Conference PaperPDF Available

On the Security and Performance of Proof of Work Blockchains

Authors:

Abstract and Figures

Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of variant (forked) PoW blockchains (which were instantiated with different parameters) have not received much attention in the literature. This opens the question whether existing security analysis of Bitcoin's PoW applies to other implementations which have been instantiated with different consensus and/or network parameters. In this paper, we introduce a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains. Based on our framework, we devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints such as network propagation, different block sizes, block generation intervals, information propagation mechanism, and the impact of eclipse attacks. Our framework therefore allows us to capture existing PoW-based deployments as well as PoW blockchain variants that are instantiated with different parameters, and to objectively compare the tradeoffs between their performance and security provisions.
Content may be subject to copyright.
On the Security and Performance of Proof of Work
Blockchains
Arthur Gervais
ETH Zurich, Switzerland
arthur.gervais@inf.ethz.ch
Ghassan O. Karame
NEC Laboratories, Europe
ghassan.karame@neclab.eu
Karl Wüst
ETH Zurich, Switzerland
kwuest@student.ethz.ch
Vasileios Glykantzis
ETH Zurich, Switzerland
glykantv@student.ethz.ch
Hubert Ritzdorf
ETH Zurich, Switzerland
hubert.ritzdorf@inf.ethz.ch
Srdjan ˇ
Capkun
ETH Zurich, Switzerland
srdjan.capkun@inf.ethz.ch
ABSTRACT
Proof of Work (PoW) powered blockchains currently account for
more than 90% of the total market capitalization of existing digital
currencies. Although the security provisions of Bitcoin have been
thoroughly analysed, the security guarantees of variant (forked) PoW
blockchains (which were instantiated with different parameters)
have not received much attention in the literature.
In this paper, we introduce a novel quantitative framework to
analyse the security and performance implications of various con-
sensus and network parameters of PoW blockchains. Based on
our framework, we devise optimal adversarial strategies for double-
spending and selfish mining while taking into account real world
constraints such as network propagation, different block sizes, block
generation intervals, information propagation mechanism, and the
impact of eclipse attacks. Our framework therefore allows us to
capture existing PoW-based deployments as well as PoW blockchain
variants that are instantiated with different parameters, and to objec-
tively compare the tradeoffs between their performance and security
provisions.
1. INTRODUCTION
Since its inception in 2009, Bitcoin’s blockchain has fueled inno-
vation and a number of novel applications, such as smart contracts,
have been designed to take advantage of the blockchain. Bitcoin
has been forked a number of times in order to fine-tune the con-
sensus (i.e., the block generation time and the hash function), and
the network parameters (e.g., the size of blocks and the information
propagation protocol) and to increase the blockchain’s efficiency.
For instance, Litecoin and Dogecoin—Bitcoin’s most prominent
forks—reduce the block generation time from 10 to 2.5 and 1 minute.
Parallel to these efforts, alternative decentralised blockchain-based
networks (such as Ethereum) emerged with the ambition to optimize
the consensus and network parameters and to ease the deployment
of decentralised applications on top of the blockchain.
Although a number of consensus protocols (PBFT [5], Proof of
Stake [29], Proof of Elapsed Time [20]) have been proposed, most
existing blockchains leverage the computationally expensive Proof
of Work (PoW) consensus mechanism—which currently accounts
for more than 90% of the total market capitalization of existing
digital currencies. While the security provisions of Bitcoin have
been thoroughly analysed [14, 21, 30,32], the security guarantees
of variant PoW blockchains have not received much attention in the
literature. Recent studies hint that the performance of PoW based
blockchains cannot be enhanced without impacting their security.
However, the relationship between performance and security provi-
sions of PoW blockchains has so far not been studied
in much detail
.
PoW Blockchain
Optimal adversarial strategy
Stale block rate
Block propagation times
Throughput
Consensus & Network
Parameters
Security Provisions
Stale
block rate
Security
Parameters
Security Model
Figure 1: Components of our quantitative framework.
In this paper, we address this problem and provide a novel quan-
titative framework to analyse the security and performance im-
plications of various consensus and network parameters of PoW
blockchains. Leveraging our framework, we capture the security
properties of existing PoW instantiations (e.g., Bitcoin, Ethereum,
Litecoin, and Dogecoin) as well as other possible instantiations
subject to different consensus and network parameters.
Our framework (cf. Figure 1) consists of two key elements:
(i) a blockchain instance and (ii) a blockchain security model. A
blockchain instance is a PoW blockchain instantiated with a given
set of consensus and network parameters, such as network delays,
block generation times, block sizes, information propagation mech-
anisms, etc. For example, Bitcoin, Litecoin, and Ethereum corre-
spond to 3 different blockchain instances. To realistically capture
any other blockchain instance, we design a simulator that mim-
ics the blockchain consensus and network layer by implementing
advertisement-based information propagation, unsolicited block
pushes, the relay network, the sendheader propagation mechanism,
among others.
1
The main output of the blockchain instance is the
(measured or simulated) stale (orphan) block rate, which is fed as
input into our security model. On the other hand, our security model
is based on Markov Decision Processes (MDP) for double-spending
and selfish mining and allows us to reason about optimal adver-
sarial strategies while taking into account the adversarial mining
power, the impact of eclipse attacks, block rewards, and real world
network and consensus parameters—effectively captured by the
stale block rate.
Given the current discussions in the Bitcoin community about a
suitable maximum block size that ensures the scalability and growth
in the system [1], our work provides a way to holistically compare
the security and performance of PoW blockchains when subject
to different parameters—-including the block size. For instance,
1
We will make our simulator open-source at “address omitted due
to anonymization requirements”.
we find that increasing the block size from the current Bitcoin
transaction load (average 0.5MB) to up to 4 MB, does not signifi-
cantly affect the selfish mining and double-spending resilience of
the blockchain—provided that the block propagation mechanism en-
sures a low stale block rate. We summarize our findings
as follows.
Summary of findings
We show that selfish mining is not always a rational strat-
egy. To capture rational adversaries, we therefore quantify the
double-spending resilience of PoW blockchains and objec-
tively compare the security of different PoW blockchains with
respect to the required number of transaction confirmations.
By doing so, we provide merchants with the knowledge to
decide on the required number of confirmations for a given
transaction value to ensure security against double-spending.
Our results show that, due to the smaller block rewards and
the higher stale block rate of Ethereum
2
compared to Bitcoin
(from 0.41% to 6.8% due to the faster confirmation time),
Ethereum (block interval between 10 and 20 seconds) needs
at least 37 confirmations to match Bitcoin’s security (block
interval of 10 minutes on average) with 6 block confirmations
against an adversary with 30% of the total mining power.
Similarly, Litecoin would require 28, and Dogecoin 47 block
confirmations respectively to match the security of Bitcoin.
We show that the higher the block reward of a blockchain (in
e.g., USD) the more resilient it is against double-spending.
Finally, we analyze the impact of changing the block size
and/or the block interval on selfish mining and double-spending.
Our results surprisingly show that setting the block size to
an average 1 MB, and decreasing the block interval time to
1 minute do not considerably penalize security. Our results
therefore suggest that PoW blockchains can attain an effec-
tive throughput above 60 transactions per second (tps) (which
implies that the current throughput of Bitcoin of 7 tps can be
substantially increased) without compromising the security
of the system.
The remainder of the paper is organized as follows. In Section 2,
we overview the basic concepts behind PoW blockchain. In Sec-
tion 3, we introduce our MDP model to quantitatively analyze the
security of PoW blockchains. In Section 4, we present our simulator
and evaluate the security and performance of a number of variant
PoW-based blockchain instances. In Section 5, we overview related
work, and we conclude the paper in Section 6.
2. BACKGROUND
In this section, we briefly recap the operations of the consensus
layer and the network layer of existing PoW blockchains.
2.1 Consensus Layer
The proof of work (PoW) consensus mechanism is the widest
deployed consensus mechanism in existing blockchains. PoW was
introduced by Bitcoin [27] and assumes that each peer votes with
his “computing power” by solving proof of work instances and
constructing the appropriate blocks. Bitcoin, for example, employs
a hash-based PoW which entails finding a nonce value, such that
when hashed with additional block parameters (e.g., a Merkle hash,
the previous block hash), the value of the hash has to be smaller
than the current target value. When such a nonce is found, the
miner creates the block and forwards it on the network layer (cf.
2
We show that, contrary to common beliefs, Ethereum does not
apply GHOST’s principle to include the contributions of “uncles” in
the main chain and therefore currently resembles Bitcoin.
Section 2.2) to its peers. Other peers in the network can verify the
PoW by computing the hash of the block and checking whether it
satisfies the condition to be smaller than the current target value.
Block interval:
The block interval defines the latency at which
content is written to the blockchain. The smaller the block interval is,
the faster a transaction is confirmed and the higher is the probability
of stale blocks. The block interval adjustment directly relates to
the difficulty change of the underlying PoW mechanism. A lower
difficulty results in a larger number of blocks in the network, while
a higher difficulty results in less blocks within the same timeframe.
It is therefore crucial to analyse whether changing the difficulty
affects the adversarial capabilities in attacking the longest chain—
which is the main pillar of security of most PoW-based blockchains.
This also implies the adjustment of the required number of con-
firmations that a merchant should wait in order to safely accept
transactions (and avoid double-spending attacks) (cf. Section 3).
2.1.1 PoW security
PoW’s security relies on the principle that no entity should gather
more than 50% of the processing power because such an entity can
effectively control the system by sustaining the longest chain. We
now briefly outline known attacks on existing PoW-based blockchains.
First, an adversary can attempt to double-spend by using the same
coin(s) to issue two (or more) transactions—thus effectively spend-
ing more coins than he possesses. Recent studies have shown that
accepting transactions without requiring blockchain confirmations
is insecure [21]. The more confirmations a transaction obtains, the
less likely this transaction will be reversed in the future.
Second, miners might attempt to perform selfish mining [14] at-
tacks in order to increase their relative mining share in the blockchain,
by selectively withholding mined blocks and only gradually pub-
lishing them [14, 31]. Recent studies show that, as a result of these
attacks, a selfish miner equipped with originally 33% mining power
can effectively earn 50% of the mining power.
Double-spending attacks and selfish mining can be alleviated if
all nodes in the blockchain system are tightly synchronised. Note
that, in addition to network latency, synchronisation delays can be
aggravated due to eclipse attacks [16,17] where an adversary creates
a logical partition in the network, i.e., provides contradicting block
and transaction information to different blockchain network nodes.
2.2 Network Layer
On the network layer, we identify two main parameters that are
of particular importance for PoW-based blockchains, namely: the
block size, and the information propagation mechanism.
2.2.1 Block size
The maximum block size indirectly defines the maximum number
of transactions carried within a block. This size therefore controls
the throughput attained by the system. Large blocks incur slower
propagation speeds, which in turn increases the stale block rate (and
weaken the security of the blockchain as stated earlier).
2.2.2 Information propagation mechanism
The block request management system dictates how information
is delivered to peers in the network. Eventually, since all peers
are expected to receive all blocks, a broadcast protocol is required.
The choice of the underlying broadcast protocol clearly impacts the
robustness and scalability of the network (cf. Section 4). In what
follows, we briefly describe well-known network layer implementa-
tions of existing PoW-based blockchains.
Advertisement-based information dissemination:
Most PoW
blockchains propagate messages with the help of an advertisement-
based request management system. If node
A
receives information
about a new object (e.g., a transaction or a block) from another node,
A
will advertise this object to its other connections (e.g. node
B
) by
sending them an inv message (the hash and type of the advertised
object). Only if node
B
has not previously received the advertised
object,
B
will request the object from
A
with a getdata request.
Node
A
will subsequently respond with a Bitcoin object, e.g., the
contents of a transaction or a block.
Send headers:
Peers can alternatively issue a sendheaders mes-
sage in order to directly receive block headers in the future from
their peers—skipping the use of inv messages. This reduces the
latency and bandwidth overhead of block message propagation and
is adopted by Bitcoin since version 0.12.
Unsolicited block push:
This mechanism enables miners to broad-
cast their generated blocks without advertisement (i.e., since they
mined the block). Note that this push system is recommended
3
, but
not implemented in Bitcoin.
Relay networks:
Relay networks [6] primarily enhance synchro-
nization of miners that share a common pool of transactions. Trans-
actions are typically only referenced in relayed blocks with a trans-
action ID (2 bytes per transaction instead of an average of 250
bytes per transaction). As a consequence, the resulting block size is
smaller than the regular block (cf. Bitcoin Relay Network [6]).
Hybrid Push/Advertisement Systems:
A number of systems, such
as Ethereum, combine the use of push and advertisement dissemina-
tion. Here, a block is directly pushed to a threshold number of peers
(e.g., Ethereum directly pushes blocks to
n
peers, where
n
is the
total number of neighbors connected to the peer). Concurrently, the
sender advertises the block hash to all of its neighbors.
2.3 Stale blocks
Stale blocks refer to blocks that are not included in the longest
chain, e.g., due to concurrency, conflicts. Stale blocks are detrimen-
tal to the blockchain’s security and performance because they trigger
chain forks—an inconsistent state which slows down the growth of
the main chain and results in significant performance and security
implications. On the one hand, stale blocks increase the advantage
of the adversary in the network (e.g., double-spending). On the
other hand, stale blocks result in additional bandwidth overhead and
are typically not awarded mining rewards (except in Ethereum).
In an experiment that we conducted, we measure the stale block
rate in the Bitcoin (block generation time = 10 minutes, average
block size
= 534.8
KB), Litecoin (block generation time = 2.5 min-
utes, average block size
= 6.11
KB) and Dogecoin (block generation
time = 1 minute, average block size
= 8
KB) network. All three
blockchains rely on a PoW-based blockchain (with different gen-
eration times) and the same information propagation system (with
different block sizes).
We crawled the available nodes in Litecoin and Dogecoin [3] in
February 2016 and found about 800 and 600 IP addresses respec-
tively. We then measured the block propagation times by registering
the times at which we receive the block advertisements from a par-
ticular block from all our connections in the respective network [9].
We operated one node for Litecoin and Dogecoin, which we con-
nected to 340 and 200 peers, respectively. Once one of these peers
advertises block information in form of either (i) a new hash of a
block (inv message) or (ii) a block header (headers message), we
registered the time this block information appeared. Every sub-
sequent reception of a particular piece of block information then
provides information about the propagation of the block.
3https://bitcoin.org/en/developer-reference#data-messages
Bitcoin Litecoin Dogecoin Ethereum
Block interval 10 min 2.5 min 1 min 10-20 seconds
Public nodes 6000 800 600 4000 [11]
Mining pools 16 12 12 13
tMB P 8.7 s [8] 1.02 s 0.85 s 0.5 - 0.75 s [12]
rs0.41% 0.273% 0.619% 6.8%
sB534.8KB 6.11KB 8KB 1.5KB
Table 1: Comparison of different Bitcoin forks, Ethereum and the
impact of parameter choices on the network propagation times. Stale
block rate (
rs
) and average block size (
sB
) were measured over the
last 10000 blocks.
tMB P
stands for median block propagation time.
Our results (cf. Table 1) suggest that the stale block rate indeed
largely depends on the block interval and the block sizes. For
instance, unlike Dogecoin and Litecoin, Bitcoin features larger block
sizes due to a higher transaction load (of up to 1MB which results
in a higher stale block rate (0.41% vs. 0.273%)—although the block
interval of Bitcoin is 4 times longer than that of Litecoin. Moreover,
the stale block rate differences between Litecoin and Dogecoin are
mainly due to the difference in the block interval (2.5 minutes vs.
1 minute), since their average block sizes are comparable (6.11KB
and 8KB). Given a confirmation time reduction of 60%, the stale
block rate increased by 127% from Litecoin to Dogecoin.
Notice that in Ethereum, uncle blocks correspond to stale blocks
that are referenced in the main chain. The uncle block rate in
Ethereum is almost 6.8%, compared to a stale block rate of 0.41%
in Bitcoin. In Section 3, we study the impact of the stale block rate
on the security of PoW blockchains.
3. POW SECURITY MODEL
In this section, we introduce our blockchain security model that
we leverage to quantify the optimal adversarial strategies for double-
spending and selfish mining. We then use these strategies as a basis
to compare the security provisions of PoW-based blockchains when
instantiated with different parameters.
3.1 Security Model
Our model extends the Markov Decision Process (MDP) of [31]
to determine optimal adversarial strategies, and captures:
Stale block rate
The stale block rate
rs
allows us to account for
different block sizes, block intervals, network delays, infor-
mation propagation mechanisms and network configuration
(e.g., number of nodes).
Mining power α
is the fraction of the total mining power of the
adversary (the rest is controlled by the honest network).
Mining costs
The adversarial mining costs
cm[0, α]
correspond
to the expected mining costs of the adversary (i.e., total min-
ing costs such as hardware, electricity, man-power) and are
expressed in terms of block rewards. For example, if
cm=α
,
the mining costs of the adversary are equivalent to its min-
ing power times the block reward, i.e., the mining costs are
covered exactly by the earned block revenue in honest mining.
The number of block confirmations k
This corresponds to the num-
ber of blocks that need to confirm a transaction, such that a
merchant accepts the transaction.
Propagation ability
The propagation parameter
γ
captures the con-
nectivity of the adversary within the network (i.e., captures
the fraction of the network that receives the adversary’s blocks
in the case when the adversary and the honest miner release
their blocks simultaneously in the network).
The impact of eclipse attacks
Our model accounts for eclipse at-
tacks. Here, we assume that the miners of the honest network
are affected by the stale block rate, while the adversary and
the colluding eclipsed victims do not mine stale blocks. This
is due to the fact that the adversary can use any mined blocks
for an attack and effectively only has a small chance of min-
ing a stale block after adopting the honest chain. Therefore,
in practice, the adversary exhibits a significantly lower real
stale block rate than the honest network. The honest network
features propagation and validation delays—hence it will wit-
ness a higher stale block rate. Note that the blocks found by
the eclipsed victim can also count towards the private chain
of the adversary.
We contrast this to existing models, such as Sapirshtein et al.s [31],
which only focus on selfish mining and cannot capture different
blockchain instances (with various stale block rates and confirma-
tions) and real-world parameters such as network delays.
To analyze optimal double-spending strategies, we define the
double-spending amount
vd
that corresponds to the minimum trans-
action value that makes double-spending more profitable than honest
mining. We argue that
vd
emerges as a robust metric to quantify secu-
rity under double-spending attacks. Namely, if the reward of honest
mining is larger than that of dishonest behaviour, merchants can
safely accept a payment transaction of value
vd
(since such a value
is considered secure, e.g., based on a given confirmation number).
If however, adversarial behaviour is financially more rewarding, a
merchant should be aware of the associated double-spending risks
and of the related incentives of miners.
We capture the blockchain model using a single-player decision
problem
M:= hS, A, P, Ri
where all other participants follow the
standard protocol, and
S
corresponds to the state space,
A
to the
action space,
P
to the stochastic transition matrix, and
R
to the
reward matrix. We instantiate
M
as a Markov Decision Process
(MDP) as outlined in Section 3.2 and 3.3.
In our model, the following actions are available to the adversary:
Adopt
The adversary accepts the chain of the honest network,
which effectively corresponds to a restart of the attack. This
action is appropriate if the adversary deems that the likelihood
to win over the honest chain is small.
Override
The adversary publishes one block more than the honest
chain has and consequently overrides conflicting blocks. This
happens when the adversary’s secret chain is longer than the
currently known public chain (i.e.
la> lh
) and it is optimal
for the adversary to publish
lh+ 1
of his blocks to replace the
honest network’s chain with his own. If the adversary exploits
the mining power of the victim, the adversary might use
be
blocks from the victim for an override action.
Match
The adversary publishes as many blocks as the honest chain
has, and triggers an adoption race between the two chains
instead of overriding the honest chain.
Wait
The adversary continues mining on its hidden chain until a
block is found.
Exit
This action is only relevant when studying double-spending
as it corresponds to a successful double-spending with
k
con-
firmations and is only feasible if la> lhand la> k.
The state space
S
is defined as a four-tuple of the form
(la, lh, be,fork)
,
where
la
and
lh
represent the length of the adversarial and honest
chain respectively,
be
the blocks mined by the eclipsed victim, and
fork can take three values, irrelevant,relevant and active:
relevant
The label
relevant
signifies that (i) the last block has been
found by the honest network, and (ii) if
lalh
the match
action is applicable. A state of the form
(la, lh1, be,·)
for
instance results in (la, lh, be,relevant).
irrelevant
When the adversary found the last block, the previous
block has likely already reached the majority of the nodes in
the network. The adversary is therefore not able to perform a
match action. A state of the form
(la1, lh, be,·)
for instance
results in (la, lh, be,irrelevant).
active
The state is described with the label active, if the adversary
performed a match action, i.e., the network is currently split
and in process of determining the longest chain.
In our model, every state transition (except exit) corresponds to
the creation of a block. Consequently, a state transition implies a
reward for the honest network, the adversary, or the eclipsed victim.
Given the adversarial mining power α, the initial state (0,0,0,
irrelevant)
transitions to
(1,0,0,irrelevant)
with probability
α
,
i.e., the adversary found one block. If the honest network finds
a non-stale block, the resulting state is
(0,1,0,relevant)
. On the
other hand, if the honest network’s block results in a stale block, the
state remains
(0,0,0,irrelevant)
since a stale block does not count
towards the longest chain. The last case accounts for the eclipsed
victim which finds a block with probability
ω
, resulting in state
(1,0,1,irrelevant).
Selfish Mining vs. Double-spending.
In this work, we consider double-spending and selfish mining
independently, since selfish mining is not always a rational strategy:
the objective of selfish mining is to increase the relative share of the
adversarial blocks committed to the main chain, while in double-
spending the adversary aims to maximize his absolute revenue.
Namely, as long as the difficulty of a PoW blockchain does
not change (e.g. Bitcoin’s difficulty changes only once every two
weeks), selfish mining yields fewer block rewards than honest min-
ing. In honest mining, the adversary is rewarded for every mined
block, while he will lose any previously mined blocks when adopt-
ing the main chain in selfish mining. Since the adversary has less
mining power than the honest network, he has a high probability of
falling behind the main chain, causing him to adopt the main chain
when he has no significant chance of catching up—which in turn
leads to lost block rewards. For instance, following our optimal
selfish mining strategy (cf. Section 3.2.1), an adversary with 30% of
the mining power earns 209 block rewards on average in a duration
where 1000 blocks are mined by the whole network (as opposed
to 300 for honest mining). Similarly, Eyal and Sirer’s [14] strategy
yields on average 205.80 blocks rewards.
Eclipse attacks.
In an eclipse attack, a fraction
ω
of the overall mining power
is eclipsed [17, 28] from receiving information from the honest
network. Here, a number of eclipse attack variants arise:
No eclipse attack This case is captured in our model if ω= 0.
Isolate the victim
This is captured implicitly in our model. Namely,
this corresponds to a decrease of the total mining power and
thus an increase of the attacker mining power to α0=α
1ω.
Exploit the eclipsed victim
Here, the adversary exploits the vic-
tim’s mining power
ω
and uses it to advance his private chain.
This is the most likely choice of a rational adversary when
performing double-spending attacks. In this case, we assume
that the victim is fully eclipsed from the network and does not
receive/send blocks unless permitted by the adversary [17,28].
3.2 Selfish Mining MDP
Our goal is to find the optimal adversarial strategy for selfish
mining. Recall that the objective of the adversary in selfish mining
is not to optimise the absolute reward, but to increase the share
of blocks that are included in the chain accepted by the network.
We capture this by optimising the relative revenue
rrel
defined in
Equation 1, where
rai
and
rhi
are the rewards in step
i
for the
adversary and the honest network, respectively:
rrel =Elim
n→∞ Pn
i=1 rai
Pn
i=1(rai+rhi)(1)
Since an adversary aims to increase his relative reward
rrel
(Equa-
tion 1) in selfish mining, as opposed to the absolute reward, the
single-player decision problem cannot be modelled directly as an
MDP, because the reward function is non-linear. In order to trans-
form the problem into a family of MDPs, we apply the technique of
Sapirshtein et al.’s [31], which we describe below.
We assume that the value of the objective function (i.e., the op-
timal relative reward) is
rho
and define for any
ρ[0,1]
the
transformation function
wρ:N2R
with the adversarial reward
raand the reward of the honest network rhin Equation 2.
wρ(ra, rh) = (1 ρ)·raρ·rh(2)
This results in an infinite state MDP
Mρ=hS, A, P, wρ(R)i
for each
ρ
that has the same action and state space as the original
decision problem and the same transition matrix but the reward
matrix is transformed using
wrho
. The expected value of such an
MDP under policy
π
is then defined by
vπ
ρ
in Equation 3, where
ri(π)is the reward tuple in step iunder policy π.
vπ
ρ=E"lim
n→∞
1
n
n
X
i=1
wρ(ri(π))#(3)
The expected value under the optimal policy follows:
v
ρ= max
πAvπ
ρ(4)
To optimise rrel we adopt the following propositions [31]:
1.
If
v
ρ= 0
for some
ρ[0,1]
, then an optimal policy
π
in
the transformed MDP
Mρ
also maximises
rrel
and
rrel =ρ
.
2. v
ρis monotonically decreasing in ρ.
Since standard MDP solvers are not able to solve infinite state
MDPs, we restrict the state space of our family of MDPs by only
allowing either chain to be of length at most
c
, resulting in a finite
state MDP
Mc
ρ
. If either chain reaches length
c
, the adversary is
only allowed to perform the override or adopt action. This gives a
lower bound for the optimal value of the infinite state MDP.
Intuitively, we can reason about the correctness of the first propo-
sition as follows for the bounded single-player decision problem. In
a recurring finite state MDP, the initial state will be visited again in
expectation after some finite number of steps
S
. During that time,
the adversary gains an expected reward of
Ra=EhPS
s=1 raii
and
the honest network gains a reward of
Rh=EhPS
s=1 rhii
in the
original (bounded) decision problem. It follows that the expected
reward per step in the Markov Chain is
ra=Eh1
SPS
s=1 raii
and
rh=Eh1
SPS
s=1 rhii
for the adversary and the honest network,
respectively. We can thus simplify the expected relative revenue
rrel to:
rrel =Elim
n→∞ Pn
i=1 rai
Pn
i=1(rai+rhi)(5)
=Elim
n→∞
n·ra
n·(ra+rh)(6)
=Elim
n→∞
ra
(ra+rh)(7)
=Era
ra+rh(8)
=ra
ra+rh
(9)
(10)
Additionally, we develop v
ρas follows:
v
ρ=vπ
ρ(11)
=E"lim
n→∞
1
n
n
X
i=1
wρ(ri(π))#(12)
=E"lim
n→∞
1
n
n
X
i=1
((1 ρ)·raiρ·rhi)#(13)
=E"lim
n→∞
1
n (1 ρ)·
n
X
i=1
raiρ·
n
X
i=1
rhi!# (14)
=Elim
n→∞
1
n(n·(1 ρ)·ran·ρ·rh)(15)
=Elim
n→∞
((1 ρ)·raρ·rh)(16)
=E[(1 ρ)·raρ·rh](17)
= (1 ρ)·raρ·rh(18)
And thus, for the case where ρ=rrel =ra
ra+rh:
v
ρ= (1 ρ)·raρ·rh(19)
= (1 ra
ra+rh
)·rara
ra+rh·rh(20)
=ra·(ra+rh)ra2
ra+rhra·rh
ra+rh
(21)
=ra2+ra·rhra2ra·rh
ra+rh
(22)
= 0 (23)
The reasoning for the second proposition is straightforward. For
any given policy
π
, it holds for
ρ > ρ0
that
wρ(ra, rh)wρ0(ra, rh)
for every transition with rewards
ra
and
rh
for the adversary and
the honest network, respectively. It follows directly that
vπ
ρvπ
ρ0
for every policy
π
and thus
v
ρv
ρ0
, i.e.,
v
ρ
is monotonically
decreasing in ρ.
We use binary search on our restricted family of MDPs for
ρ
[0,1]
in order to find the
ρ
for which the expected value in the
instantiated MDP is zero and which therefore maximizes the reward
in the original single-player decision problem [31]. Since
v
ρ
is
monotonically decreasing, this can be done efficiently as follows:
function OPTIMAL STRATEGY(c, )
low 0
high 1
repeat
ρ(low +high)/2
(π, v
ρ)MDP_SO LVER (Mc
ρ)
if v
ρ>0then
low ρ
else
high ρ
end if
until high low < 
return π, ρ
end function
As far as we are aware, this is the first selfish mining model that
(i) captures various parameters such as block propagation times,
block size, block generation interval, and (ii) known network vul-
nerabilities such as eclipse attacks. Note that we do not consider
mining costs in the selfish mining MDP since the objective here is
to increase the relative mining share (and not the monetary reward).
3.2.1 Optimal Strategies for Selfish Mining
In order to solve the MDP’s, we apply an MDP solver for finite
state space MDPs [18], and use a cutoff value of 30 blocks.
We first analyse the impact of the stale block rate on selfish
mining. In Figure 2, we compare selfish mining under a stale block
rate of
1%
and
10%
, and we observe that the higher the adversarial
mining power, the bigger the relative revenue of a selfish miner
grows (up to a maximum difference of 0.074). For comparison
purposes, we plot an upper bound
α
1α
of the adversarial relative
revenue from selfish mining which corresponds to the case where
the adversary’s advantage is maximized by utilizing one block to
override one block generated by the honest network (as reported by
Sapirshtein et al. [31]). As we observe, this upper bound is exceeded
when taking into account network delays and parameters that we
capture via the stale block rate.
For an adversary with a mining power of
α= 0.1
and
α=
0.3
respectively, we observe in Figure 3 that there is a non-linear
relationship between the stale block rate and the relative mining
revenue of selfish mining.
We moreover study the impact of eclipse attacks on selfish mining
in Figure 4. Here, we only consider the case where the adversary (i)
exploits the victims mining power
ω
, and (ii) uses all the victim’s
blocks to advance his private chain. We therefore only determine the
optimal adversarial choices given these restraints. We observe that
the higher
ω
, the stronger his selfish mining capabilities become. We
note that for some values of
ω
(e.g.,
ω= 0.3
,
α= 0.38
), it is more
rewarding for the adversary not to include some of the victims block
in his private chain. This is because the victim’s block rewards count
towards the reward of the honest network, and therefore reduce the
relative block share of the adversary.
3.3 Double-Spending MDP
Unlike selfish mining where the optimal strategy is not always
financially rewarding compared to honest mining (cf. Section 3), we
proceed in what follows to study optimal double-spending strategies,
where we assume a rational adversary that is interested in maximiz-
ing his benefits (measured in financial gains) in the network.
We implicitly require that each time the adversary starts a double-
spending attack (e.g. after an adopt action), he publishes a transac-
tion
Tl
in the network, and mines on including a conflicting transac-
tion
Td
in his private chain. We assume that the operational costs of
“losing” a double-spending attempt are small, since the adversary
effectively receives a good or service in exchange for transaction
Tl
.
In addition to the states described for the selfish mining, the
double-spending MDP features the exit state (cf. Table 2). This state
can only be reached provided that the adversarial chain is at least
one block ahead the honest chain (
la> lh
), after
k
confirmations
(
la> k
), given an honest network with mining power
1α
. Before
reaching the exit state, the adversary adopts an optimal strategy to
maximize its reward, given the state and action space described in
Section 3. After reaching the exit state, transitions back to the exit
state model rewards of honest mining. Note that since we assume
that the adversary is rational, an optimal strategy might advise
against performing double-spending attacks (i.e. the adversary will
never reach the exit state)—depending on the value of the attempted
attack. In the exit state, the adversary earns a block reward of
labe+vd
,
b(lh+ 1) labe
laccm
block rewards after an override
with eclipse attack (because the adversary’s reward needs to discount
the
be
victim’s blocks and
b(lh)labe
lac − cm
block rewards if the
adversary’s chain wins the race after a match action. For every state
transition we discount the mining costs cm.
The adversary either abides by the optimal double-spending strat-
egy
π
or performs honest mining, depending on the expected reward.
We are therefore interested in the minimal double-spending value
vd
, such that
vd
is strictly larger than the honest mining reward (cf.
Equation 25).
P= (α, γ, rs, k , ω, cm)(24)
vd= min{vd|∃πA:R(π, P, vd)> R(honest mining, P )}
(25)
The double-spending value
vd
can serve as a generic metric to
compare the security of various blockchain instantiations. Namely,
if
vd
of a blockchain instance
A
is bigger than for blockchain
B
for given
α
,
γ
and
ω
, then blockchain
A
can be considered more
resistant against double-spending attacks.
3.3.1 Optimal Strategies for Double-Spending
In what follows, we analyze the solutions of our aforementioned
double-spending MDP given various parameters. To solve for the
optimal strategy in our MDP, we rely on the pymdptoolbox library
4
and apply the PolicyIteration algorithm [18] with a discount value
of 0.999. This methodology allows us to assess whether the number
of transaction confirmations
k
are sufficient to ensure security in
the presence of a rational adversary, with respect to the considered
transaction value. That is, if the adversary has a higher expected
financial gain in double-spending than honest mining, then the
transaction cannot be considered safe given
k
confirmations, and
the merchant should wait additional confirmations.
In order to decide whether the adversary should choose to follow
the optimal double-spending policy or honest mining (cf. Equa-
tion 25), and to determine the minimum
vd
, we instantiate the
double-spending MDP with a high double-spending value (
>109
block rewards), such that the exit state is reachable in the optimal
policy. If the policy contains an exit state, the expected gain of fol-
lowing the optimal double-spending strategy is higher than honest
mining. Otherwise, honest mining is the preferred strategy. We
apply binary search to find the lowest double-spending value (in
units of block rewards, within an error margin of
0.1
), for
α
,
k
,
rs
,
γand cm.
In Table 3, we sketch an example of an optimal strategy for the
case where
α= 0.3
(adversarial mining power),
γ= 0
(propagation
parameter),
cm=α
(maximum mining costs),
ω= 0
(no eclipse
4https://github.com/sawcordwell/pymdptoolbox
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
0.0
0.2
0.4
0.6
0.8
1.0
Relative revenue
selfish mining, rs= 1.00%
selfish mining, rs= 10.00%
α
1α
honest mining
Figure 2: Selfish mining for rsof 1%,10%.
0.0 0.1 0.2 0.3 0.4 0.5
Stale rate rs
0.0
0.2
0.4
0.6
0.8
1.0
Relative revenue
α= 0.1
α= 0.3
Figure 3: Selfish mining for
α= 0.1
and
0.3
.
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
0.0
0.1
0.2
0.3
0.4
0.5
Eclipsed mining power ω
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
Relative Revenue
Figure 4: Selfish mining with eclipse attacks.
State ×Action Resulting State Probability Reward (in Block reward)
(la, lh, be,·),adopt
(1,0,0, i)
(1,0,1, i)
(0,1,0, r)
(0,0,0, i)
α
ω
(1 αω)·(1 rs)
(1 αω)·rs
(cm, lh)
(cm, lh)
(cm, lh)
(cm, lh)
(la, lh, be,·),override lalh,0, be− d(lh+ 1) be
lae, iαb(lh+ 1) labe
lac − cm,0
lalh,0, be− d(lh+ 1) be
lae+ 1, iωb(lh+ 1) labe
lac − cm,0
lalh1,1, be− d(lh+ 1) be
lae, r(1 αω)·(1 rs)b(lh+ 1) labe
lac − cm,0
lalh1,0, be− d(lh+ 1) be
lae, i(1 αω)·rsb(lh+ 1) labe
lac − cm,0
(la, lh, be, i),wait
(la, lh, be, r),wait
(la+ 1, lh, be, i)
(la+ 1, lh, be+ 1, i)
(la, lh+ 1, be, r)
(la, lh, be, i)
α
ω
(1 αω)·(1 rs)
(1 αω)·rs
(cm,0)
(cm,0)
(cm,0)
(cm,0)
(la, lh, be, a),wait
(la, lh, be, r),match
(la+ 1, lh, be, a)α(cm,0)
(la+ 1, lh, be+ 1, a)ω(cm,0)
(lalh,1, be− d(lh)be
lae, r)γ·(1 αω)·(1 rs)b(lh)labe
lac − cm,0
(la, lh+ 1, be, r) (1 γ)·(1 αω)·(1 rs) (cm,0)
(la, lh, be, a) (1 αω)·rs(cm,0)
(la, lh, be,·),exit exit 1 (labe+vd,0)
Table 2: State transition and reward matrices for optimal selfish mining and double-spending strategies in PoW blockchains.
α
is the mining
power of the attacker,
ω
is the mining power of the eclipsed node,
be
is the number of blocks in the attacker chain that were mined by the
eclipsed node,
γ
is the fraction of nodes that an attacker can reach faster than the honest network,
rs
is the stale block rate and
vd
is the value
of the double-spend. The actions
override
and
match
are feasible only when
la> lh
or
lalh
, respectively. We discount the mining costs
cm[0, α]
in the state transition reward only for double-spending. The fork label (last element of the state) is denoted by i,rand afor
irrelevant,relevant and active respectively. For a reward tuple
(a, b)
,
a
corresponds to the adversary’s costs, while
b
represents the reward for
the honest network for selfish mining.
attack), where we observe only wait,adopt and exit actions. Because
we can only solve finite MDPs, we choose a cutoff value of 20
blocks, i.e., neither the chain of the adversary nor the chain of the
honest network can be longer than the cutoff value. In the following
paragraphs, we discuss in greater details the impact of
α
,
γ
,
cm
,
rs
,
k
,
vd
and
ω
on the optimal double-spending strategy and its
implications on the security of transaction confirmations.
Recall that the absorbing state [22] of the Markov chain of our
double-spending MDP is the exit state. By computing the funda-
mental matrix [22] of the Markov chain, we calculate the expected
number of steps in the Markov chain—before being absorbed by the
exit state. These steps correspond to the expected number of blocks
required for a successful double-spending attack. In Figure 5, we
evaluate the expected number of blocks with respect to the adversar-
ial mining power and the number of transaction confirmations
k
. We
observe that an adversary with a mining power of more than
0.25
is expected to need less than 1000 blocks for a successful double-
spending attack (up to
k= 10
confirmations), which corresponds
to a one week attack duration in Bitcoin.
Impact of the propagation parameter:
Recall that the propaga-
tion parameter specifies the connection capability of the adversary.
In Figure 8, we depict the minimum double-spending transaction
value that would result in financial gain when compared to honest
mining (cf. Equation 25) when
γ= 0,0.5
and
1
respectively. Re-
call that a merchant is safe as long as he accepts transactions with a
value less than vdgiven these parameters.
Clearly, the higher
γ
is, the lower is the transaction value that an
adversary is expected to double-spend. For example, if the adversary
has
α= 0.3
of the hashing power in the network, assuming
k= 6
confirmations, and a mining cost of
cm=α
, a double-spending
strategy is clearly profitable if the double-spending transaction has
a value of at least
0.5
block rewards (one block reward is 25 Bit-
coin, where one Bitcoin is about 436.7 USD at the time of writing,
for
rs= 0.41%
) when
γ= 1
. When
γ= 0.5
, the minimum
transaction value increases to 12.9 block rewards.
Impact of the mining costs:
In Figure 6, we analyze the impact of
the mining costs on the minimum required double-spending trans-
action value. Our results show that mining costs have negligible
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
101
102
103
104
105
106
Exp. num. of blocks
k = 12
k = 10
k = 8
k = 6
k = 4
k = 2
k = 1
Figure 5: Expected number of blocks for
successful double-spending given
rs=
0.41%, γ = 0, cm=αand ω= 0.
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
101
100
101
102
103
104
105
106
vd
cm= 0
cm=α
vd
Figure 6: Impact of the mining cost
cm
on
the security of double spending (
rs= 0.41%
,
γ= 0
,
ω= 0
).
vd
is the difference in costs.
0.0 0.1 0.2 0.3 0.4 0.5
Stale rate rs
100
101
102
103
104
vd
α= 0.1
α= 0.3
Figure 7: Impact of stale block rate
rs
on the
security of double-spending given
γ= 0.5
,
ω= 0 for α= 0.1,α= 0.3and k= 6.
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
101
100
101
102
103
104
105
106
vd
k = 12
k = 10
k = 8
k = 6
k = 4
k = 2
k = 1
(a) γ= 0
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
101
100
101
102
103
104
105
106
vd
k = 12
k = 10
k = 8
k = 6
k = 4
k = 2
k = 1
(b) γ= 0.5
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
101
100
101
102
103
104
105
106
vd
k = 12
k = 10
k = 8
k = 6
k = 4
k = 2
k = 1
(c) γ= 1
Figure 8: Impact of the propagation parameter
γ
. We observe that the higher is
γ
, the lower is
vd
for double-spending to be more profitable
than honest mining. rs= 0.41% (Bitcoin’s stale block rate), cm=α(maximum mining costs), ω= 0 (no eclipse attack).
lh
la012345678
0w** *a* *** *** *** *** *** *** ***
1w** ww* ww* *a* *** *** *** *** ***
2w** ww* ww* ww* ww* *a* *** *** ***
3w** ww* ww* ww* ww* ww* *a* *** ***
4w** ww* ww* ww* ww* ww* ww* *a* ***
5w** ww* ww* ww* ww* ww* ww* ww* *a*
6w** ww* ww* ww* ww* ww* ww* ww* ww*
7e** e** e** e** e** e** e** w** ww*
8*** *** *** *** *** *** *** e** w**
Table 3: Optimal double-spending strategy for
α= 0.3, γ =
0, rs= 0.41%, cm=α, ω = 0
and
vd= 19.5
. The rows cor-
respond to the length
la
of the adversary’s chain and the columns
correspond to the length
lh
of the honest network’s chain. The three
values in each table entry correspond to the fork labels irrelevant,
relevant and active, where *marks an unreachable state and w,a
and edenote the wait,adopt and exit actions, respectively.
impact on the adversarial strategy.
Impact of the stale block rate:
We evaluate the impact of the stale
block rate for adversaries with a mining power of
α= 0.1
and
α= 0.3
in Figure 7. We observe that there exists a non-linear
relationship between the stale block rate and the double-spending
value and that the higher the stale block rate, the worse is the double-
spending and selfish mining resistance of a PoW blockchain (cf.
Figure 7). For instance, for an adversary with mining power
α= 0.3
and a stale block rate of 10% and 20%, the double-spending value
vd
decreases from
9.2
to
6.4
block rewards. Similarly, the relative
revenue from selfish mining (cf. Figure 3) increases from
0.37
to
0.43.
Impact of eclipse attacks
We evaluate the impact of eclipse attacks
on the adversarial strategy given our MDP. We assume that the
adversary eclipses a victim with mining power
ω
in order to increase
its advantage in sustaining his blockchain (cf. Figure 9). We observe
that an eclipse attack clearly empowers the adversary, since it allows
the adversary to effectively increase its overall mining power. For
instance, an adversary with
α= 0.1
can reduce the double-spending
value
vd
from
880
block rewards to
0.75
block reward if eclipsing a
miner with ω= 0.025.
3.3.2 Bitcoin vs. Ethereum
In order to alleviate the problem that stale blocks decrease PoW’s
efficiency, a number of proposals, such as Ethereum, suggest to
reward miners for stale blocks [4]. Here, although uncle blocks
that are included in a block receive a reward, they do not count
towards the total difficulty of a chain, i.e., Ethereum uses a longest
chain rule with added rewards for uncle blocks. This clearly con-
tradicts Ethereum’s claim of using a blockchain protocol adapting
GHOST [33].
Ethereum has also recently modified its longest chain algorithm to
incorporate uniform tie breaking [10]. Notice that such a strategy is
meant as a selfish mining countermeasure, but allows a selfish miner
to increase its chances of catching up to the honest chain [31]. In
Table 4, we extend our model to cater for uncle rewards and uniform
tie breaking, and describe the resulting double-spending MDP in
order to capture the security of Ethereum against double-spending.
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
0.0
0.1
0.2
0.3
0.4
0.5
Eclipsed mining power ω
101
100
101
102
103
104
105
106
vd
Figure 9: Full eclipse attack for
rs= 0.41%
,
γ= 0 and cm= 0.
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
101
100
101
102
103
104
105
106
107
108
vdin block rewards
Bitcoin, k= 6, block rew.
Ethereum, k= 12, block rew.
Ethereum, k= 6, block rew. 101
100
101
102
103
104
105
106
107
108
vdin $
Bitcoin, k= 6, $
Ethereum, k= 12, $
Ethereum, k= 6, $
Figure 10: Double-spending resistance of
Ethereum (
k∈ {6,12}
) vs. Bitcoin (
k= 6
).
USD exchange rate of 2016-04-20.
0.0 0.1 0.2 0.3 0.4 0.5
Adversarial mining power α
101
100
101
102
103
104
105
106
vd
Bitcoin, rs= 6.8%
Ethereum, rs= 6.8%
vd
Figure 11: Direct comparison between
Ethereum and Bitcoin with
k= 6
,
rs= 6.8%
and their respective difference vd.
Building on this analysis, we compare in Figure 10, the double-
spending resilience of Bitcoin (
rs= 0.41%
, cf. MDP in Table 2)
to that of Ethereum (
rs= 6.8%
, cf. MDP in Table 4), given
γ=
0, cm= 0
and
ω= 0
. In order to provide a fair cost comparison,
we rely on US dollar based valuation (Bitcoin’s block reward is
more than 200 times higher than Ethereum’s block reward).
We observe that 6 Bitcoin block confirmations are more resilient
to double-spending than 6 Ethereum
5
block confirmations. Second,
when comparing 12 Ethereum with 6 Bitcoin block confirmations,
Ethereum’s double-spending resilience is only better than Bitcoin
for an adversary with less than 11% of the PoW hashing power.
Note that 12 Ethereum blocks are likely to be generated in less
than 4 minutes, while 6 Bitcoin blocks last about one hour. Third,
we discover that the monetary value of the block reward directly
impacts the double-spending security: the higher the block reward of
a blockchain (in $) the more resilient it is against double-spending.
In addition to comparing Bitcoin to Ethereum, we compare in
Figure 11 the two blockchains by setting Bitcoin’s stale block rate
equal to Ethereum’s stale block rate to objectively evaluate their
security implications. We observe that, in spite of the reliance on
uncle block rewards, and uniform tie breaking, Ethereum’s security
is weaker than Bitcoin, and conclude that the uniform tie breaking
and the uncle reward lower the security of Ethereum’s blockchain.
4. SECURITY VS. PERFORMANCE OF
POW-BLOCKCHAINS
In this section, we evaluate the performance (and security) of var-
ious blockchain instantiations by leveraging our model in Section 3.
To this end, we constructed a Bitcoin blockchain simulator in
order to evaluate different blockchain instances from a performance
perspective. Relying on simulations emerges as the only workable
alternative to realistically capture the blockchain performance under
different parameters since neither formal modeling, nor the deploy-
ment of a thousands of peers (e.g., currently there are 6000 reachable
nodes in Bitcoin) would be practical.
By leveraging our simulator, we evaluate different blockchain pa-
rameters, such as the block interval, the block size, the propagation
mechanisms by measuring the resulting stale block rate, throughput
and block propagation times. This also allows us to connect our
blockchain simulator to our MDP model in a unified framework.
Namely, we feed the stale block rate output by the simulator into
our MDP model in order to assess the security (under selfish mining
and double-spending) of the resulting blockchain instance.
5Block generation time between 10 and 20 seconds.
4.1 Blockchain Simulator
In Table 5, we summarize the parameters captured by our sim-
ulator. Here, we simulate the PoW for miners, by attributing a
particular mining power to each miner. Based on the block interval
distribution (which defines at what time a block is found), a new
block is then attributed to a miner. Conforming with the operation
of existing PoW-blockchains, a miner mines on the first block he
receives, and we assume that forks are inherently resolved by the
longest chain rule. Once a fork is resolved, the blocks that do not
contribute to the main chain are considered stale blocks. Within our
simulations, we do not consider difficulty changes among different
blocks; the longest chain is therefore simply defined by the number
of its blocks.
When establishing the connections between nodes, we create
point-to-point channels between them, which abstracts away any
intermediate devices (routes, switches, etc). These channels have
two characteristics; the latency and bandwidth. To capture realistic
latencies in the network, we adopt the global IP latency statistics
from Verizon [36] and assume a Pareto traffic distribution with
variance accounting for 20% of the mean latency [2]. On the other
hand, to model a realistic bandwidth distribution in the network, we
adapted the distribution6from testmy.net [34].
Our simulator does not model the propagation of transactions,
since the focal point of our simulator is to study the impact of
the block size, block interval, and the block request management
system—all of which can be captured independently of the trans-
action propagation. Note that transactions are implicitly captured
within the block size.
In our simulator, we distinguish between two node types: (i)
regular nodes, and (ii) miners. For regular nodes (up to 6000), we
retrieved the current geographical node distribution from bitnodes.
21.co (cf. Figure 12a) and adopted this distribution to define the
location of our simulated nodes. We also adapted the bandwidth
and network latency (according to the geographical location) from
Verizon [2, 36] and testmy.net [34]. To model miners, we retrieved
the mining pool distribution from blockchain.info, and accordingly
distributed the mining pool’s public node to the respective region (cf.
Figure 12b). Mining pools typically maintain private peering con-
nections among themselves—which we capture in our simulations.
Besides direct peering, a number of mining pools nowadays partic-
ipate in Matt Corallo’s relay network [6] that is operated indepen-
dently of the default Bitcoin P2P overlay network (cf. Section 2.2).
We also capture the relay network and assume in our simulations
that all miners participate in the relay network whenever the relay
6
Upload bandwidth characteristics: min=0.1Mbps, max=100Mbps,
interval=0.1Mbps. Download bandwidth characteristics:
min=0.1Mbps, max=500Mbps, interval=0.5Mbps.
State ×Action Resulting State Probability Reward Condition
(la, lh,·, nr),adopt
(1,0,relevant,nr)
(0,1,relevant,nr)
(0,0,relevant,nr)
α
(1 α)·(1 rs)
(1 α)·rs
cm
cm
cm
-
-
-
(la, lh,·, inc),adopt
(1,0,relevant,nr)
(0,1,relevant,nr)
(0,0,relevant,nr)
α
(1 α)·(1 rs)
(1 α)·rs
rucm
rucm
rucm
-
-
-
(la, lh,·, rel),adopt
(1,0,relevant,rel )
(0,1,relevant,inc)
(0,0,relevant,rel )
α
(1 α)·(1 rs)
(1 α)·rs
cm
cm
cm
-
-
-
(la, lh,·,·),override
(lalh,0,relevant,nr)
(lalh1,1,relevant,nr)
(lalh1,0,relevant,nr)
α
(1 α)·(1 rs)
(1 α)·rs
lh+ 1 cm
lh+ 1 cm
lh+ 1 cm
la> lh
la> lh
la> lh
(la, lh,relevant,nr),wait
(la+ 1, lh,relevant,nr)
(la, lh+ 1,relevant,nr)
(la, lh,relevant,nr)
α
(1 α)·(1 rs)
(1 α)·rs
cm
cm
cm
-
-
-
(la, lh,relevant,inc),wait
(la+ 1, lh,relevant,inc)
(la, lh+ 1,relevant,inc)
(la, lh,relevant,inc)
α
(1 α)·(1 rs)
(1 α)·rs
cm
cm
cm
-
-
-
(la, lh,relevant,rel ),wait
(la+ 1, lh,relevant,rel )
(la, lh+ 1,relevant,inc)
(la, lh,relevant,rel )
α
(1 α)·(1 rs)
(1 α)·rs
cm
cm
cm
-
-
-
(la, lh,active, nr),wait
(la, lh,relevant,nr),match
(la+ 1, lh,active, nr)
(la+ 1, lh,active, rel)
(lalh,1,relevant,nr)
(la, lh+ 1,relevant,nr)
(la, lh+ 1,relevant,inc)
(la, lh,active, nr)
(la, lh,active, rel)
α
α
γ·(1 α)·(1 rs)
(1 γ)·(1 α)·(1 rs)
(1 γ)·(1 α)·(1 rs)
(1 α)·rs
(1 α)·rs
cm
cm
lhcm
cm
cm
cm
cm
lh>6
lh6
-
lh>6
lh6
lh>6
lh6
(la, lh,active, inc),wait
(la, lh,relevant,inc),match
(la+ 1, lh,active, inc)
(lalh,1,relevant,nr)
(la, lh+ 1,relevant,inc)
(la, lh,active, inc)
α
γ·(1 α)·(1 rs)
(1 γ)·(1 α)·(1 rs)
(1 α)·rs
cm
lhcm
cm
cm
-
-
-
-
(la, lh,active, rel),wait
(la, lh,relevant,rel ),match
(la+ 1, lh,active, rel)
(lalh,1,relevant,nr)
(la, lh+ 1,relevant,inc)
(la, lh,active, rel)
α
γ·(1 α)·(1 rs)
(1 γ)·(1 α)·(1 rs)
(1 α)·rs
cm
lhcm
cm
cm
-
-
-
-
(la, lh,·, nr),release (la, lh,·, rel)1 0 lh6lh>1la1
(la, lh,·,·),exit exit 1 la+vdla> lhla> k
Table 4: State transition and reward matrices for an MDP for optimal double-spending strategies in Ethereum where
ru
is the uncle reward (i.e.
7
8
). Every state includes a flag (where
nr =not released, rel =released, inc =included
) indicating whether an attacker block has been or
will be included as an uncle in the honest chain. The
release
action corresponds to the release of the first block of the attackers fork with the
intention to be included as uncle in the honest chain. Therefore, it is only feasible if
1< lh6
and
la1
, since it is otherwise equivalent to
a
match
or
override
or the honest chain is too long to include it as uncle. With the
release
action, no block is mined and a state transitions
from
not released
to
released
, which transitions to
included
with the next block mined on the honest chain. In Ethereum,
γ
is fixed at
0.5
and a match is possible even without a prepared block.
Consensus parameter Description
Block interval distribution Time to find a block
Mining power distribution of the miners PoW power distribution
Network-layer parameter Description
Block size distribution Variable transaction load
# of reachable network nodes Open TCP port nodes
Geo. distribution of nodes Worldwide distribution
Geo. mining pool distribution Worldwide distribution
# of connections per node Within network
# of connections of the miners Within network
Block request management system Possible Protocols
Standard mechanism (inv/getdata) Default
Unsolicited block push Miner only push block
Relay network Miner network
Sendheaders Bitcoin v0.12
Table 5: Parameters of the blockchain simulation.
network option is enabled.
4.2 Evaluation Results
In what follows, we present the results from our evaluation.
4.2.1 Simulator Validation
With the objective to experimentally validate our simulation, we
compared Bitcoin, Litecoin, and Dogecoin with their respective
simulated counterpart. For each blockchain, we adjusted the pa-
rameters of Table 5 according to the current parameters featured
North
America,
38.69%
Europe,
51.59%
South
America,
1.13%
Japan,
1.19%
Australia, 1.66%
Asia Paci c,
5.74%
(a) Node distribution.
Europe, 5.40%
North
America,
23.70% Asia
Paci c,
70.90%
(b) Miner distribution.
Figure 12: Geographical distribution of Bitcoin nodes and miners
used in our simulator.
by existing deployments of the investigated blockchains. For in-
stance, we measured Bitcoin’s block size distribution, as well as the
block generation rate
7
in the real Bitcoin network between May to
November 2015 [21].
In order to measure the stale block rate
rs
in the real blockchain
networks, we crawled 24,000 Bitcoin blocks
8
, 100,000 Litecoin and
240,000 Dogecoin blocks
9
. We moreover adopt the miner mining
power distribution for the different blockchains from public block
7
The block generation rate distribution follows the shifted geometric
distribution with p= 0.19 [21].
8from blockchain.info
9from blockchains.io
Bitcoin Litecoin Dogecoin
Block interval 10 min 2.5 min 1 min
Measured tMB P 8.7 s [8] 1.02 s 0.98 s
Simulated tMB P 9.42 s 0.86 s 0.83 s
Measured rs0.41 % 0.27 % 0.62 %
Simulated rs(a)0.14%-(b)1.85% (b)0.24 % (b)0.79 %
Table 6: Median block propagation time (
tMB P
, in seconds), and
rs
in the real networks and the simulation (10000 blocks for each
blockchain). (a) assumes that all miners use the relay network
and unsolicited block push, while (b) is only given the standard
propagation mechanism. We conclude that not all miners in Bitcoin
use the relay network and unsolicited block push.
explorers
10
. The number of connection per node in our simulations
follows the distribution due to Miller et al. [26].
Our findings (cf. Table 6) show that our simulator captures, to a
large extent, the performance of existing blockchain deployments.
For instance, our results show that the measured and simulated
median block propagation times are relatively close. The stale block
rates for Litecoin and Dogecoin are particularly close. In the case
of Bitcoin, the stale rate falls between the case when all miners use
the relay network and unsolicited block push, and the extreme case
where the relay network and unsolicited block push is not used by
any miner. Note that Litecoin and Dogecoin do not have any relay
network.
4.2.2 Impact of the Block Interval
In this section, we study the impact of the block interval on the
median block propagation time and the stale block rate in PoW-
based blockchains. To this end, we run our simulator for different
block interval times ranging from 25 minutes to 0.5 seconds (cf. Ta-
ble 7). Each simulation is run independently for 10000 consecutive
blocks, and for each of the four different block request management
system combinations: (Case 1) the standard block request manage-
ment, (Case 2) the standard block request management enhanced
by unsolicited block push from the miners, (Case 3) both former
components plus the relay network, and (Case 4) the send headers
mechanism with unsolicited block push and the relay network.
We observe first that for a block interval time of 10 minutes and a
standard request management system, our stale block rate is 1.85%,
which is comparable to 1.69% as reported by Wattenhofer et al. [9].
Recall that at the time of Wattenhofer’s study, the unsolicited block
push and relay network were not yet available.
Secondly, we observe that the introduction of the unsolicited
block push for miners significantly reduces the stale block rate. This
is the case since (i) miners are interconnected and profit most from
the unsolicited block push, and (ii) the propagation method of the
first node is crucial to reach the majority of the network rapidly. The
addition of the relay network does not seem to affect the stale block
rate significantly (given the Bitcoin’s transaction load) compared
to the unsolicited block push, and reduces the propagation time
only marginally. For bigger block sizes however (e.g.
>2
MB) the
relay network indeed provides an advantage over the unsolicited
block push (cf. Table 8). Moreover, the relay network provides an
additional source of block information, in addition to the classical
P2P overlay network. Notice that although the impact of the send
header mechanisms compared to a fully deployed relay network and
unsolicited block push is limited, this mechanism mitigates partial
eclipse attacks [16].
To assess the impact of the block interval on the security of PoW
blockchains, we feed the resulting stale block rate into our MDP
10blockchain.info and https://www.litecoinpool.org/pools
models as shown in Table 7. Our results show that, for an adversary
equipped with 30% of the total mining power
11
, the lower is the con-
sensus time, the higher is the relative revenue from selfish mining
and the lower is the double-spending value. We observe that the
block propagation mechanism significantly impacts the security of
the blockchain, since it directly affects the stale block rate. The stan-
dard block propagation mechanism offers less resilience (in terms of
double-spending and selfish mining) than the other evaluated block
propagation mechanisms. We also note that the double-spending
value halves in Table 7 for the block propagation mechanism of Case
4 (which results in the lowest stale block rate when compared to the
other investigated mechanisms) when reducing the block interval
from 25 minutes to 0.5 seconds. Similarly, the relative revenue from
selfish mining increases from 0.33 to 0.42.
4.2.3 Impact of the Block size
We now study the impact of the block size on the performance
and security of the blockchain (cf. Table 8. To this end, we simulate
block sizes ranging from 0.1 MB to up to 8 MB, given a block
interval of 10 minutes.
Our results suggest that the block propagation time increases
linearly with the block size up to 4 MB; after 8 MB blocks, the
block propagation time and stale block rate increases exponentially.
Second, we clearly see that a better block propagation mechanism
significantly reduces the propagation times and the stale block rate.
This also suggests, conforming with our MDP models, that the
bigger the block size, the higher the relative revenue from selfish
mining and the lower the double-spending value (cf. Table 8). It
is however apparent that an efficient block propagation mechanism
effectively allows the network to keep nearly the same security pro-
visions against selfish mining and double-spending as we can see in
Case 3 (standard propagation mechanism, unsolicited block push,
relay network) and Case 4 (send headers propagation mechanism,
unsolicited block push, relay network). This confirms that an effi-
cient network propagation mechanism helps to increase the security
of the blockchain. Interestingly, given the block propagation mecha-
nism of Case 4, the resilience (in terms of double-spending value)
does not significantly change in Table 8 when increasing the block
size from 0.1 MB to 8 MB (
vd
changes from 12.9 to 12.68 block
rewards respectively). Similarly, the relative revenue from selfish
mining stays at
rrel = 0.33
, when all miners use the relay network.
Currently, a number of proposals suggest to chunk blocks and
download these chunks in parallel (e.g., Blocktorrent [35]). In a
separate experiment that we conducted, we implemented a block
propagation mechanisms that divides blocks into chunks of a few
kilobytes that can be queried from multiple peers. Our results show
that such a protocol does not improve the median block propagation
time compared to the send headers and relay network protocol, when
dealing with modest block sizes (i.e., smaller than 8 MB). This is due
to the fact that a chunked block propagates slower than the
10th
and
25th
percentile of nodes owing to: (i) the communication overhead
caused by the chunks, and (ii) because a node only forwards block
chunks if the respective block has been validated.
4.2.4 Throughput
We now evaluate the throughput achieved by various blockchain
instantiations. To this end, we vary the block size (from 0.1M B to
8 MB) and the block interval (from 0.5 seconds to 25 minutes) to
capture a larger number of blockchain instances with our simulator.
Here, we assume that the network relies on an efficient propagation
11
Bitcoin’s resilience to malicious miners is based on the assumption
that the adversary cannot harvest more than 30% of the total mining
power [14, 16].
Case 1 Case 2 Case 3 Case 4
Block interval tMB P rsvdrrel tM BP rsvdrrel tM BP rsvdrrel tM BP rsvdrrel
25 minutes 35.73 1.72 % 12.47 0.34 25.66 0.16 % 12.86 0.33 22.50 0.03 % 12.89 0.33 22.44 0.02 % 12.89 0.33
10 minutes 14.7 1.51 % 12.52 0.34 10.65 0.13 % 12.88 0.33 9.41 0.14 % 12.86 0.33 9.18 0.13 % 12.87 0.33
2.5 minutes 4.18 1.82 % 12.45 0.34 2.91 0.16 % 12.86 0.33 2.60 0.16 % 12.86 0.33 2.59 0.15 % 12.86 0.33
1 minute 2.08 2.15 % 12.35 0.34 1.34 0.35 % 12.81 0.33 1.30 0.25 % 12.83 0.33 1.27 0.29 % 12.77 0.33
30 seconds 1.43 2.54 % 12.06 0.34 0.84 0.45 % 12.78 0.33 0.84 0.51 % 12.77 0.33 0.84 0.52 % 12.69 0.33
20 seconds 1.21 3.20 % 11.73 0.34 0.67 0.86 % 12.68 0.33 0.69 0.85 % 12.68 0.33 0.68 0.82 % 12.68 0.33
10 seconds 1.00 4.77 % 10.73 0.35 0.35 1.73 % 12.46 0.34 0.33 1.41 % 12.54 0.34 0.53 1.59 % 12.50 0.34
5 seconds 0.89 8.64 % 10.08 0.37 0.37 2.94 % 11.85 0.34 0.45 2.99 % 11.80 0.34 0.44 3.05 % 11.78 0.34
2 seconds 0.84 16.65 % 7.35 0.41 0.40 6.98 % 10.47 0.36 0.39 7.28 % 10.37 0.36 0.38 7.10 % 10.42 0.36
1 seconds 0.82 26.74 % 4.37 0.53 0.53 12.44 % 8.34 0.39 0.38 12.59 % 8.24 0.39 0.37 12.52 % 8.30 0.39
0.5 seconds 0.82 38.15 % 2.78 0.60 0.61 20.62 % 6.22 0.42 0.49 20.87 % 6.16 0.42 0.36 21.10 % 6.02 0.42
Table 7: Impact of the block interval on the median block propagation time (
tMB P
) in seconds, and the stale block rate
rs
,
vd
and
rrel
given
the current Bitcoin block size distribution, an adversary with
α= 0.3
and
k= 6
. Case 1 refers to the standard block propagation mechanism,
Case 2 refers to standard mechanism plus unsolicited block push, Case 3 to the combination of Case 2 plus the relay network and Case 4 to the
send headers with unsolicited block push and relay network.
Case 1 Case 2 Case 3 Case 4
Block Size tMBP rsvdrr el tMB P rsvdrrel tMB P rsvdrrel tM BP rsvdrrel
0.1 MB 3.18 0.32 % 12.80 0.33 2.12 0.03 % 12.89 0.33 2.02 0.03 % 12.89 0.33 2.02 0.2 % 12.90 0.33
0.25 MB 7.03 0.88 % 12.67 0.33 4.93 0.11 % 12.87 0.33 4.49 0.05 % 12.88 0.33 4.46 0.17 % 12.87 0.33
0.5 MB 13.62 1.63 % 12.48 0.34 9.84 0.13 % 12.87 0.33 8.65 0.05 % 12.88 0.33 8.64 0.06 % 12.87 0.33
1 MB 27.67 3.17 % 11.79 0.34 20.01 0.38 % 12.79 0.33 17.24 0.07 % 12.88 0.33 17.14 0.07 % 12.88 0.33
2 MB 57.79 6.24 % 10.57 0.36 44.6 1.12 % 12.61 0.34 35.49 0.08% 12.87 0.33 35.38 0.1 % 12.86 0.33
4 MB 133.30 11.85 % 8.20 0.38 126.57 5.46 % 10.51 0.35 78.01 0.12 % 12.85 0.33 78.40 0.13 % 12.66 0.33
8 MB 571.50 29.97 % 4.11 0.53 875.97 15.64 % 7.64 0.41 555.49 0.43 % 12.65 0.33 550.25 0.4 % 12.68 0.33
Table 8: Impact of the block size on the median block propagation time (
tMB P
) in seconds, the stale block rate
rs
,
vd
and
rrel
, given the
current Bitcoin block generation interval and an adversary with α= 0.3and k= 6.
tps vdrrel Block size Block interval
33.4 12.75 0.33 0.25MB 30 seconds
40 12.38 0.34 0.10MB 10 seconds
50 12.45 0.34 0.25MB 20 seconds
66.7 12.06 0.34 0.25MB 15 seconds
66.7 12.65 0.33 0.50MB 30 seconds
66.7 12.71 0.33 1.00MB 1 minute
Table 9: Throughput in transactions per second (tps) vs. security
measured in
vd
and
rrel
for an adversary with 30% mining power,
k= 6 and given 16 mining pools.
mechanism (send headers with unsolicited block push and relay
network for all miners). For each simulated blockchain instance,
we compute the resulting throughput in transactions per second
(tps), measure the stale block rate and infer
vd
and
rrel
in order to
assess the blockchain’s security with our MDP model (cf. Section 3).
We also assume an average transaction size of 250 bytes,
k= 6
confirmations against double-spending and an adversary with 0.3
mining power and γ= 0.5.
In Table 9, we selectively list candidate blockchain instances
which could achieve a transactional throughput beyond 60 tps and
achieve similar security provisions to the existing Bitcoin system.
Clearly, our results indicate that different parameter configurations
can yield the same throughput—though with different security pro-
visions (due to a different stale block rate). In particular, we observe
that low consensus intervals offer less security compared to a higher
consensus interval given the same overall throughput, since the
network requires more round trips in order to commit the same
information to the blockchain. Our results show that there is con-
siderable room to enhance the scalability of existing PoW without
significantly compromising security.
5. RELATED WORK
A number of contributions analyze double-spending attacks in Bit-
coin [15,30]) but they do not consider
optimal adversarial strategies
.
Eyal and Sirer [14] show that a selfish miner can increase its
relative mining revenue by not directly publishing his blocks. Simi-
larly, Courtois and Bahack [7] study subversive mining strategies.
Our work shares similarities with Sapirshtein et al. [31]. Here, the
authors devise optimal adversarial strategies for selfish mining in
Bitcoin. Unlike [31], our work however captures optimal adversar-
ial selfish mining strategies for PoW-powered blockchain and takes
into account network delays and eclipse attacks. We additionally
capture optimal double-spending strategies—where we also take
into account the mining costs of the adversary, the number of re-
quired block confirmations, and the double-spending value in order
to properly account for costs of the attack.
GHOST [33] is an alternative to the longest chain rule for estab-
lishing consensus in PoW based blockchains and aims to alleviate
the negative impacts of stale blocks. Many PoW alternatives have
been proposed. In Proof of Stake (PoS) [29], the voting power of
peers is based on the amount of “stake” they own in the respective
blockchain system. Proof of Burn (PoB) is a proposal to replace
PoW by burning transaction outputs, such that they can no longer
be spent. Existing PoB-based blockchains however rely on PoW
in order to create blocks and therefore ultimately rely on PoW for
coin creation. Proof of Capacity (PoC), aims to use the available
hard-disk space in order to replace PoW. Bitcoin-NG [13] performs
leader election of PoW—allowing the leader to sign micro-blocks
until a new leader is elected. The literature features a number of
additional proposals [19, 23, 25, 37] that rely on classical Byzantine
fault tolerant consensus protocols in the hope to increase the con-
sensus efficiency and achieve high transactional throughput. Recent
studies propose to combine the use of PoW with BFT protocols to
realize highly-performant open consensus protocols (Byzcoin [24]).
6. CONCLUDING REMARKS
In this work, we introduced a novel quantitative framework to
objectively compare PoW blockchains given real world network
impacts and blockchain parameters. Our framework enables us to
evaluate the impact of network-layer parameters on the security of
PoW-based blockchain. By doing so, we show how to objectively
compare the security provisions of different PoW blockchain in-
stances. Namely, our framework allows us to push the boundaries
of PoW powered blockchains in terms of throughput in transactions
per second, while observing the impact on the security provisions
of the blockchain in terms of optimal selfish mining and double
spending strategies.
For instance, we find that Ethereum needs at least 37 block con-
firmations in order to match Bitcoin’s security with 6 block confir-
mations, given an adversary with 30% of the total mining power.
Our results indirectly suggest that Bitcoin’s blockchain offers more
security than Ethereum’s blockchain which rewards miners with
uncle rewards and performs uniform tie breaking for blockchain
fork resolutions. Our results additionally indicate that existing
PoW blockchains can achieve a throughput of 60 transactions per
second—without significantly affecting the blockchain’s security.
To the best of our knowledge, this is the first contribution that quan-
titatively evaluates the impact of the stale block rate on optimal
double-spending and selfish mining resistance of a PoW blockchain
(cf. Figure 7 and Figure 3). By doing so, our results quantitatively
capture the security of transactions based on their values, and on the
block confirmations—effectively quantifying the level of security
achieved by the famous required six block confirmations in Bitcoin.
Our insights do not only allow merchants to take into account
the security provisions when accepting transactions and to assess
their respective risk of double-spending, but also help miners in
quantifying a PoW blockchain’s resilience against selfish mining.
7. REFERENCES
[1] Bitcoin block size limit controversy, 2016. Available from:
https://en.bitcoin.it/wiki/Block_size_limit_controversy.
[2] Frederik Armknecht, Jens-Matthias Bohli, Ghassan O
Karame, Zongren Liu, and Christian A Reuter. Outsourced
proofs of retrievability. In Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communications
Security, pages 831–843. ACM, 2014.
[3] Bitnodes. Bitnodes ip crawler. Available from:
https://github.com/ayeowch/bitnodes.
[4] V. Buterin. A next-generation smart contract and
decentralized application platform, 2014.
[5]
Miguel Castro, Barbara Liskov, et al. Practical byzantine fault
tolerance. In OSDI, volume 99, pages 173–186, 1999.
[6] Matt Corallo. Bitcoin relay network. Available from:
http://bitcoinrelaynetwork.org/.
[7] Nicolas T. Courtois and Lear Bahack. On subversive miner
strategies and block withholding attack in bitcoin digital
currency. CoRR, abs/1402.1718, 2014.
[8]
Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer,
Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena,
Elaine Shi, and Emin Gün. On scaling decentralized
blockchains.
[9]
C. Decker and R. Wattenhofer. Information Propagation in the
Bitcoin Network. In 13-th IEEE International Conference on
Peer-to-Peer Computing, 2013.
[10] Ethereum. Ethereum tie breaking. Available from:
https://github.com/ethereum/go-ethereum/commit/
bcf565730b1816304947021080981245d084a930.
[11] Ethereum. ethernodes. Available from:
https://www.ethernodes.org/network/1.
[12] Ethereum. ethstats. Available from: https://ethstats.net/.
[13] Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert
van Renesse. Bitcoin-ng: A scalable blockchain protocol.
arXiv preprint arXiv:1510.02037, 2015.
[14] Ittay Eyal and Emin Gün Sirer. Majority is not enough:
Bitcoin mining is vulnerable. In Financial Cryptography and
Data Security, pages 436–454. Springer, 2014.
[15] The Finney Attack, 2013. Available from: https:
//en.bitcoin.it/wiki/Weaknesses#The_.22Finney.22_attack.
[16] Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and
Srdjan Capkun. Tampering with the delivery of blocks and
transactions in bitcoin. In Proceedings of the 22nd ACM
SIGSAC Conference on Computer and Communications
Security, pages 692–705. ACM, 2015.
[17] E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse
attacks on bitcoin’s peer-to-peer network. 2015.
[18] Ronald A Howard. Dynamic Probabilistic Systems, Volume I:
Markov Models, volume 1. Courier Corporation, 2012.
[19] IBM. Ibm openblockchain. Available from:
http://www.ibm.com/blockchain/.
[20] Intel. Proof of elapsed time (poet). Available from:
http://intelledger.github.io/.
[21] Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun.
Double-spending fast payments in bitcoin. In Proceedings of
the 2012 ACM conference on Computer and communications
security, CCS ’12, New York, NY, USA, 2012. ACM.
[22] John G Kemeny, J Laurie Snell, and Gerald L Thompson.
Finite mathematics. DC Murdoch, Linear Algebra for
Undergraduates, 1974.
[23]
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly,
Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing
bitcoin security and performance with strong consistency via
collective signing. arXiv preprint arXiv:1602.06997, 2016.
[24]
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly,
Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing
bitcoin security and performance with strong consistency via
collective signing. CoRR, abs/1602.06997, 2016.
[25] D. Mazieres. The stellar consensus protocol: A federated
model for internet-level consensus. Available from: https:
//www.stellar.org/papers/stellar-consensus-protocol.pdf.
[26]
Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta,
Dave Levin, Neil Spring, and Bobby Bhattacharjee.
Discovering bitcoin’s public topology and influential nodes.
[27] S. Nakamoto. Bitcoin: A p2p electronic cash system, 2009.
[28] Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi.
Stubborn mining: Generalizing selfish mining and combining
with an eclipse attack. Technical report, IACR Cryptology
ePrint Archive 2015, 2015.
[29] QuantumMechanic. Proof of stake. Available from:
https://bitcointalk.org/index.php?topic=27787.0.
[30]
Meni Rosenfeld. Analysis of hashrate-based double spending.
arXiv preprint arXiv:1402.2009, 2014.
[31] Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar.
Optimal selfish mining strategies in bitcoin. arXiv preprint
arXiv:1507.06183, 2015.
[32]
Yonatan Sompolinsky and Aviv Zohar. Accelerating bitcoin’s
transaction processing. fast money grows on trees, not chains.
IACR Cryptology ePrint Archive, 2013:881, 2013.
[33] Yonatan Sompolinsky and Aviv Zohar. Secure high-rate
transaction processing in bitcoin. In Financial Cryptography
and Data Security, pages 507–527. Springer, 2015.
[34] testmy.net. testmy.net. Available from:
http://testmy.net/country.
[35] Jonathan Toomim. blocktorrent. Available from:
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/
2015-September/011176.html.
[36] Verizon. Verizon latency. Available from:
http://www.verizonenterprise.com/about/network/latency/.
[37] Marko Vukolic. The quest for scalable blockchain fabric:
Proof-of-work vs. bft replication. In Proceedings of the IFIP
WG 11.4 Workshop iNetSec 2015. 2015.
... Byzantine fault tolerance [24], [25] extends crashfault tolerance by the ability to compensate for accidental faults and deliberate attacks. Accidental faults include software bugs and misconfiguration, while adversarial attacks involve strategies, such as in selfish mining [26]- [28]. ...
... The time for synchronization is often influenced by the geographical distribution of validating nodes, heterogeneity of validating nodes, and different networks [1], [36], such as related to bandwidth and connectivity. Inconsistent states decrease availability [15], [46], [48] and ease successful doublespending [26], [28], decreasing security of blockchain systems. ...
... In addition to conceptual works, empirical studies propose multiple constructs and metrics to quantify the blockchain trilemma subconcepts. Focusing on DoD, scalability or security, in separation-not the entire blockchain trilemma-prior research [7]- [9], [26], [55] conducted experiments to better understand influences of blockchain system configurations on these subconcepts. Those works present multiple constructs for the same blockchain trilemma subconcepts. ...
Preprint
Full-text available
To meet non-functional requirements, practitioners must identify Pareto-optimal configurations of the degree of decentralization, scalability, and security of blockchain systems. Maximizing all of these subconcepts is, however, impossible due to the trade-offs highlighted by the blockchain trilemma. We reviewed analysis approaches to identify constructs and their operationalization through metrics for analyzing the blockchain trilemma subconcepts and to assess the applicability of the operationalized constructs to various blockchain systems. By clarifying these constructs and metrics, this work offers a theoretical foundation for more sophisticated investigations into how the blockchain trilemma manifests in blockchain systems, helping practitioners identify Pareto-optimal configurations.
... Honest Participant's Strategy Space. The definition of honest mining protocol in this paper refers to the relevant academic literature in the field of blockchain [34], [36] and specifically follows the rules established by the Ethereum 1.x White Paper [4]. Accordingly, honest participants always strive to mine the blocks with the highest total difficulty and strictly follow the protocol requirements, neither withhold-ing blocks nor engaging in any form of manipulation of block timestamps. ...
... To clearly distinguish the attack models proposed in this study from the attack strategies presented in previous literature [34], [36], [37], [38], [39], we introduce two specific types of adversaries: UUM and SUUM. The UUM adversary abandons the risk-free constraint of the RUM attack, increases the steady-state probability of being in the attack state, and possesses the ability to selectively set block timestamps, but is not allowed to withhold blocks. ...
Preprint
Full-text available
We introduce two advanced attack strategies, the Unrestricted Uncle Maker (UUM) Attack and the Staircase-Unrestricted Uncle Maker (SUUM) Attack, which fundamentally threaten the security of timestamp-based Nakamoto-style blockchains by inflicting permanent systemic harm. Unlike prior work that merely enhances adversarial rewards, these attacks exploit vulnerabilities in timestamp manipulation and fork selection rules to irreversibly destabilize blockchain fairness and incentive mechanisms. Specifically, the SUUM attack enables adversaries to persistently launch attacks at zero cost, eliminating constraints on block withholding and risk-free conditions, while systematically maximizing rewards through coordinated timestamp adjustments and strategic block release. Our analysis demonstrates that SUUM adversaries achieve disproportionate reward advantages over both UUM and the original Riskless Uncle Maker (RUM) Attack [CCS '23], with all three strategies surpassing honest mining. Crucially, SUUM's cost-free persistence allows adversaries to indefinitely drain rewards from honest participants by maintaining minimal difficulty risks through precise timestamp manipulation. This creates a self-reinforcing cycle: adversaries amplify their profits while suppressing honest returns, thereby permanently eroding the protocol's security assumptions. Through rigorous theoretical modeling and simulations, we validate how SUUM's combination of timestamp tampering, block withholding, and difficulty risk control enables unmitigated exploitation of consensus mechanisms. This work underscores the existential risks posed by timestamp-based Nakamoto-style protocols and advocates urgent countermeasures to ensure long-term stability.
... Primarily, the correct operation of a blockchain system relies on consensus protocols, which often demand substantial computational resources. Many blockchain-based FL systems rely on the Proof of Work (PoW) consensus protocol, where miners use significant computing resources for consensus processing [9]. Furthermore, the consensus operation introduces additional latency, thereby diminishing the overall system efficiency. ...
... The cornerstone of blockchain is the consensus protocol, which determines the next block attached to the chain and prevents fork issues in the linear chain. Traditional blockchain systems typically rely on Proof of Work (PoW) or Practical Byzantine Fault Tolerance (PBFT) consensus protocols [9,17]. However, PoW consumes substantial computing resources for solving hash puzzles, and the extended latency of PoW protocols fails to meet the efficiency requirements of intelligent services in edge computing. ...
Article
Full-text available
Blockchain-based federated learning (FL) has recently garnered significant attention as a trusted decentralized learning paradigm. However, traditional FL faces critical challenges: synchronous FL suffers from stragglers that delay training, while asynchronous FL risks model instability due to inconsistent updates. Moreover, processing blockchain consensus protocols incurs substantial resource consumption and operational latency. To overcome these challenges, we propose a hierarchical blockchain architecture for semi-asynchronous FL that balances efficiency and security. Our approach features a two-layer design: (1) a training layer, where edge nodes asynchronously upload local models via a directed acyclic graph (DAG) to mitigate stragglers and ensure continuous progress, and (2) a blockchain layer, which periodically validates and synchronously aggregates models to maintain stability and defend against malicious inputs. We further introduce novel DAG-based transaction tracking and uploading algorithms to enhance efficiency, enabling rapid local updates while ensuring global model integrity through blockchain consensus. Experimental results demonstrate that our system reduces latency by 26% compared to typical blockchain-based FL approaches, while maintaining a stable convergence rate and high training accuracy. By harmonizing asynchronous flexibility with synchronous control, our work enhances the scalability and robustness of FL in resource-constrained edge environments.
Article
Blockchain technology uses a consensus mechanism to create and finalize blocks. The consensus mechanism affects the total performance parameters of the blockchain network, such as throughput. In this paper, we present “Nazfast”, a simplified proof of stake—Byzantine fault tolerance based consensus mechanism to create and finalize blocks. The presented consensus is completed in multiple folds. For block producer and validation committee selection, we used a secure and speeded-up election mechanism, S&Sem, in Nazfast. The consensus is designed for fast block finalization in a malicious environment. The simulation result shows that we approximately achieved three block finalizations in 1 s with almost similar latency. We reduced and fixed the number of validators in the consensus to improve the throughput. We achieved a higher throughput among other consensus of the same family. Because we reduced the number of validators, the safety parameters of the consensus are at risk, so we used Sea Shield to improve the overall consensus safety. This is another blockchain to save nodes’ details when they join/unjoin the network as validators. By using all three parts together, our system is protected from 28-plus different attacks, and we maintain a high decentralization by using S&Sem. Finally, we also enhance the incentive mechanism of consensus to improve the liveness of the network.
Article
Pixel-Web3 Wallet is a hierarchical deterministic (HD) wallet designed for secure and decentralized asset management across multiple blockchain networks, including Ethereum and Solana. Unlike traditional wallets that depend on browser extensions or centralized servers, Pixel offers a web-based solution with user-controlled security through locally stored seed phrases. This paper explores the wallet’s architecture, security framework, and innovative features, such as real-time balance updates and flexible recovery options. Additionally, the research evaluates the scalability of Pixel and its potential expansion to support more blockchain networks. By eliminating reliance on third-party services, Pixel enhances accessibility while maintaining strong security, making it a promising solution for blockchain enthusiasts, traders, and developers. Keywords: Blockchain, HD Wallet, Cryptocurrency,Web3,Ethereum,Solana, Security
Conference Paper
Full-text available
While showing great promise, Bitcoin requires users to wait tens of minutes for transactions to commit - even then offering only probabilistic guarantees. This paper introduces ByzCoin, a novel Byzantine consensus protocol that leverages scalable collective signing to commit Bitcoin transactions irreversibly within seconds. ByzCoin achieves Byzantine consensus while preserving Bitcoin's open membership by dynamically forming hash power-proportionate consensus groups representing recently-successful block miners. ByzCoin employs communication trees to optimize transaction commitment and verification under normal operation while guaranteeing safety and liveness under Byzantine faults, up to a near-optimal tolerance of f faulty group members among 3f+2 total. ByzCoin mitigates double spending and selfish mining attacks by producing collectively signed transaction blocks within one minute of transaction submission. Tree-structured communication further reduces this latency to less than 30 seconds. Thanks to these optimizations ByzCoin achieves a throughput higher than Paypal currently handles, with confirmation latencies of 15-20 seconds.
Conference Paper
Full-text available
Given the increasing adoption of Bitcoin, the number of transactions and the block sizes within the system are only expected to increase. To sustain its correct operation in spite of its ever-increasing use, Bitcoin implements a number of necessary optimizations and scalability measures. These measures limit the amount of information broadcast in the system to the minimum necessary. In this paper, we show that current scalability measures adopted by Bitcoin come at odds with the security of the system. More specifically, we show that an adversary can exploit these measures in order to effectively delay the propagation of transactions and blocks to specific nodes—without causing a network partitioning in the system. We show that this allows the adversary to easily mount Denial-of-Service attacks, considerably increase its mining advantage in the network, and double-spend transactions in spite of the current countermeasures adopted by Bitcoin. Based on our results , we propose a number of countermeasures in order to enhance the security of Bitcoin without deteriorating its scalability.
Article
Full-text available
Proofs of Retrievability (POR) are cryptographic proofs that enable a cloud provider to prove that a user can retrieve his file in its entirety. POR need to be frequently executed by the user to ensure that their files stored on the cloud can be fully retrieved at any point in time. To conduct and verify POR, users need to be equipped with devices that have network access, and that can tolerate the (non-negligible) computational overhead incurred by the verification process. This clearly hinders the large-scale adoption of POR by cloud users, since many users increasingly rely on portable devices that have limited computational capacity, or might not always have network access. In this paper, we introduce the notion of outsourced proofs of retrievability (OPOR), in which users can task an external auditor to perform and verify POR with the cloud provider. We argue that the OPOR setting is subject to security risks that have not been covered by existing POR security models. To remedy that, we propose a formal framework and a security model for OPOR. We then propose an instantiation of OPOR which builds upon the provably-secure private POR scheme due to Shacham and Waters (Asiacrypt'08) and we show its security in our proposed security model. We implement a prototype based on our solution, and evaluate its performance in a realistic cloud setting. Our evaluation results show that our proposal minimizes user effort, incurs negligible overhead on the auditor (compared to the SW scheme), and considerably improves over existing publicly verifiable POR.
Technical Report
Full-text available
Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is Byzantine fault tolerant, is robust to extreme churn, and shares the same trust model obviating qualitative changes to the ecosystem. In addition to Bitcoin-NG, we introduce several novel metrics of interest in quantifying the security and efficiency of Bitcoin-like blockchain protocols. We implement Bitcoin-NG and perform large-scale experiments at 15% the size of the operational Bitcoin system, using unchanged clients of both protocols. These experiments demonstrate that Bitcoin-NG scales optimally, with bandwidth limited only by the capacity of the individual nodes and latency limited only by the propagation time of the network.
Article
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed. We show that the Bitcoin mining protocol is not incentive-compatible. We present an attack with which colluding miners' revenue is larger than their fair share. The attack can have significant consequences for Bitcoin: Rational miners will prefer to join the attackers, and the colluding group will increase in size until it becomes a majority. At this point, the Bitcoin system ceases to be a decentralized currency. Unless certain assumptions are made, selfish mining may be feasible for any coalition size of colluding miners. We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case. It prohibits selfish mining by a coalition that command less than 1/4 of the resources. This threshold is lower than the wrongly assumed 1/2 bound, but better than the current reality where a coalition of any size can compromise the system.
Conference Paper
The Bitcoin protocol requires nodes to quickly distribute newly created blocks. Strong nodes can, however, gain higher payoffs by withholding blocks they create and selectively postponing their publication. The existence of such selfish mining attacks was first reported by Eyal and Sirer, who have demonstrated a specific deviation from the standard protocol (a strategy that we name SM1). In this paper we investigate the profit threshold – the minimal fraction of resources required for a profitable attack. Our analysis provides a bound under which the system can be considered secure against such attacks. Our techniques can be adapted to protocol modifications to assess their susceptibility to selfish mining, by computing the optimal attack under different variants. We find that the profit threshold is strictly lower than the one induced by the SM1 scheme. The policies given by our algorithm dominate SM1 by better regulating attack-withdrawals. We further evaluate the impact of some previously suggested countermeasures, and show that they are less effective than previously conjectured. We then gain insight into selfish mining in the presence of communication delays, and show that, under a model that accounts for delays, the profit threshold vanishes, and even small attackers have incentive to occasionally deviate from the protocol. We conclude with observations regarding the combined power of selfish mining and double spending attacks.
Conference Paper
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone, and prove two of its fundamental properties which we call common prefix and chain quality in the static setting where the number of players remains fixed. Our proofs hinge on appropriate and novel assumptions on the “hashing power” of the adversary relative to network synchronicity; we show our results to be tight under high synchronization. Next, we propose and analyze applications that can be built “on top” of the backbone protocol, specifically focusing on Byzantine agreement (BA) and on the notion of a public transaction ledger. Regarding BA, we observe that Nakamoto’s suggestion falls short of solving it, and present a simple alternative which works assuming that the adversary’s hashing power is bounded by 1/3. The public transaction ledger captures the essence of Bitcoin’s operation as a cryptocurrency, in the sense that it guarantees the liveness and persistence of committed transactions. Based on this notion we describe and analyze the Bitcoin system as well as a more elaborate BA protocol, proving them secure assuming high network synchronicity and that the adversary’s hashing power is strictly less than 1/2, while the adversarial bound needed for security decreases as the network desynchronizes.
Conference Paper
The increasing popularity of blockchain-based cryptocurrencies has made scalability a primary and urgent concern. We analyze how fundamental and circumstantial bottlenecks in Bitcoin limit the ability of its current peer-to-peer overlay network to support substantially higher throughputs and lower latencies. Our results suggest that reparameterization of block size and intervals should be viewed only as a first increment toward achieving next-generation, high-load blockchain protocols, and major advances will additionally require a basic rethinking of technical approaches. We offer a structured perspective on the design space for such approaches. Within this perspective, we enumerate and briefly discuss a number of recently proposed protocol ideas and offer several new ideas and open challenges.
Conference Paper
Bitcoin cryptocurrency demonstrated the utility of global consensus across thousands of nodes, changing the world of digital transactions forever. In the early days of Bitcoin, the performance of its probabilistic proof-of-work (PoW) based consensus fabric, also known as blockchain, was not a major issue. Bitcoin became a success story, despite its consensus latencies on the order of an hour and the theoretical peak throughput of only up to 7 transactions per second. The situation today is radically different and the poor performance scalability of early PoW blockchains no longer makes sense. Specifically, the trend of modern cryptocurrency platforms, such as Ethereum, is to support execution of arbitrary distributed applications on blockchain fabric, needing much better performance. This approach, however, makes cryptocurrency platforms step away from their original purpose and enter the domain of database-replication protocols, notably, the classical state-machine replication, and in particular its Byzantine fault-tolerant (BFT) variants. In this paper, we contrast PoW-based blockchains to those based on BFT state machine replication, focusing on their scalability limits. We also discuss recent proposals to overcoming these scalability limits and outline key outstanding open problems in the quest for the “ultimate” blockchain fabric(s).