Temporary Censorship Attacks in the Presence of Rational Miners

被引:32
作者
Winzer, Fredrik [1 ]
Herd, Benjamin [1 ]
Faust, Sebastian [2 ]
机构
[1] Robert Bosch GmbH, Corp Res, Stuttgart, Germany
[2] Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany
来源
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) | 2019年
关键词
smart contract; bribery; censorship; mechanism;
D O I
10.1109/EuroSPW.2019.00046
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart contracts allow for exchange of coins according to program rules. While it is well known that so called bribery contracts can influence the incentive mechanism of a Nakamoto-style consensus, we present a more fine-grained bribery attack incentivizing a temporary censorship against a specific account. To this end, we introduce three different bribery contracts on the blockchain where each uniquely manipulates the rewards that a rational miner would receive. Additionally, we formalize the established bribery mechanisms as a Markov game and show for each game the existence of equilibria leading to successful censorships. Finally, we compare the bribery mechanisms with respect to the scalability of the attack costs and the strategic dominance. Our work is motivated by off-chain protocols including payment and state channels which require to publish transactions within a certain amount of time. In such off-chain protocols a temporary censorship attack can result into significant financial damage.
引用
收藏
页码:357 / 366
页数:10
相关论文
共 20 条
[1]  
[Anonymous], 2018, BLOCKCHAIN INFO ESTI
[2]  
[Anonymous], 2014, White Paper
[3]  
[Anonymous], 2013, Feather-forks: Enforcing a blacklist with sub-50% hash power
[4]   RATIONALIZABLE STRATEGIC BEHAVIOR [J].
BERNHEIM, BD .
ECONOMETRICA, 1984, 52 (04) :1007-1028
[5]   Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus [J].
Bonneau, Joseph .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 :19-26
[6]   SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies [J].
Bonneau, Joseph ;
Miller, Andrew ;
Clark, Jeremy ;
Narayanan, Arvind ;
Kroll, Joshua A. ;
Felten, Edward W. .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :104-121
[7]   Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [J].
Dong, Changyu ;
Wang, Yilei ;
Aldweesh, Amjad ;
McCorry, Patrick ;
van Moorsel, Aad .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :211-227
[8]  
Dziembowski S., 2017, IACR CRYPTOL EPRINT, V2017, P635
[9]   General State Channel Networks [J].
Dziembowski, Stefan ;
Faust, Sebastian ;
Hostakova, Kristina .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :949-966
[10]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454