FruitChains: A Fair Blockchain

被引:208
作者
Pass, Rafael [1 ]
Shi, Elaine [2 ]
机构
[1] CornellTech, New York, NY 10044 USA
[2] Cornell, Ithaca, NY USA
来源
PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17) | 2017年
基金
美国国家科学基金会;
关键词
Distributed consensus; blockchains; fairness; Nash equilibrium;
D O I
10.1145/3087801.3087809
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nakamoto's famous blockchain protocol enables achieving consensus in a so-called permissionless setting-anyone can join (or leave) the protocol execution, and the protocol instructions do not depend on the identities of the players. His ingenious protocol prevents "sybil attacks" (where an adversary spawns any number of new players) by relying on computational puzzles (a.k.a. "moderately hard functions") introduced by Dwork and Naor (Crypto' 92). Recent work by Garay et al (EuroCrypt' 15) and Pass et al (manuscript, 2016) demonstrate that this protocol provably achieves consistency and liveness assuming a) honest players control a majority of the computational power in the network, b) the puzzle-hardness is appropriately set as a function of the maximum network delay and the total computational power of the network, and c) the computational puzzle is modeled as a random oracle. Assuming honest participation, however, is a strong assumption, especially in a setting where honest players are expected to perform a lot of work (to solve the computational puzzles). In Nakamoto's Bitcoin application of the blockchain protocol, players are incentivized to solve these puzzles by receiving rewards for every "block" (of transactions) they contribute to the blockchain. An elegant work by Eyal and Sirer (FinancialCrypt' 14), strengthening and formalizing an earlier attack discussed on the Bitcoin forum, demonstrates that a coalition controlling even a minority fraction of the computational power in the network can gain (close to) 2 times its "fair share" of the rewards (and transaction fees) by deviating from the protocol instructions. In contrast, in a fair protocol, one would expect that players controlling a phi fraction of the computational resources to reap a phi fraction of the rewards. We present a newblockchain protocol-the FruitChain protocol-which satisfies the same consistency and liveness properties as Nakamoto's protocol (assuming an honest majority of the computing power), and additionally is delta-approximately fair: with overwhelming probability, any honest set of players controlling a. fraction of computational power is guaranteed to get at least a fraction (1 - delta)phi of the blocks (and thus rewards) in any Omega(kappa/delta) length segment of the chain (where. is the security parameter). Consequently, if this blockchain protocol is used as the ledger underlying a cryptocurrency system, where rewards and transaction fees are evenly distributed among the miners of blocks in a length. segment of the chain, no coalition controlling less than a majority of the computing power can gain more than a factor (1 + 3 delta) by deviating from the protocol (i.e., honest participation is an n/2-coalition-safe 3 delta-Nash equilibrium). Finally, the FruitChain protocol enables decreasing the variance of mining rewards and as such significantly lessens (or even obliterates) the need for mining pools.
引用
收藏
页码:315 / 324
页数:10
相关论文
共 20 条
[1]  
[Anonymous], 2016, 2016919 CRYPT EPRINT
[2]  
[Anonymous], 2016, COMMUNICATION
[3]  
BARAK B, 2005, CRYPTO 05
[4]   On the Instability of Bitcoin Without the Block Reward [J].
Carlsten, Miles ;
Kalodner, Harry ;
Weinberg, S. Matthew ;
Narayanan, Arvind .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :154-167
[5]  
Dwork C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P139
[6]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[7]  
Garay J., 2015, EUROCRYPT
[8]   Algorithmic rationality: Game theory with costly computation [J].
Halpern, Joseph Y. ;
Pass, Rafael .
JOURNAL OF ECONOMIC THEORY, 2015, 156 :246-268
[9]  
Kiayias A, 2015, Speed-security tradeoffs in blockchain protocols
[10]  
Kiayias A., 2016, IACR Cryptology ePrint Archive, V2016, P545