The Blockchain Anomaly
@article{Natoli2016TheBA, title={The Blockchain Anomaly}, author={Christopher Natoli and Vincent Gramoli}, journal={2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)}, year={2016}, pages={310-317} }
Most popular blockchain solutions rely on proof-of-work to guarantee that participants reach consensus on a unique block per index of the chain. As consensus is impossible in the general case, it seems that these blockchain systems require messages are delivered fast and no participant mines faster than the crowd. To date, no experimental settings have however been proposed to demonstrate this hypothesis. In this paper, we identify conditions under which these blockchain systems fail to ensure…
118 Citations
On the Danger of Private Blockchains ( When PoW can be Harmful to Applications with Termination Requirements )
- Computer Science, Mathematics
- 2016
It is argued that foundations are needed in order to precisely capture the guarantees of the consensus protocols of novel blockchain systems before one can deploy them safely and define the termination of consensus to characterize when blockchain transactions commit.
Anomaly Detection in Blockchain Networks: A Comprehensive Survey
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2023
An in-depth survey regarding integration of anomaly detection models in blockchain technology is provided, discussing how anomaly detection can aid in ensuring security of blockchain based applications and highlighting certain important challenges.
Data Storage in the Decentralized World: Blockchain and Derivatives
- Computer Science, MathematicsArXiv
- 2020
This chapter explains the concept of blockchain technology and the data that the authors can store therein and the evolution assumptions of data storage in a decentralized world and proposes a multi-platform interoperable scalable architecture.
From blockchain consensus back to Byzantine consensus
- Computer Science, MathematicsFuture Gener. Comput. Syst.
- 2020
The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium
- Computer Science, Mathematics2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
- 2017
This paper identifies a new form of attack, called the Balance attack, against these forkable blockchain systems, and captures the tradeoff between the network delay and the mining power of the attacker needed to double-spend in the GHOST protocol.
Red Belly: A Secure, Fair and Scalable Open Blockchain
- Computer Science, Mathematics2021 IEEE Symposium on Security and Privacy (SP)
- 2021
Although its performance is affected by attacks, RBBC scales in that its throughput increases to hundreds of consensus nodes and achieves 30k TPS throughput and 3 second latency on 1000 VMs, hence improving by 3× both the latency and the throughput of its closest competitor.
EPoW: Solving blockchain problems economically
- Computer Science, Mathematics2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
- 2017
This work proposes EPoW, i.e. estimable proof-of-work, to estimate how much work is done and a corresponding protocol to reach consensus, and believes blockchains and digital currencies can be better customized by companies, organizations or countries for different purposes or policies and be employed by any users.
International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2019, May 6-7, 2019, Paris, France
- Computer Science, MathematicsTokenomics
- 2020
This talk starts by developing an understanding of the basic protocols used in blockchain, and elaborate on their main advantages and limitations, and explores some of the challenges of managing large scale fully replicated ledgers in the context of achieving large scale consensus.
On Availability for Blockchain-Based Systems
- Computer Science2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)
- 2017
This paper identifies the availability limitations of two mainstream blockchains, Ethereum and Bitcoin, and demonstrates that while read availability of blockchains is typically high, write availability - for transaction management - is actually low.
The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example
- Computer Science, MathematicsArXiv
- 2016
The theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability, and confirms that main proof-of-work blockchain protocols can be badly suited for consortium blockchains.
References
SHOWING 1-10 OF 33 REFERENCES
On the Danger of Private Blockchains ( When PoW can be Harmful to Applications with Termination Requirements )
- Computer Science, Mathematics
- 2016
It is argued that foundations are needed in order to precisely capture the guarantees of the consensus protocols of novel blockchain systems before one can deploy them safely and define the termination of consensus to characterize when blockchain transactions commit.
A Secure Sharding Protocol For Open Blockchains
- Computer Science, MathematicsCCS
- 2016
ELASTICO is the first candidate for a secure sharding protocol with presence of byzantine adversaries, and scalability experiments on Amazon EC2 with up to $1, 600$ nodes confirm ELASTICO's theoretical scaling properties.
The Blockchain as a Software Connector
- Computer Science2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)
- 2016
This paper provides rationales to support the architectural decision on whether to employ a decentralized blockchain as opposed to other software solutions, like traditional shared data storage and explores specific implications of using the blockchain as a software connector including design trade-offs regarding quality attributes.
Bitcoin-NG: A Scalable Blockchain Protocol
- Computer Science, MathematicsNSDI
- 2016
This paper implements Bitcoin-NG, a new blockchain protocol designed to scale, which is Byzantine fault tolerant, is robust to extreme churn, and shares the same trust model obviating qualitative changes to the ecosystem.
The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication
- Computer ScienceiNetSeC
- 2015
In the early days of Bitcoin, the performance of its probabilistic proof-of-work (PoW) based consensus fabric, also known as blockchain, was not a major issue, and Bitcoin became a success story, despite its consensus latencies on the order of an hour and the theoretical peak throughput of only up to 7 transactions per second.
ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER
- Computer Science
- 2014
The blockchain paradigm when coupled with cryptographically-secured transactions has demonstrated its utility through a number of projects, with Bitcoin being one of the most notable ones, and Ethereum implements this paradigm in a generalised manner.
Bitcoin: A Peer-to-Peer Electronic Cash System
- Computer Science
- 2008
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
- Computer Science, MathematicsFinancial Cryptography
- 2014
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain, and conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups.
Bitcoin meets strong consistency
- Computer Science, MathematicsICDCN
- 2016
This paper proposes a new system, PeerCensus, which acts as a certification authority, manages peer identities in a peer-to-peer network, and ultimately enhances Bitcoin and similar systems with strong consistency.
Secure High-Rate Transaction Processing in Bitcoin
- Computer Science, MathematicsFinancial Cryptography
- 2015
The GHOST rule is addressed, a modification to the way Bitcoin nodes construct and re-organize the block chain, Bitcoin’s core distributed data-structure, to address security concerns over high transaction throughput.