Partial pre-image attack on Proof-of-Work based blockchains

被引:2
作者
Baniata, Hamza [1 ]
Kertesz, Attila [1 ]
机构
[1] Univ Szeged, Dept Software Engn, H-6720 Szeged, Hungary
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2024年 / 5卷 / 03期
关键词
Blockchain; Proof-of-Work; Security; Partial pre-image attack; Hash functions;
D O I
10.1016/j.bcra.2024.100194
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain is a type of distributed ledger technology that consists of a growing list of records, called blocks, that are securely linked together using cryptography. Each blockchain-based solution deploys a specific consensus algorithm that guarantees the consistency of the ledger over time. The most famous, and yet claimed to be the most secure, is the Proof-of-Work (PoW) consensus algorithm. In this paper, we revisit the fundamental calculations and assumptions of this algorithm, originally presented in the Bitcoin white paper. We break down its claimed calculations in order to better understand the underlying assumptions of the proposal. We also propose a novel formalization model of the PoW mining problem using the Birthday paradox. We utilize this model to formalize and analyze partial pre-image attacks on PoW-based blockchains, with formal analysis that confirms the experimental results and the previously proposed implications. We build on those analyses and propose new concepts for benchmarking the security of PoW-based systems, including Critical Difficulty and Critical Difficulty per given portion. Our calculations result in several important findings, including the profitability of launching partial pre-image attacks on PoW-based blockchains, once the mining puzzle difficulty reaches a given threshold. Specifically, for any compromised portion of the network (q<0.5; honest majority assumption still holds), the attack is formally proven profitable once the PoW mining puzzle difficulty reaches 56 leading zeros.
引用
收藏
页数:10
相关论文
共 51 条
  • [1] [Anonymous], 2013, Technical report
  • [2] PriFoB: A Privacy-aware Fog-enhanced Blockchain-based system for Global Accreditation and Credential Verification
    Baniata H.
    Kertesz A.
    [J]. Journal of Network and Computer Applications, 2022, 205
  • [3] PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling
    Baniata, Hamza
    Anaqreh, Ahmad
    Kertesz, Attila
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (01)
  • [4] Quantum Bitcoin Mining
    Benkoczi, Robert
    Gaur, Daya
    Nagy, Naya
    Nagy, Marius
    Hossain, Shahadat
    [J]. ENTROPY, 2022, 24 (03)
  • [5] Bhonge H.N., 2020, P 2020 11 INT C COMP, P1
  • [6] Bloom B.W., 2010, Technical report
  • [7] Bosnjak L, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1161, DOI 10.23919/MIPRO.2018.8400211
  • [8] Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack
    Cortez, Dan Michael A.
    Sison, Ariel M.
    Medina, Ruji P.
    [J]. ICCBN 2020: 2020 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND BROADBAND NETWORKING / ICCET 2020: 2020 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY, 2020, : 24 - 28
  • [9] Dobraunig C., 2015, Security evaluation of SHA-224, SHA- 512/224, and SHA-512/256
  • [10] The oscillating universe: An alternative to inflation
    Durrer, R
    Laukenmann, J
    [J]. CLASSICAL AND QUANTUM GRAVITY, 1996, 13 (05) : 1069 - 1087