/30/2022

Light Clients for Lazy Blockchains

Decoupling consensus from transaction verification and execution is an i...
research
02/09/2023

Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule

In this paper, we review the undercutting attacks in the transaction-fee...
research
06/02/2021

Babel Fees via Limited Liabilities

Custom currencies (ERC-20) on Ethereum are wildly popular, but they are ...
research
10/23/2019

A Queue-oriented Transaction Processing Paradigm

Transaction processing has been an active area of research for several d...
research
08/20/2019

Eunomia: A Permissionless Parallel Chain Protocol Based on Logical Clock

The emerging parallel chain protocols represent a breakthrough to addres...

Please sign up or login with your details

Forgot password? Click here to reset