




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、1區(qū)塊鏈長(zhǎng)延時(shí)協(xié)議技術(shù)研究Analysis of the Blockchain Protocol with Long Delays Nakamotos blockchainBitcoinDecentralized payment systemLedger maintained by the public in a decentralized mannerAttractive propertiesDecentralization, Pseudonymity, Robustness BlockchainChain-structured ledger maintained by all the pa
2、rticipants (miners)2 Nakamotos blockchainBlockchainBasic security requirementAll the miners maintain the same recordAchieve consensus in the permissionless settingB1B2B3B1B2B3B1B2B3permissionlessanyone can join (or leave) the protocol execution3 Nakamotos blockchainProof of work (PoW)Solve a “crypto
3、graphic puzzle”Bitcoin Backbone Protocol GKL15 blockchain C=(!, !$, , !&)block!( = (,$, -(, .( , ()( = /(,$|-(| .( , s. t. ( DH(h |-? 6h0 m1 r1Block 1h1 m2 r2Block 24 Nakamotos blockchainProof of work (PoW)Integrity:More difficult for the adversary to modify the chainSynchronism:help the distributed
4、 miners to synchronizeSlowdown the generation of blocksLongest chain ruleH(h |? %5 Nakamotos blockchainCommon prefixChain growthChain qualitySecurityGaray, Kiayias and Leonardos GKL15 provide a rigorous analysis of blockchain protocolSynchronous modelPass, Seeman and shelat PSS17 analyze the securit
5、y in an asynchronous network with a-priori bounded delayAsynchronous modelWhy consider the delay?6 Blockchain protocol with delays7Bitcoin P2P networkDelays are inevitableNew blockThe propagation delay in the network is the primary cause for blockchain forks DW13Decker and WattenhoferInformation pro
6、pagation in the bitcoin network (2013) Blockchain protocol with delaysResults PSS17,0/1Chain growth: (,-.)/,where 2 *+Consistency: 4 with probability 1 *789(4)Chain quality:1 (1 + ;) 1 ./(1 + 2)For TreeMC with common prefix of depth d-T1 ./ 1 + 2520 Long Delay Attack on Common PrefixConcrete attack
7、on the common prefix of TreeMCwhen and are “too” large relative to a fixed TGoal of attack: increase the length of the two branches by T21 Long Delay Attack on Common PrefixWith inappropriate parameters, adversaries without any hash power can threaten the commonprefix propertyFor = 0.8 and T = 6, th
8、e success probability increases as gets larger.the success probability grows much faster when 60 (10 min). When 120 (20 min), the success probability can reach about 1%.22Corrupted miner setting?23 Corrupted miner settingThe adversary can corrupt some miners and have certain fraction of the total co
9、mputational powerCommon prefixChain growthChain quality24 Security proof in corrupted miners settingChain growthCommon prefixChain qualityConsecutive blocks cannot be mined by the same miner25 Security proof in corrupted miners settingMain ideaprove that the rate of mining by corrupted miners is slower than the rate of converge with overwhelming probability26 PublicationsPuwen Wei, Quan Yuan and Yuliang Zheng. Security of the blockchain against long delay attack. In: Advances in Cryptology ASIACRYPT 2018.Quan Yuan, Puwen Wei, Keting Jia and Haiyang Xue. Analysis of the bloc
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 車輛掛靠運(yùn)輸協(xié)議
- 知識(shí)產(chǎn)權(quán)交易轉(zhuǎn)讓合同
- 中介委托服務(wù)合同
- 電子數(shù)據(jù)交易平臺(tái)合作協(xié)議書(shū)
- 基于可再生能源的城市規(guī)劃與建設(shè)合作協(xié)議
- 房地產(chǎn)銷售聯(lián)合代理合同協(xié)議書(shū)
- 低碳環(huán)保技術(shù)與產(chǎn)品推廣應(yīng)用方案
- 普通短期貨物運(yùn)輸合同
- 企業(yè)數(shù)字化轉(zhuǎn)型與供應(yīng)鏈優(yōu)化合作協(xié)議
- 辦公網(wǎng)絡(luò)安全保障方案匯報(bào)
- 《紅樓夢(mèng)講稿》PPT課件
- DB33∕T 628.1-2021 交通建設(shè)工程工程量清單計(jì)價(jià)規(guī)范 第1部分:公路工程
- 三年級(jí)下冊(cè)小學(xué)科學(xué)活動(dòng)手冊(cè)答案
- 吉祥喜金剛現(xiàn)證中品事業(yè)六支妙嚴(yán)(節(jié)錄)
- 國(guó)民中小學(xué)九年一貫課程綱要語(yǔ)文學(xué)習(xí)領(lǐng)域(國(guó)語(yǔ)文)
- 最全的人教初中數(shù)學(xué)常用概念、公式和定理
- 橋面結(jié)構(gòu)現(xiàn)澆部分施工方案
- 人教部編版四年級(jí)語(yǔ)文下冊(cè)《第1課 古詩(shī)詞三首》教學(xué)課件PPT小學(xué)優(yōu)秀公開(kāi)課
- 紙箱理論抗壓強(qiáng)度、邊壓強(qiáng)度、耐破強(qiáng)度的計(jì)算
- 周收支統(tǒng)計(jì)報(bào)表excel模板
- 海管配重基礎(chǔ)資料ppt課件
評(píng)論
0/150
提交評(píng)論