Partial pre-image attack on Proof-of-Work based blockchains

被引:2
作者
Baniata, Hamza [1 ]
Kertesz, Attila [1 ]
机构
[1] Univ Szeged, Dept Software Engn, H-6720 Szeged, Hungary
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2024年 / 5卷 / 03期
关键词
Blockchain; Proof-of-Work; Security; Partial pre-image attack; Hash functions;
D O I
10.1016/j.bcra.2024.100194
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain is a type of distributed ledger technology that consists of a growing list of records, called blocks, that are securely linked together using cryptography. Each blockchain-based solution deploys a specific consensus algorithm that guarantees the consistency of the ledger over time. The most famous, and yet claimed to be the most secure, is the Proof-of-Work (PoW) consensus algorithm. In this paper, we revisit the fundamental calculations and assumptions of this algorithm, originally presented in the Bitcoin white paper. We break down its claimed calculations in order to better understand the underlying assumptions of the proposal. We also propose a novel formalization model of the PoW mining problem using the Birthday paradox. We utilize this model to formalize and analyze partial pre-image attacks on PoW-based blockchains, with formal analysis that confirms the experimental results and the previously proposed implications. We build on those analyses and propose new concepts for benchmarking the security of PoW-based systems, including Critical Difficulty and Critical Difficulty per given portion. Our calculations result in several important findings, including the profitability of launching partial pre-image attacks on PoW-based blockchains, once the mining puzzle difficulty reaches a given threshold. Specifically, for any compromised portion of the network (q<0.5; honest majority assumption still holds), the attack is formally proven profitable once the PoW mining puzzle difficulty reaches 56 leading zeros.
引用
收藏
页数:10
相关论文
共 51 条
  • [11] F.I.P.S. Pub, 2012, Fips Pub, V180
  • [12] Gheorghiu V., 2019, arXiv
  • [13] Gilbert H, 2004, LECT NOTES COMPUT SC, V3006, P175
  • [14] A survey of SAT Solver
    Gong, Weiwei
    Zhou, Xu
    [J]. APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2017, 1836
  • [15] DOUBLE SPEND RACES
    Grunspan, Cyril
    Perez-Marco, Ricardo
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL AND APPLIED FINANCE, 2018, 21 (08)
  • [16] A survey on blockchain technology and its security
    Guo, Huaqun
    Yu, Xingjie
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2022, 3 (02):
  • [17] Handschub H., 2002, Evaluation Report Security Level of Cryptography - SHA-256
  • [18] Blockchain in healthcare and health sciences-A scoping review
    Hasselgren, Anton
    Kralevska, Katina
    Gligoroski, Danilo
    Pedersen, Sindre A.
    Faxvaag, Arild
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2020, 134
  • [19] Recycling Hashes from Reversible Bitcoin Mining to Seed Pseudorandom Number Generators
    Heinonen, Henri T.
    Semenov, Alexander
    [J]. BLOCKCHAIN, ICBC 2021, 2022, 12991 : 103 - 117
  • [20] Isobe T, 2009, LECT NOTES COMPUT SC, V5665, P139, DOI 10.1007/978-3-642-03317-9_9