首页> 外文会议>IEEE Symposium on Security and Privacy >Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security
【24h】

Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security

机译:放下通用指标:评估工作量证明共识协议的安全性

获取原文

摘要

Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of work (PoW) to maintain their ledgers. However, research shows that NC fails to achieve perfect chain quality, allowing malicious miners to alter the public ledger in order to launch several attacks, i.e., selfish mining, double-spending and feather-forking. Some later designs, represented by Ethereum, Bitcoin-NG, DECOR+, Byzcoin and Publish or Perish, aim to solve the problem by raising the chain quality; other designs, represented by Fruitchains, DECOR+ and Subchains, claim to successfully defend against the attacks in the absence of perfect chain quality. As their effectiveness remains self-claimed, the community is divided on whether a secure PoW protocol is possible. In order to resolve this ambiguity and to lay down the foundation of a common body of knowledge, this paper introduces a multi-metric evaluation framework to quantitatively analyze PoW protocols' chain quality and attack resistance. Subsequently we use this framework to evaluate the security of these improved designs through Markov decision processes. We conclude that to date, no PoW protocol achieves ideal chain quality or is resistant against all three attacks. We attribute existing PoW protocols' imperfect chain quality to their unrealistic security assumptions, and their unsatisfactory attack resistance to a dilemma between "rewarding the bad" and "punishing the good". Moreover, our analysis reveals various new protocol-specific attack strategies. Based on our analysis, we propose future directions toward more secure PoW protocols and indicate several common pitfalls in PoW security analyses.
机译:遵循比特币的Nakamoto共识协议(NC),数百种加密货币利用工作量证明(PoW)维护其账本。但是,研究表明,NC无法达到完美的链质量,从而允许恶意矿工更改公共分类账以发起多种攻击,即自私挖矿,双重消费和分叉。以太坊,比特币-NG,DECOR +,Byzcoin和Publish或Perish代表的一些后来的设计旨在通过提高链质量来解决问题。以Fruitchains,DECOR +和Subchains为代表的其他设计声称可以在缺乏完美链质量的情况下成功防御攻击。由于它们的有效性一直是不言而喻的,因此社区对是否可以使用安全的PoW协议存有分歧。为了解决这种歧义并奠定公共知识体系的基础,本文引入了一种多指标评估框架,以定量分析PoW协议的链质量和攻击抵抗力。随后,我们使用此框架通过Markov决策过程评估这些改进设计的安全性。我们得出的结论是,迄今为止,还没有PoW协议能够达到理想的链质量或抵御所有这三种攻击。我们将现有的PoW协议不完善的链质量归因于其不切实际的安全性假设,以及其对令人满意的“抵抗不良”和“惩罚良好”之间的两难选择的攻击抵抗力。此外,我们的分析还揭示了各种新的特定于协议的攻击策略。根据我们的分析,我们提出了更安全的PoW协议的未来方向,并指出了PoW安全分析中的几个常见陷阱。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号