首页> 外文会议>IEEE Symposium on Security and Privacy >Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
【24h】

Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security

机译:放下常见的指标:评估工作证明协商协议的安全性

获取原文

摘要

Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of work (PoW) to maintain their ledgers. However, research shows that NC fails to achieve perfect chain quality, allowing malicious miners to alter the public ledger in order to launch several attacks, i.e., selfish mining, double-spending and feather-forking. Some later designs, represented by Ethereum, Bitcoin-NG, DECOR+, Byzcoin and Publish or Perish, aim to solve the problem by raising the chain quality; other designs, represented by Fruitchains, DECOR+ and Subchains, claim to successfully defend against the attacks in the absence of perfect chain quality. As their effectiveness remains self-claimed, the community is divided on whether a secure PoW protocol is possible. In order to resolve this ambiguity and to lay down the foundation of a common body of knowledge, this paper introduces a multi-metric evaluation framework to quantitatively analyze PoW protocols' chain quality and attack resistance. Subsequently we use this framework to evaluate the security of these improved designs through Markov decision processes. We conclude that to date, no PoW protocol achieves ideal chain quality or is resistant against all three attacks. We attribute existing PoW protocols' imperfect chain quality to their unrealistic security assumptions, and their unsatisfactory attack resistance to a dilemma between "rewarding the bad" and "punishing the good". Moreover, our analysis reveals various new protocol-specific attack strategies. Based on our analysis, we propose future directions toward more secure PoW protocols and indicate several common pitfalls in PoW security analyses.
机译:遵循比特币的Nakamoto共识协议(NC),数百个加密货币利用工作证明(POW)来维护他们的分类赛。然而,研究表明,NC无法实现完美的连锁品质,允许恶意矿工改变公共分类帐,以推出几次攻击,即自私采矿,双重支出和羽毛叉。一些以后的设计,由Ethereum,Bitcoin-NG,Decor +,Byzcoin和发布或灭亡,旨在通过提高连锁品质来解决问题;由Fruitchains,Decor +和Subchains代表的其他设计,声称在没有完善的链质量的情况下成功地防御袭击。随着他们的有效性仍然是自我声明的,社区是可以进行安全战俘协议是否是可能的。为了解决这种歧义并铺设普通知识的基础,本文介绍了一种多度量评估框架,以定量分析POW协议的链质量和攻击阻力。随后,我们使用此框架通过Markov决策过程评估这些改进设计的安全性。我们结论认为,迄今为止,没有POW协议实现理想的链质量或防止所有三种攻击。我们将现有的战略协议对其不切实际的安全假设的不完美链质量归因于他们的不切实际的安全假设,以及他们对“奖励不好”和“惩罚好”之间的困境的难以致外的攻击性。此外,我们的分析揭示了各种新的协议特定攻击策略。根据我们的分析,我们向未来的方向提出了更安全的权力协议,并在权力分析中指出了几个常见的缺陷。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号