scispace - formally typeset
Open AccessJournal ArticleDOI

Analysis of a Consensus Protocol for Extending Consistent Subchains on the Bitcoin Blockchain

Riccardo Longo, +2 more
- Vol. 8, Iss: 3, pp 67
Reads0
Chats0
TLDR
This paper proposes an improved version of a consensus protocol formalized in the previous work, built on top of the Bitcoin protocol, to incentivize third-party nodes to consistently extend their subchains, and performs an extensive analysis of this protocol.
Abstract
Currently, an increasing number of third-party applications exploit the Bitcoin blockchain to store tamper-proof records of their executions, immutably. For this purpose, they leverage the few extra bytes available for encoding custom metadata in Bitcoin transactions. A sequence of records of the same application can thus be abstracted as a stand-alone subchain inside the Bitcoin blockchain. However, several existing approaches do not make any assumptions about the consistency of their subchains, either (i) neglecting the possibility that this sequence of messages can be altered, mainly due to unhandled concurrency, network malfunctions, application bugs, or malicious users, or (ii) giving weak guarantees about their security. To tackle this issue, in this paper, we propose an improved version of a consensus protocol formalized in our previous work, built on top of the Bitcoin protocol, to incentivize third-party nodes to consistently extend their subchains. Besides, we perform an extensive analysis of this protocol, both defining its properties and presenting some real-world attack scenarios, to show how its specific design choices and parameter configurations can be crucial to prevent malicious practices.

read more

Citations
More filters
Journal ArticleDOI

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

TL;DR: PreHEALTH is presented, a privacy-preserving EHR management solution that uses distributed ledger technology and an Identity Mixer to store patient records effectively whilst providing anonymity and unlinkability and its efficiency and feasibility for real-world scale deployment.
Journal ArticleDOI

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

TL;DR: In this paper, the authors present PREHEALTH, a privacy-preserving EHR management solution that uses distributed ledger technology and an Identity Mixer (Idemix) to provide anonymity and unlinkability.
Journal ArticleDOI

Blockchain based Decentralized Applications: Technology Review and Development Guidelines.

TL;DR: This paper provides a comprehensive overview of DLT solutions analyzing the addressed challenges, provided solutions and their usage for developing decentralized applications and provides a multi-step guideline for decentralizing the design of traditional systems and implementing decentralized applications.
Journal ArticleDOI

A security framework for Ethereum smart contracts

TL;DR: ESAF (Ethereum Security Analysis Framework) is presented, a framework for analysis of smart contracts that aims to unify and facilitate the task of analysing smart contract vulnerabilities which can be used as a persistent security monitoring tool for a set of target contracts as well as a classic vulnerability analysis tool among other uses.
Journal Article

A Proof-of-Stake protocol for consensus on Bitcoin subchains.

TL;DR: In this paper, the authors propose a consensus protocol based on Proof-of-Stake that incentivizes nodes to consistently extend the subchain of the Bitcoin blockchain to make it difficult for an adversary to subvert the execution of a contract by making its subchain inconsistent.
References
More filters
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Book ChapterDOI

Kademlia: A Peer-to-Peer Information System Based on the XOR Metric

TL;DR: In this paper, the authors describe a peer-to-peer distributed hash table with provable consistency and performance in a fault-prone environment, which routes queries and locates nodes using a novel XOR-based metric topology.
Journal ArticleDOI

Formalizing and Securing Relationships on Public Networks

Nick Szabo
- 01 Sep 1997 - 
TL;DR: Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.
Book ChapterDOI

Pricing via Processing or Combatting Junk Mail

TL;DR: A computational technique for combatting junk mail in particular and controlling access to a shared resource in general is presented, which requires a user to compute a moderately hard, but not intractable, function in order to gain access to the resource, thus preventing frivolous use.
Related Papers (5)