Paper 2016/716
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power
Tuyet Duong and Lei Fan and Thomas Veale and Hong-Sheng Zhou
Abstract
Cryptocurrencies like Bitcoin have proven to be very successful in practice and have gained lots of attention from the industries and the academia. The security of Bitcoin-like systems is based on the assumption that the majority of the computing power is under the control of honest players. However, this assumption has been seriously challenged recently and Bitcoin-like systems will fail when this assumption is broken. We propose the first Bitcoin-like protocol that is secure in the presence of a malicious majority of computing power. On top of Bitcoin's brilliant ideas of utilizing the power of the honest miners, via their computing power together with blocks, to secure the blockchain, we further leverage the power of the honest users, via their coins together with transactions, to achieve this goal. In particular, we propose a novel strategy for selecting the best blockchain from many competing chains by carefully comparing coins in these blockchains. In addition, we rigorously prove important security properties of our protocol in an extension of the blockchain analysis framework by Garay et al [Eurocrypt 2015].
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Preprint. MINOR revision.
- Contact author(s)
- duongtt3 @ vcu edu
- History
- 2017-04-16: last of 4 revisions
- 2016-07-21: received
- See all versions
- Short URL
- https://ia.cr/2016/716
- License
-
CC BY