Nakamoto invented the longest chain protocol, and claimed its security by analyzing the private double-spend attack, a race between the adversary and the honest nodes to grow a longer chain. But is it the worst attack? We answer the question in the affirmative for three classes of longest chain protocols, designed for different consensus models: 1) Nakamoto\u27s original Proof-of-Work protocol; 2) Ouroboros and SnowWhite Proof-of-Stake protocols; 3) Chia Proof-of-Space protocol. As a consequence, exact characterization of the maximum tolerable adversary power is obtained for each protocol as a function of the average block time normalized by the network delay. The security analysis of these protocols is performed in a unified manner by a no...
Abstract. In this paper we revisit some major orthodoxies which lie at the heart of the bitcoin cryp...
In a blockchain, the longest chain, which has the greatest proof-of-work effort spent in it, represe...
Finality gadgets are comprised of a Byzantine Fault Tolerant (BFT) protocol finalizing blocks produc...
Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of a ...
First implemented in Bitcoin, Nakamoto Consensus (NC) is the most influential consensus protocol in ...
Nakamoto\u27s famous blockchain protocol enables achieving consensus in a so-called permissionless s...
Blockchain protocols implement total-order broadcast in a permissionless setting, where processes ca...
Single Secret Leader Elections have recently been proposed as an improved leader election mechanism ...
We establish the optimal security threshold for the Bitcoin protocol in terms of adversarial hashing...
Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of...
In applications that use blockchains, Proof of Stake (PoS) chains have become an attractive alternat...
A principal vulnerability of a proof-of-work ("PoW") blockchain is that an attacker can re-write the...
Fault-tolerant distributed systems move the trust in a single party to a majority of parties partici...
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capi...
Transaction processing speed is one of the major considerations in cryptocurrencies that are based o...
Abstract. In this paper we revisit some major orthodoxies which lie at the heart of the bitcoin cryp...
In a blockchain, the longest chain, which has the greatest proof-of-work effort spent in it, represe...
Finality gadgets are comprised of a Byzantine Fault Tolerant (BFT) protocol finalizing blocks produc...
Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of a ...
First implemented in Bitcoin, Nakamoto Consensus (NC) is the most influential consensus protocol in ...
Nakamoto\u27s famous blockchain protocol enables achieving consensus in a so-called permissionless s...
Blockchain protocols implement total-order broadcast in a permissionless setting, where processes ca...
Single Secret Leader Elections have recently been proposed as an improved leader election mechanism ...
We establish the optimal security threshold for the Bitcoin protocol in terms of adversarial hashing...
Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of...
In applications that use blockchains, Proof of Stake (PoS) chains have become an attractive alternat...
A principal vulnerability of a proof-of-work ("PoW") blockchain is that an attacker can re-write the...
Fault-tolerant distributed systems move the trust in a single party to a majority of parties partici...
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capi...
Transaction processing speed is one of the major considerations in cryptocurrencies that are based o...
Abstract. In this paper we revisit some major orthodoxies which lie at the heart of the bitcoin cryp...
In a blockchain, the longest chain, which has the greatest proof-of-work effort spent in it, represe...
Finality gadgets are comprised of a Byzantine Fault Tolerant (BFT) protocol finalizing blocks produc...