Erlay: Efficient Transaction Relay for Bitcoin

被引:52
作者
Naumenko, Gleb [1 ]
Maxwell, Gregory
Wuille, Pieter [2 ]
Fedorova, Alexandra [1 ]
Beschastnikh, Ivan [1 ]
机构
[1] Univ British Columbia, Vancouver, BC, Canada
[2] Blockstream, Victoria, BC, Canada
来源
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
peer-to-peer; gossip; bandwidth; distributed systems; PROTOCOL;
D O I
10.1145/3319535.3354237
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin is a top-ranked cryptocurrency that has experienced huge growth and survived numerous attacks. The protocols making up Bitcoin must therefore accommodate the growth of the network and ensure security. Security of the Bitcoin network depends on connectivity between the nodes. Higher connectivity yields better security. In this paper we make two observations: (1) current connectivity in the Bitcoin network is too low for optimal security; (2) at the same time, increasing connectivity will substantially increase the bandwidth used by the transaction dissemination protocol, making it prohibitively expensive to operate a Bitcoin node. Half of the total bandwidth needed to operate a Bitcoin node is currently used to just announce transactions. Unlike block relay, transaction dissemination has received little attention in prior work. We propose a new transaction dissemination protocol, Erlay, that not only reduces the bandwidth consumption by 40% assuming current connectivity, but also keeps the bandwidth use almost constant as the connectivity increases. In contrast, the existing protocol increases the bandwidth consumption linearly with the number of connections. By allowing more connections at a small cost, Erlay improves the security of the Bitcoin network. And, as we demonstrate, Erlay also hardens the network against attacks that attempt to learn the origin node of a transaction. Erlay is currently being investigated by the Bitcoin community for future use with the Bitcoin protocol.
引用
收藏
页码:817 / 831
页数:15
相关论文
共 62 条
[41]  
Fadhil M., 2016, P 11 INT NETW C INC, P109
[42]  
Feigenbaum J, 2003, SIAM J COMPUT, V32, P131, DOI 10.1137/S0097539799361701
[43]  
Feigenbaum J., 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), P501, DOI 10.1109/SFFCS.1999.814623
[44]  
Fiat A, 2005, LECT NOTES COMPUT SC, V3669, P803
[45]   The Bitcoin Backbone Protocol: Analysis and Applications [J].
Garay, Juan ;
Kiayias, Aggelos ;
Leonardos, Nikos .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :281-310
[46]  
Jehn-Ruey Jiang, 2010, Proceedings 2010 IEEE 16th International Conference on Parallel and Distributed Systems (ICPADS 2010), P829, DOI 10.1109/ICPADS.2010.101
[47]   Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools [J].
Johnson, Benjamin ;
Laszka, Aron ;
Grossklags, Jens ;
Vasek, Marie ;
Moore, Tyler .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 :72-86
[48]   An Analysis of Anonymity in Bitcoin Using P2P Network Traffic [J].
Koshy, Philip ;
Koshy, Diana ;
McDaniel, Patrick .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :469-485
[49]   Bandwidth and latency model for DHT based peer-to-peer networks under variable churn [J].
Kumar, P ;
Sridhar, G ;
Sridhar, V .
2005 SYSTEMS COMMUNICATIONS, PROCEEDINGS: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, :320-325
[50]   A study on the redundancy of flooding in unstructured p2p networks [J].
Margariti, Spiridoula V. ;
Dimakopoulos, Vassilios V. .
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2013, 28 (03) :214-229