Securing Parallel-chain Protocols under Variable Mining Power

05/06/2021
by   Xuechao Wang, et al.
0

Several emerging PoW blockchain protocols rely on a "parallel-chain" architecture for scaling, where instead of a single chain, multiple chains are run in parallel and aggregated. A key requirement of practical PoW blockchains is to adapt to mining power variations over time. In this paper, we consider the design of provably secure parallel-chain protocols which can adapt to such mining power variations. The Bitcoin difficulty adjustment rule adjusts the difficulty target of block mining periodically to get a constant mean inter-block time. While superficially simple, the rule has proved itself to be sophisticated and successfully secure, both in practice and in theory. We show that natural adaptations of the Bitcoin adjustment rule to the parallel-chain case open the door to subtle, but catastrophic safety and liveness breaches. We uncover a meta-design principle that allow us to design variable mining difficulty protocols for three popular PoW blockchain proposals (Prism, OHIE, and Fruitchains) inside a common rubric. The principle has three components:(M1) a pivot chain, based on which blocks in all chains choose difficulty, (M2) a monotonicity condition for referencing pivot chain blocks and (M3) translating additional protocol aspects from using levels (depth) to using "difficulty levels". We show that protocols employing a subset of these principles may have catastrophic failures. The security of the designs is also proved using a common rubric - the key technical challenge involves analyzing the interaction between the pivot chain and the other chains, as well as bounding the sudden changes in difficulty target experienced in non-pivot chains. We empirically investigate the responsivity of the new mining difficulty rule via simulations based on historical Bitcoin data, and find that the protocol very effectively controls the forking rate across all the chains.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/08/2022

Scaling Bockchain with Adaptivity

This paper presents Balloon, a scalable blockchain consensus protocol wh...
research
05/07/2020

QuickSync: A Quickly Synchronizing PoS-Based Blockchain Protocol

To implement a blockchain, we need a blockchain protocol for all the nod...
research
08/29/2023

Longest-chain Attacks: Difficulty Adjustment and Timestamp Verifiability

We study an adversary who attacks a Proof-of-Work (POW) blockchain by se...
research
07/12/2020

Radium: Improving Dynamic PoW Targeting

Most PoW blockchain protocols operate with a simple mechanism whereby a ...
research
01/20/2022

Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security

Bitcoin is the most secure blockchain in the world, supported by the imm...
research
08/20/2019

Eunomia: A Permissionless Parallel Chain Protocol Based on Logical Clock

The emerging parallel chain protocols represent a breakthrough to addres...
research
09/21/2023

Generic Selfish Mining MDP for DAG Protocols

Selfish Mining is strategic rule-breaking to maximize rewards in proof-o...

Please sign up or login with your details

Forgot password? Click here to reset