Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell
{"title":"Model Checking Bitcoin and other Proof-of-Work Consensus Protocols","authors":"Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell","doi":"10.1109/Blockchain50366.2020.00051","DOIUrl":null,"url":null,"abstract":"The Bitcoin Backbone Protocol [4] is an abstraction of the bitcoin proof-of-work consensus protocol. We use a model-checking tool (UPPAAL-SMC) to examine the security of proof-of-work consensus by varying protocol parameters, using an adversary that leverages the selfish mining strategy introduced in [4]. We provide insights into modeling proof-of-work protocols and demonstrate trade-offs between operating parameters. Applying this methodology to protocol design, we show that the uniform tie-breaking rule from [11], an attempt to mitigate selfish mining, improves chain quality but decreases the common prefix probability. This trade-off illustrates how design decisions affect desirable protocol properties, within a range of concrete operating conditions, in a manner that is not evident from prior asymptotic analysis.","PeriodicalId":109440,"journal":{"name":"2020 IEEE International Conference on Blockchain (Blockchain)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Blockchain (Blockchain)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Blockchain50366.2020.00051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The Bitcoin Backbone Protocol [4] is an abstraction of the bitcoin proof-of-work consensus protocol. We use a model-checking tool (UPPAAL-SMC) to examine the security of proof-of-work consensus by varying protocol parameters, using an adversary that leverages the selfish mining strategy introduced in [4]. We provide insights into modeling proof-of-work protocols and demonstrate trade-offs between operating parameters. Applying this methodology to protocol design, we show that the uniform tie-breaking rule from [11], an attempt to mitigate selfish mining, improves chain quality but decreases the common prefix probability. This trade-off illustrates how design decisions affect desirable protocol properties, within a range of concrete operating conditions, in a manner that is not evident from prior asymptotic analysis.