Secure High-Rate Transaction Processing in Bitcoin

@inproceedings{Sompolinsky2015SecureHT,
  title={Secure High-Rate Transaction Processing in Bitcoin},
  author={Yonatan Sompolinsky and Aviv Zohar},
  booktitle={Financial Cryptography},
  year={2015}
}
Bitcoin is a disruptive new crypto-currency based on a decentralized open-source protocol which has been gradually gaining momentum. [] Key Method We address this security concern through the GHOST rule, a modification to the way Bitcoin nodes construct and re-organize the block chain, Bitcoin’s core distributed data-structure. GHOST has been adopted and a variant of it has been implemented as part of the Ethereum project, a second generation distributed applications platform.
Erlay: Efficient Transaction Relay for Bitcoin
TLDR
A new transaction dissemination protocol, Erlay, is proposed that not only reduces the bandwidth consumption by 40% assuming current connectivity, but also keeps the bandwidth use almost constant as the connectivity increases, in contrast to the existing protocol, which increases the bandwidth Consumption linearly with the number of connections.
A Survey on Security and Privacy Issues of Bitcoin
TLDR
This paper presents a systematic survey that covers the security and privacy aspects of Bitcoin, and reviews the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol.
Securing and scaling cryptocurrencies
TLDR
A series of innovations derived from the state of the art in several fields has been applied to cryptocurrencies, and has been slowly reshaping monetary and financial instruments on public distributed ledgers.
Decentralized Cryptocurrency Security and Financial Implications
TLDR
The chapter discusses the regulatory and financial implications of the Bitcoin network to show how countries around the world are reacting to the widespread use of cryptocurrencies.
Bitcoin Concepts, Threats, and Machine-Learning Security Solutions
TLDR
This survey paper conducts an intensive study that explores key security concerns of the Bitcoin system and its main technologies including the blockchain protocol, and details the existing threats and weaknesses of the system.
Multi-mode Cryptocurrency Systems
TLDR
This paper generalizes the recent framework by Garay et al (Eurocrypt 2015) with new security conditions that capture the security of realistic cryptocurrency systems and analyzes existing blockchain pruning proposals for Bitcoin and Ethereum aiming to improve the storage of network nodes by pruning unnecessary information from the ledger.
Decentralization in Bitcoin and Ethereum Networks
TLDR
The extent of decentralization is investigated by measuring the network resources of nodes and the interconnection among them, the protocol requirements affecting the operation of nodes, and the robustness of the two systems against attacks.
Bitcoin's Security Model Revisited
TLDR
It is shown that no such guarantee can be effectively given if the attacker can choose when to launch the attack, and this improves the understanding of Bitcoin's security guarantees and provides correct bounds for those wishing to safely accept transactions.
Speed-Security Tradeo s in Blockchain Protocols
TLDR
This work investigates the tradeo between provable security and transaction processing speed viewing the latter as a function of the block generation rate, and introduces a new formal property of blockchain protocols, called chain growth, and shows it is fundamental for arguing the security of a robust transaction ledger.
Symposium on Foundations and Applications of Blockchain Proceedings
TLDR
This talk will show how protocols for verifiable computation (cryptographic techniques that enable an untrusted party to efficiently prove the validity of a statement to a verifier), can be used to address problems of scalability, security and privacy.
...
...

References

SHOWING 1-10 OF 16 REFERENCES
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
TLDR
Zerocoin is proposed, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions and uses standard cryptographic assumptions and does not introduce new trusted parties or otherwise change the security model of Bitcoin.
Analysis of Hashrate-Based Double Spending
TLDR
A look at the stochastic processes underlying typical attacks and their resulting probabilities of success in Bitcoin.
Information propagation in the Bitcoin network
TLDR
This paper analyzes how Bitcoin uses a multi-hop broadcast to propagate transactions and blocks through the network to update the ledger replicas, and verifies the conjecture that the propagation delay in the network is the primary cause for blockchain forks.
Double-spending fast payments in bitcoin
TLDR
It is shown that, unless appropriate detection techniques are integrated in the current Bitcoin implementation, double-spending attacks on fast payments succeed with overwhelming probability and can be mounted at low cost.
Inclusive Block Chain Protocols
TLDR
The mechanics of the block chain and block propagation are constrained: if blocks are created at a high rate compared to their propagation time in the network, many conflicting blocks arecreated and performance suffers greatly, and transactions take long to securely confirm, and their throughput is greatly limited.
Quantitative Analysis of the Full Bitcoin Transaction Graph
TLDR
This paper answers for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, andHow they move bitcoins between their various accounts in order to better protect their privacy.
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
TLDR
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain, and conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups.
Evaluating User Privacy in Bitcoin
TLDR
This research examines the use of pseudonymity in the Bitcoin network, and the role that it plays in the development of trust and confidence in the system.
On Bitcoin and red balloons
TLDR
A brief report of recent research on information distribution mechanisms in networks, namely Bitcoin, and proposes reward schemes that will remedy an incentives problem in Bitcoin in a Sybil-proof manner, with little payment overhead.
Analysis of Bitcoin Pooled Mining Reward Systems
TLDR
The various scoring systems used to calculate rewards of participants in Bitcoin pooled mining are described, explain the problems each were designed to solve and analyze their respective advantages and disadvantages.
...
...