Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell
{"title":"模型检查比特币和其他工作量证明共识协议","authors":"Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell","doi":"10.1109/Blockchain50366.2020.00051","DOIUrl":null,"url":null,"abstract":"The Bitcoin Backbone Protocol [4] is an abstraction of the bitcoin proof-of-work consensus protocol. We use a model-checking tool (UPPAAL-SMC) to examine the security of proof-of-work consensus by varying protocol parameters, using an adversary that leverages the selfish mining strategy introduced in [4]. We provide insights into modeling proof-of-work protocols and demonstrate trade-offs between operating parameters. Applying this methodology to protocol design, we show that the uniform tie-breaking rule from [11], an attempt to mitigate selfish mining, improves chain quality but decreases the common prefix probability. This trade-off illustrates how design decisions affect desirable protocol properties, within a range of concrete operating conditions, in a manner that is not evident from prior asymptotic analysis.","PeriodicalId":109440,"journal":{"name":"2020 IEEE International Conference on Blockchain (Blockchain)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Model Checking Bitcoin and other Proof-of-Work Consensus Protocols\",\"authors\":\"Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell\",\"doi\":\"10.1109/Blockchain50366.2020.00051\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Bitcoin Backbone Protocol [4] is an abstraction of the bitcoin proof-of-work consensus protocol. We use a model-checking tool (UPPAAL-SMC) to examine the security of proof-of-work consensus by varying protocol parameters, using an adversary that leverages the selfish mining strategy introduced in [4]. We provide insights into modeling proof-of-work protocols and demonstrate trade-offs between operating parameters. Applying this methodology to protocol design, we show that the uniform tie-breaking rule from [11], an attempt to mitigate selfish mining, improves chain quality but decreases the common prefix probability. This trade-off illustrates how design decisions affect desirable protocol properties, within a range of concrete operating conditions, in a manner that is not evident from prior asymptotic analysis.\",\"PeriodicalId\":109440,\"journal\":{\"name\":\"2020 IEEE International Conference on Blockchain (Blockchain)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Blockchain (Blockchain)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Blockchain50366.2020.00051\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Blockchain (Blockchain)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Blockchain50366.2020.00051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Model Checking Bitcoin and other Proof-of-Work Consensus Protocols
The Bitcoin Backbone Protocol [4] is an abstraction of the bitcoin proof-of-work consensus protocol. We use a model-checking tool (UPPAAL-SMC) to examine the security of proof-of-work consensus by varying protocol parameters, using an adversary that leverages the selfish mining strategy introduced in [4]. We provide insights into modeling proof-of-work protocols and demonstrate trade-offs between operating parameters. Applying this methodology to protocol design, we show that the uniform tie-breaking rule from [11], an attempt to mitigate selfish mining, improves chain quality but decreases the common prefix probability. This trade-off illustrates how design decisions affect desirable protocol properties, within a range of concrete operating conditions, in a manner that is not evident from prior asymptotic analysis.