The Bitcoin Backbone Protocol: Analysis and Applications

被引:694
作者
Garay, Juan [1 ]
Kiayias, Aggelos [2 ]
Leonardos, Nikos [3 ]
机构
[1] Yahoo Labs, Sunnyvale, CA USA
[2] Univ Athens, Dept Informat & Telecommun, Athens, Greece
[3] Univ Paris 07, LIAFA, Paris, France
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II | 2015年 / 9057卷
关键词
DISTRIBUTED CONSENSUS; BYZANTINE; AGREEMENT;
D O I
10.1007/978-3-662-46803-6_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone, and prove two of its fundamental properties which we call common prefix and chain quality in the static setting where the number of players remains fixed. Our proofs hinge on appropriate and novel assumptions on the "hashing power" of the adversary relative to network synchronicity; we show our results to be tight under high synchronization. Next, we propose and analyze applications that can be built "on top" of the backbone protocol, specifically focusing on Byzantine agreement (BA) and on the notion of a public transaction ledger. Regarding BA, we observe that Nakamoto's suggestion falls short of solving it, and present a simple alternative which works assuming that the adversary's hashing power is bounded by 1/3. The public transaction ledger captures the essence of Bitcoin's operation as a cryptocurrency, in the sense that it guarantees the liveness and persistence of committed transactions. Based on this notion we describe and analyze the Bitcoin system as well as a more elaborate BA protocol, proving them secure assuming high network synchronicity and that the adversary's hashing power is strictly less than 1/2, while the adversarial bound needed for security decreases as the network desynchronizes.
引用
收藏
页码:281 / 310
页数:30
相关论文
共 38 条
  • [1] Andrychowicz M, 2014, IEEE SECURITY PRIVAC
  • [2] [Anonymous], 2012, P 13 ACM C EL COMM, DOI DOI 10.1145/2229012.2229022
  • [3] [Anonymous], 2008, Bitcoin: A peer-to-peer electronic cash system
  • [4] [Anonymous], 2014, ANONYMOUS BYZANTINE
  • [5] Aspnes James, 2005, YALEUDCSTR1332
  • [6] Secure Computation Without Authentication
    Barak, Boaz
    Canetti, Ran
    Lindell, Yehuda
    Pass, Rafael
    Rabin, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 720 - 760
  • [7] Bellare M., 1993, ACM CCS 93, P62
  • [8] Ben-Or M., 1983, Proceedings of the second annual ACM symposium on Principles of distributed computing, PODC'83, P27
  • [9] Ben-Sasson E, 2014, IACR CRYPTOLOGY EPRI, V2014, P349
  • [10] Bentov I., 2014, ACM CCS 2014