Decentralization in Bitcoin and Ethereum Networks

  title={Decentralization in Bitcoin and Ethereum Networks},
  author={Adem Efe Gencer and Soumya Sankar Basu and Ittay Eyal and Robbert van Renesse and Emin G{\"u}n Sirer},
  booktitle={Financial Cryptography},
Blockchain-based cryptocurrencies have demonstrated how to securely implement traditionally centralized systems, such as currencies, in a decentralized fashion. [] Key Method In particular, we adapted existing internet measurement techniques and used the Falcon Relay Network as a novel measurement tool to obtain our data. We discovered that neither Bitcoin nor Ethereum has strictly better properties than the other. We also provide concrete suggestions for improving both systems.

Deanonymisation in Ethereum Using Existing Methods for Bitcoin February 7 , 2018

This paper aims to apply two existing deanonymisation techniques developed for the Bitcoin network to Ethereum by exploiting some of the specifics of the Ethereum network, such as the peer selection protocol or the bootnodes, so that similar attacks are potentially feasible.

Measuring Decentralization in Bitcoin and Ethereum using Multiple Metrics and Granularities

A new comparison study of the degree of decentralization in Bitcoin and Ethereum, the two most prominent blockchains, with various decentralization metrics and different granularities within the time dimension, and proposes the sliding window based measurement approach.

Survey on Blockchain Networking

This article presents a structured overview of the field, from topology and neighbor discovery, over block and transaction propagation, to sharding and off-chain networks, also reviewing existing empirical results from different measurement studies.

On Decentralization of Bitcoin: An Asset Perspective

This paper presents the first systematic investigation of the degree of decentralization for Bitcoin based on its entire transaction history, and proposed both static and dynamic analysis of Bitcoin transaction network with quantifiable decentralization measures developed based on network analysis and market efficiency study.

Simulation of different selfish mining strategies in Bitcoin

The simulations of the various selfish mining strategies show that a dishonest miner can increase its relative gain over the rest of the network, thus reinforcing the current state of research and the relevance of the selfish mining attack.

Measuring Miner Decentralization in Proof-of-Work Blockchains

This work examines some of the forces behind mining centralization and combines large scale statistical techniques with publicly available blockchain data in order to answer previously intractable questions about the network position of miners in each cryptocurrency network.

Ostraka: Secure Blockchain Scaling by Node Sharding

Ostraka is presented, a blockchain node architecture that shards (parallelizes) the nodes themselves and it is proved that replacing a unified node with an Ostraka node does not affect the security of the underlying consensus mechanism.

Survey on Blockchain Networking: Context, State-of-the-Art, Challenges

This paper presents a structured overview of the field, from topology and neighbor discovery, over block and transaction propagation, to sharding and off-chain networks, also reviewing existing empirical results from different measurement studies.

Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations

This work methodically characterize blockchain networks by reference to the paradigmatic Bitcoin peer-to-peer network, explore the state-of-the-art protocols, and emphasize this key design space by conducting a longitudinal measurement study on the Bitcoin network.

Anchoring the Value of Cryptocurrency

  • Yibin XuYangyu HuangJ. Shao
  • Computer Science
    2020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE)
  • 2020
A financial model for blockchain sharding that will build an active link between the value of cryptocurrency and computation resources as well as the market and labour behaviours and presents a working example which regulates the behaviour of anonymous participants and also incents/discourages participation dynamically.



Bitcoin-NG: A Scalable Blockchain Protocol

This paper implements Bitcoin-NG, a new blockchain protocol designed to scale, which is Byzantine fault tolerant, is robust to extreme churn, and shares the same trust model obviating qualitative changes to the ecosystem.

Information propagation in the Bitcoin network

This paper analyzes how Bitcoin uses a multi-hop broadcast to propagate transactions and blocks through the network to update the ledger replicas, and verifies the conjecture that the propagation delay in the network is the primary cause for blockchain forks.

Blockchain inefficiency in the Bitcoin peers network

Investigating Bitcoin network observing transactions broadcasted into the network during a week from 04/05/2016 and then monitoring their inclusion into the blockchain during the following seven months reveals a great inefficiency in the Bitcoin system.


The blockchain paradigm when coupled with cryptographically-secured transactions has demonstrated its utility through a number of projects, with Bitcoin being one of the most notable ones, and Ethereum implements this paradigm in a generalised manner.

On Scaling Decentralized Blockchains - (A Position Paper)

The results suggest that reparameterization of block size and intervals should be viewed only as a first increment toward achieving next-generation, high-load blockchain protocols, and major advances will additionally require a basic rethinking of technical approaches.

The Bitcoin P2P Network

Measurements of the P2P network can be considered as a lower bound for Bitcoin usage, and they provide interesting results on the adoption of such virtual currency.

Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies

It is shown that attacks that are commonly believed to be hard are actually within the reach of anyone with access to a BGP-enabled network and hijacking less than 900 prefixes, and several suggestions on approaches to mitigate such attacks employing both short-term and long-term measures are provided.

Secure High-Rate Transaction Processing in Bitcoin

The GHOST rule is addressed, a modification to the way Bitcoin nodes construct and re-organize the block chain, Bitcoin’s core distributed data-structure, to address security concerns over high transaction throughput.

On the Security and Performance of Proof of Work Blockchains

This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.