Generalizing Weighted Trees: A Bridge from Bitcoin to GHOST

08/30/2021
by   Ignacio Amores-Sesar, et al.
0

Despite the tremendous interest in cryptocurrencies like Bitcoin and Ethereum today, many aspects of the underlying consensus protocols are poorly understood. Therefore, the search for protocols that improve either throughput or security (or both) continues. Bitcoin always selects the longest chain (i.e., the one with most work). Forks may occur when two miners extend the same block simultaneously, and the frequency of forks depends on how fast blocks are propagated in the network. In the GHOST protocol, used by Ethereum, all blocks involved in the fork contribute to the security. However, the greedy chain selection rule of GHOST does not consider the full information available in the block tree, which has led to some concerns about its security. This paper introduces a new family of protocols, called Medium, which takes the structure of the whole block tree into account, by weighting blocks differently according to their depths. Bitcoin and GHOST result as special cases. This protocol leads to new insights about the security of Bitcoin and GHOST and paves the way for developing network- and application-specific protocols, in which the influence of forks on the chain-selection process can be controlled. It is shown that almost all protocols in this family achieve strictly greater throughput than Bitcoin (at the same security level) and resist attacks that can be mounted against GHOST.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/22/2018

The Impact of Uncle Rewards on Selfish Mining in Ethereum

Many of today's crypto currencies use blockchains as decentralized ledge...
research
12/11/2019

Simulation of the Bitcoin Network Considering Compact Block Relay and Internet Improvements

Improving transaction throughput is an important challenge for Bitcoin. ...
research
06/01/2020

GHAST: Breaking Confirmation Delay Barrier in Nakamoto Consensus via Adaptive Weighted Blocks

Initiated from Nakamoto's Bitcoin system, blockchain technology has demo...
research
09/25/2019

Novel method for handling Ethereum attack

Block-chain world is very dynamic and there is need for strong governanc...
research
09/21/2023

Generic Selfish Mining MDP for DAG Protocols

Selfish Mining is strategic rule-breaking to maximize rewards in proof-o...
research
08/11/2022

Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work Mining

The core of many cryptocurrencies is the decentralised validation networ...
research
10/18/2019

CDAG: A Serialized blockDAG for Permissioned Blockchain

Blockchain is maintained as a global log between a network of nodes and ...

Please sign up or login with your details

Forgot password? Click here to reset