• Corpus ID: 17942103

Bootstrapping the Blockchain - Directly

@article{Garay2016BootstrappingTB,
  title={Bootstrapping the Blockchain - Directly},
  author={Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos},
  journal={IACR Cryptol. ePrint Arch.},
  year={2016},
  volume={2016},
  pages={991}
}
The Bitcoin backbone protocol [Eurocrypt 2015] extracts basic properties of Bitcoin's underlying blockchain data structure, such as common pre x and chain quality, and shows how fundamental applications including consensus and a robust public transaction ledger can be built on top of them. The underlying assumptions are proofs of work (POWs), adversarial hashing power strictly less than 1/2 and no adversarial pre-computation or, alternatively, the existence of an unpredictable genesis block. In… 

Figures from this paper

Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup

The Bitcoin backbone protocol (Eurocrypt 2015) extracts basic properties of Bitcoin’s underlying blockchain data structure, such as “common prefix” and “chain quality,” and shows how fundamental

Overcoming Cryptographic Impossibility Results Using Blockchains

This work provides an abstract framework for formally analyzing and defining useful security properties for Proof-of-Stake (POS) based blockchain protocols and introduces the notion of pay-per-use programs which is simply a contract between two parties — service provider and customer.

Basic Properties of the Blockchain: (Invited Talk)

  • J. Garay
  • Computer Science, Mathematics
  • 2017
This talk presents a Bitcoin-like blockchain protocol that is provably secure without trusted setup, and overcomes such lack in a scalable way-i.e., with running time independent of the number of parties.

Blockchain and Consensus from Proofs of Work without Random Oracles

This work provides a formulation of the POW primitive that implies the security of the Bitcoin blockchain protocol in the standard model and illustrates that previously known solutions essentially relied on the random oracle and proposes a new blockchain-based consensus protocol provably secure under the same assumptions as above.

Proofs of Work for Blockchain Protocols

This work provides a formulation of the POW primitive that implies the security of the Bitcoin blockchain protocol in the standard model and paves the way for proving theSecurity of blockchain protocols in theStandard model assuming the authors' primitive can be realized from computational assumptions.

Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work

This work designs protocols for Broadcast and Byzantine agreement that are secure under the assumption that the majority of computing power is controlled by the honest parties and for the first time have expected constant round complexity.

GSCS: General Secure Consensus Scheme for Decentralized Blockchain Systems

A novel consensus mechanism named GSCS that is an improved version of PoW that provides strong resistance to resource centralization, the quantum attack and other malicious attacks and has the potential to ensure a more secure and robust environment for decentralized blockchain systems.

A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks

This paper presents a simple blackbox reduction from state machine replication (SMR) to the classical binary agreement (BA) protocol on top of a fully decentralized network and presents an algorithm for a reduction from BA to SMR, thus establishing an equivalence between the two.

SoK: A Consensus Taxonomy in the Blockchain Era

This paper presents a meta-modelling framework that automates the very labor-intensive and therefore time-heavy and therefore expensive and expensive process of establishing consensus in the context of a distributed system.

A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond

This survey unroll and structure the blockchain related discoveries and scientific results in many aspects and classify blockchain technologies into four layers and carries out a comprehensive study on the consensus strategies, the network, and the applications of blockchain.

References

SHOWING 1-10 OF 32 REFERENCES

Speed-Security Tradeo s in Blockchain Protocols

This work investigates the tradeo between provable security and transaction processing speed viewing the latter as a function of the block generation rate, and introduces a new formal property of blockchain protocols, called chain growth, and shows it is fundamental for arguing the security of a robust transaction ledger.

Bitcoin-NG: A Scalable Blockchain Protocol

This paper implements Bitcoin-NG, a new blockchain protocol designed to scale, which is Byzantine fault tolerant, is robust to extreme churn, and shares the same trust model obviating qualitative changes to the ecosystem.

Majority is not enough

This work shows that the Bitcoin mining protocol is not incentive-compatible, and proposes a practical modification to the Bitcoin protocol that protects Bitcoin in the general case, and prohibits selfish mining by a coalition that command less than 1/4 of the resources.

Distributed Cryptography Based on the Proofs of Work

A formal model for constructing distributed crypto- graphic protocols in a fully peer-to-peer scenario under the assumption that the adver- sary has limited computing power is proposed and the following protocols working in it are constructed.

Analysis of the Blockchain Protocol in Asynchronous Networks

Nakamoto’s famous blockchain protocol enables achieving consensus in a so-called permissionless setting—anyone can join (or leave) the protocol execution, and the protocol instructions do not depend

Zerocash: Decentralized Anonymous Payments from Bitcoin

This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.

P2P Mixing and Unlinkable Bitcoin Transactions

A deanonymization attack on existing P2P mixing protocols that guarantee termination in the presence of disruptive peers is presented, and DiceMix is used to define CoinShuffle++, a coin mixing protocol that enables pseudonymous peers to perform unlinkable transactions in a manner fully compatible with the current Bitcoin system.

PoW-Based Distributed Cryptography with No Trusted Setup

A formal model for this scenario is proposed and then a broadcast protocol is constructed that is secure under the assumption that the honest parties have computing power that is some non-negligible fraction of computing power of the adversary.

Security and Composition of Multiparty Cryptographic Protocols

  • R. Canetti
  • Computer Science, Mathematics
    Journal of Cryptology
  • 2000
In the computational model, this work provides the first definition of security of protocols that is shown to be preserved under composition, and follows the general paradigm of known definitions.

The Bitcoin Backbone Protocol: Analysis and Applications

This work extracts and analyzes the core of the Bitcoin protocol, which is term the Bitcoin backbone, and proves two of its fundamental properties which are called common prefix and chain quality in the static setting where the number of players remains fixed.