RepuCoin: Your Reputation Is Your Power

被引:101
作者
Yu, Jiangshan [1 ]
Kozhaya, David [2 ]
Decouchant, Jeremie [3 ]
Esteves-Verissimo, Paulo [3 ]
机构
[1] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[2] ABB Corp Res, CH-5405 Baden, Switzerland
[3] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, L-4365 Esch Sur Alzette, Luxembourg
关键词
Blockchain; cryptocurrency; fault tolerance; consensus; ATTACKS;
D O I
10.1109/TC.2019.2900648
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Existing proof-of-work cryptocurrencies cannot tolerate attackers controlling more than 50 percent of the network's computing power at any time, but assume that such a condition happening is "unlikely". However, recent attack sophistication, e.g., where attackers can rent mining capacity to obtain a majority of computing power temporarily, render this assumption unrealistic. This paper proposes RepuCoin, the first system to provide guarantees even when more than 50 percent of the system's computing power is temporarily dominated by an attacker. RepuCoin physically limits the rate of voting power growth of the entire system. In particular, RepuCoin defines a miner's power by its 'reputation', as a function of its work integrated over the time of the entire blockchain, rather than through instantaneous computing power, which can be obtained relatively quickly and/or temporarily. As an example, after a single year of operation, RepuCoin can tolerate attacks compromising 51 percent of the network's computing resources, even if such power stays maliciously seized for almost a whole year. Moreover, RepuCoin provides better resilience to known attacks, compared to existing proof-of-work systems, while achieving a high throughput of 10000 transactions per second (TPS).
引用
收藏
页码:1225 / 1237
页数:13
相关论文
共 39 条
[1]  
Abraham I., 2017, OPODIS, P1
[2]  
[Anonymous], 2017, 31 INT S DISTR COMP
[3]  
[Anonymous], 2018239 CRYPT EPRINT
[4]   Hijacking Bitcoin: Routing Attacks on Cryptocurrencies [J].
Apostolaki, Maria ;
Zohar, Aviv ;
Vanbever, Laurent .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :375-392
[5]  
Back A., 2014, Enabling blockchain innovations with pegged sidechains
[6]  
Bano S., 2017, CONSENSUS AGE BLOCKC
[7]  
Bentov Iddo, 2014, ACM SIGMETRICS Performance Evaluation Review, V42, P34
[8]   State Machine Replication for the Masses with BFT-SMART [J].
Bessani, Alysson ;
Sousa, Joao ;
Alchieri, Eduardo E. P. .
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, :355-362
[9]   Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus [J].
Bonneau, Joseph .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 :19-26
[10]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461