• Publications
  • Influence
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
TLDR
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain, and conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups.
Bitcoin-NG: A Scalable Blockchain Protocol
TLDR
This paper implements Bitcoin-NG, a new blockchain protocol designed to scale, which is Byzantine fault tolerant, is robust to extreme churn, and shares the same trust model obviating qualitative changes to the ecosystem.
The Miner's Dilemma
  • Ittay Eyal
  • Computer Science
    IEEE Symposium on Security and Privacy
  • 25 November 2014
TLDR
This work defines and analyzes a game where pools use some of their participants to infiltrate other pools and perform such an attack, and studies the special cases where either two pools or any number of identical pools play the game and the rest of the participants are uninvolved.
Majority is not enough
TLDR
This work shows that the Bitcoin mining protocol is not incentive-compatible, and proposes a practical modification to the Bitcoin protocol that protects Bitcoin in the general case, and prohibits selfish mining by a coalition that command less than 1/4 of the resources.
On Scaling Decentralized Blockchains - (A Position Paper)
TLDR
The results suggest that reparameterization of block size and intervals should be viewed only as a first increment toward achieving next-generation, high-load blockchain protocols, and major advances will additionally require a basic rethinking of technical approaches.
REM: Resource-Efficient Mining for Blockchains
TLDR
REM (Resource-Efficient Mining), a new blockchain mining framework that uses trusted hardware (Intel SGX), achieves security guarantees similar to PoW, but leverages the partially decentralized trust model inherent in SGX to achieve a fraction of the waste of PoW.
Decentralization in Bitcoin and Ethereum Networks
TLDR
The extent of decentralization is investigated by measuring the network resources of nodes and the interconnection among them, the protocol requirements affecting the operation of nodes, and the robustness of the two systems against attacks.
The Gap Game
TLDR
This work analyzes cryptocurrency security in realistic settings, taking into account all elements of expenses and rewards, and shows that gaps form well before fees are the only incentive, and analyzes the implications on security.
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
TLDR
This paper identifies noand near-fork incentive attacks as a powerful, yet largely overlooked, category and proposes the first trustless out-of-band bribing attack capable of facilitating double-spend collusion across different blockchains that reimburses collaborators in case of failure.
Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities
  • Ittay Eyal
  • Computer Science
    Computer
  • 22 September 2017
TLDR
How blockchain research beyond Bitcoin is closing gaps in blockchains for cryptocurrencies is explored and some of the challenges that remain are explored.
...
1
2
3
4
5
...