Security, Latency, and Throughput of Proof-of-Work Nakamoto Consensus

被引:0
作者
Cao, Shu-Jie [1 ]
Guo, Dongning [1 ]
机构
[1] Northwestern Univ, Dept Elect & Comp Engn, Evanston, IL 60208 USA
基金
美国国家科学基金会;
关键词
Fault tolerant systems; Fault tolerance; Safety; Mathematical models; Lower bound; Throughput; Propagation delay; Proof of Work; Bitcoin; Delays; protocols; lead; blockchains; peer-to-peer computing; upper bound;
D O I
10.1109/TIT.2025.3557761
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the fundamental trade-offs between block safety, confirmation latency, and transaction throughput of proof-of-work (PoW) longest-chain fork-choice protocols, also known as PoW Nakamoto consensus. New upper and lower bounds are derived for the probability of block safety violations as a function of honest and adversarial mining rates, a block propagation delay limit, and confirmation latency measured in both time and block depth. The results include the first non-trivial closed-form finite-latency bound applicable across all delays and mining rates up to the ultimate fault tolerance. Notably, the gap between these upper and lower bounds is narrower than previously established bounds for a wide range of parameters relevant to Bitcoin and its derivatives, including Litecoin and Dogecoin, as well as Ethereum Classic. Additionally, the study uncovers a fundamental trade-off between transaction throughput and confirmation latency, ultimately determined by the desired fault tolerance and the rate at which block propagation delay increases with block size.
引用
收藏
页码:4708 / 4731
页数:24
相关论文
共 24 条
[1]  
Antonopoulos Andreas M., 2017, Mastering Bitcoin
[2]   Information Propagation in the Bitcoin Network [J].
Decker, Christian ;
Wattenhofert, Roger .
13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2013,
[3]   Everything is a Race and Nakamoto Always Wins [J].
Dembo, Amir ;
Kannan, Sreeram ;
Tas, Ertem Nusret ;
Tse, David ;
Viswanath, Pramod ;
Wang, Xuechao ;
Zeitouni, Ofer .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :859-878
[4]   Refined Bitcoin Security-Latency Under Network Delay [J].
Doger, Mustafa ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2025, 71 (04) :3038-3047
[5]  
Doger M, 2024, Arxiv, DOI arXiv:2402.10138
[6]  
Doger M, 2024, Arxiv, DOI arXiv:2405.04526
[7]   Calibrating the Performance and Security of Blockchains via Information Propagation Delays [J].
Fechner, Julius ;
Chandrasekaran, Balakrishnan ;
Makkes, Marc X. .
37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, :282-289
[8]   The Bitcoin Backbone Protocol: Analysis and Applications [J].
Garay, Juan ;
Kiayias, Aggelos ;
Leonardos, Nikos .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :281-310
[9]   The Bitcoin Backbone Protocol with Chains of Variable Difficulty [J].
Garay, Juan ;
Kiayias, Aggelos ;
Leonardos, Nikos .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :291-323
[10]  
Gazi P., 2022, P 2022 ACM SIGS C, P1217, DOI DOI 10.1145/3548606.3559368