Analysis of a Consensus Protocol for Extending Consistent Subchains on the Bitcoin Blockchain
Riccardo Longo,Alessandro Sebastian Podda,Roberto Saia +2 more
- Vol. 8, Iss: 3, pp 67
Reads0
Chats0
TLDR
This paper proposes an improved version of a consensus protocol formalized in the previous work, built on top of the Bitcoin protocol, to incentivize third-party nodes to consistently extend their subchains, and performs an extensive analysis of this protocol.Abstract:
Currently, an increasing number of third-party applications exploit the Bitcoin blockchain to store tamper-proof records of their executions, immutably. For this purpose, they leverage the few extra bytes available for encoding custom metadata in Bitcoin transactions. A sequence of records of the same application can thus be abstracted as a stand-alone subchain inside the Bitcoin blockchain. However, several existing approaches do not make any assumptions about the consistency of their subchains, either (i) neglecting the possibility that this sequence of messages can be altered, mainly due to unhandled concurrency, network malfunctions, application bugs, or malicious users, or (ii) giving weak guarantees about their security. To tackle this issue, in this paper, we propose an improved version of a consensus protocol formalized in our previous work, built on top of the Bitcoin protocol, to incentivize third-party nodes to consistently extend their subchains. Besides, we perform an extensive analysis of this protocol, both defining its properties and presenting some real-world attack scenarios, to show how its specific design choices and parameter configurations can be crucial to prevent malicious practices.read more
Citations
More filters
Journal ArticleDOI
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.
Charalampos S. Stamatellis,Pavlos Papadopoulos,Nikolaos Pitropakis,Sokratis K. Katsikas,William J Buchanan +4 more
TL;DR: PreHEALTH is presented, a privacy-preserving EHR management solution that uses distributed ledger technology and an Identity Mixer to store patient records effectively whilst providing anonymity and unlinkability and its efficiency and feasibility for real-world scale deployment.
Journal ArticleDOI
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric
Charalampos S. Stamatellis,Pavlos Papadopoulos,Nikolaos Pitropakis,Sokratis K. Katsikas,William J Buchanan +4 more
TL;DR: In this paper, the authors present PREHEALTH, a privacy-preserving EHR management solution that uses distributed ledger technology and an Identity Mixer (Idemix) to provide anonymity and unlinkability.
Journal ArticleDOI
Blockchain based Decentralized Applications: Technology Review and Development Guidelines.
TL;DR: This paper provides a comprehensive overview of DLT solutions analyzing the addressed challenges, provided solutions and their usage for developing decentralized applications and provides a multi-step guideline for decentralizing the design of traditional systems and implementing decentralized applications.
Journal ArticleDOI
A security framework for Ethereum smart contracts
TL;DR: ESAF (Ethereum Security Analysis Framework) is presented, a framework for analysis of smart contracts that aims to unify and facilitate the task of analysing smart contract vulnerabilities which can be used as a persistent security monitoring tool for a set of target contracts as well as a classic vulnerability analysis tool among other uses.
Journal Article
A Proof-of-Stake protocol for consensus on Bitcoin subchains.
TL;DR: In this paper, the authors propose a consensus protocol based on Proof-of-Stake that incentivizes nodes to consistently extend the subchain of the Bitcoin blockchain to make it difficult for an adversary to subvert the execution of a contract by making its subchain inconsistent.
References
More filters
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Book ChapterDOI
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
Petar Maymounkov,David Mazières +1 more
TL;DR: In this paper, the authors describe a peer-to-peer distributed hash table with provable consistency and performance in a fault-prone environment, which routes queries and locates nodes using a novel XOR-based metric topology.
Journal ArticleDOI
Formalizing and Securing Relationships on Public Networks
TL;DR: Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.
Book ChapterDOI
Pricing via Processing or Combatting Junk Mail
Cynthia Dwork,Moni Naor +1 more
TL;DR: A computational technique for combatting junk mail in particular and controlling access to a shared resource in general is presented, which requires a user to compute a moderately hard, but not intractable, function in order to gain access to the resource, thus preventing frivolous use.