SlideShare une entreprise Scribd logo
1  sur  19
Lecture 3: Proof of Work and Nakamoto
Consensus
Longest Chain Rule
Decentralized Identity, Ownership, Transfer
Variable difficulty mining
Private attack; security analysis
Blockchain with Merkle Trees
Block: Header + Data
Header: Pointer to previous
block
= hash of the previous block
header and Merkle root of data
of previous block
Data: information specific to
block
Application: Centralized
tamper evident information log
with efficient proof of
membership of any data entry
Head of the chain being known
is enough to find tamper
evidence in any internal block
Decentralized Blockchain
Block: Header + Data +
Signature
Header: Pointer to previous
block
= hash of the previous block
header and Merkle root of data
of previous block
Data: information specific to
block
List of signatures known ahead
of time: permissioned
blockchains
Questions:
1. How is this list known
ahead of time?
2. Which user in this list gets
to add which block?
3. Who polices this?
This is the topic of this
Distributed Consensus
Question: Who maintains the ledger of transactions?
Distributed Consensus
Interactive Protocol
Allows distributed non-trusting nodes to come to agreement
Traditional area of computer science (Byzantine Fault
Tolerance)
Bitcoin’s consensus protocol is vastly different
decentralized identity (permissionless setting)
less pessimistic network assumptions
Decentralized Identity
Public keys are used as identity
Single entity can create vast number of identities
Sybil
Cannot do majority or super-majority voting
Network Assumption
Any node can broadcast to all nodes into the network
fully connected network
Every broadcast message reaches every node
albeit with some delay
Bitcoin: ten minutes
This is the focus of Lecture 4
Oracle
Time is organized into slots
Oracle selects one of the nodes (public identities)
random
everyone can verify the unique winner
The selected node is the proposer in that slot
constitutes a block with transactions
validates transactions
includes hash pointer to previous block
signs the block
Proof of Work
Practical method to simulate the Oracle
Mining
cryptographic hash function creates computational puzzle
Hash(nonce, block-hash) < Threshold
nonce is the proof of work
include nonce inside the block
Threshold
chosen such that a block is mined successfully on average once in 10
minutes
a successfully mined block will be broadcast to all nodes in the network
Properties of Proof of Work Mining
Random miner selected at each time
Independent randomness across time and across miners
Probability of successful mining proportional to fraction of total hash power
Sybil resistance
Spam resistance
Tamper proof
Longest Chain Protocol
Where should the mined block hash-point to?
Blockchain may have forks
because of network delays
because of adversarial action
Longest chain protocol
attach the block to the leaf of the longest chain in the block
what if two equal length chains? Discussed next
Why Variable Difficulty
Block Difficulty
As of March 2015, the mining target/threshold (in hexadecimal) is:
0000000000000000172EC0000000000000000000000000000000000000000000
So the hash of any valid block must be below this value.
In other words, only one in about 2^67 nonces that you try will work.
Difficulty of a block:
Block_difficulty = 1/mining_target
Bitcoin Rule
(a) The mining difficulty changes every 2016 blocks
next_difficulty = (previous_difficulty * 2016 * 10 minutes) / (time to mine last
2016 blocks)
(b) Adopt the heaviest chain instead of the longest chain
chain_difficulty = sum of block_difficulty
(c) Allow the difficulty to be adjusted only mildly every epoch
¼ < next_difficulty/previous_difficulty < 4
Alternate Bitcoin Rule (Only (b))
Let the miners choose their own difficulty and then use (b) the heaviest chain
rule.
Alternate Bitcoin Rule ((a) + (b))
Difficulty rising attack
Bitcoin Rule ((a) + (b) + (c))
Security Analysis: Private Attack
Adversary can point its block to an older part of the chain
Duplicate transaction inserted
Plausible Deniability
network latency
an offline user will not know which block came earlier
blocks have no wall clock reference (time stamps).
Satoshi’s Table
Security Analysis: k Deep Confirmation Rule
Security vs Latency with Private Attack

Contenu connexe

Similaire à Lecture3

Understanding Blockchain
Understanding Blockchain Understanding Blockchain
Understanding Blockchain Razi Salih
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionDSCIITPatna
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptxGopalSB
 
Blockchain-SSM.pptx
Blockchain-SSM.pptxBlockchain-SSM.pptx
Blockchain-SSM.pptxAditya786867
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of TrustMarco Segato
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyNavin Kumar
 
Introduction to bit coin
Introduction to bit coinIntroduction to bit coin
Introduction to bit coinVivian S. Zhang
 
Do a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architectDo a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architectDustiBuckner14
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationDr. Mohamed Torky
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceAlecHo7
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfVISHNURAJSSNSCEAD
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & EthereumBlockchainHub Graz
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
Blockchain: An Innovative Technology
Blockchain: An Innovative TechnologyBlockchain: An Innovative Technology
Blockchain: An Innovative TechnologyIJSRED
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
 

Similaire à Lecture3 (20)

Understanding Blockchain
Understanding Blockchain Understanding Blockchain
Understanding Blockchain
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptx
 
Blockchain-SSM.pptx
Blockchain-SSM.pptxBlockchain-SSM.pptx
Blockchain-SSM.pptx
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
R1x g16 blockchain
R1x g16 blockchainR1x g16 blockchain
R1x g16 blockchain
 
Introduction to bit coin
Introduction to bit coinIntroduction to bit coin
Introduction to bit coin
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Do a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architectDo a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architect
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in Space
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdf
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Blockchain: An Innovative Technology
Blockchain: An Innovative TechnologyBlockchain: An Innovative Technology
Blockchain: An Innovative Technology
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin
 

Plus de AEA Albania Energy Association

Plus de AEA Albania Energy Association (7)

Mpwat SDGs - 2023 Social Entrepreneurship and Social Innovation
Mpwat SDGs - 2023 Social Entrepreneurship and Social InnovationMpwat SDGs - 2023 Social Entrepreneurship and Social Innovation
Mpwat SDGs - 2023 Social Entrepreneurship and Social Innovation
 
Huawei Digitalization - Presentation for UNI Lu
Huawei   Digitalization - Presentation for UNI LuHuawei   Digitalization - Presentation for UNI Lu
Huawei Digitalization - Presentation for UNI Lu
 
Coronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptx
Coronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptxCoronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptx
Coronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptx
 
Big Boss Assignment Solution_update.pptx
Big Boss Assignment Solution_update.pptxBig Boss Assignment Solution_update.pptx
Big Boss Assignment Solution_update.pptx
 
Seminar 3 Impiante Makanike
Seminar 3 Impiante Makanike Seminar 3 Impiante Makanike
Seminar 3 Impiante Makanike
 
PREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUT
PREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUTPREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUT
PREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUT
 
Cool Startup Business Plan by Slidesgo.pptx
Cool Startup Business Plan by Slidesgo.pptxCool Startup Business Plan by Slidesgo.pptx
Cool Startup Business Plan by Slidesgo.pptx
 

Dernier

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Dernier (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Lecture3

  • 1. Lecture 3: Proof of Work and Nakamoto Consensus Longest Chain Rule Decentralized Identity, Ownership, Transfer Variable difficulty mining Private attack; security analysis
  • 2. Blockchain with Merkle Trees Block: Header + Data Header: Pointer to previous block = hash of the previous block header and Merkle root of data of previous block Data: information specific to block Application: Centralized tamper evident information log with efficient proof of membership of any data entry Head of the chain being known is enough to find tamper evidence in any internal block
  • 3. Decentralized Blockchain Block: Header + Data + Signature Header: Pointer to previous block = hash of the previous block header and Merkle root of data of previous block Data: information specific to block List of signatures known ahead of time: permissioned blockchains Questions: 1. How is this list known ahead of time? 2. Which user in this list gets to add which block? 3. Who polices this? This is the topic of this
  • 4. Distributed Consensus Question: Who maintains the ledger of transactions? Distributed Consensus Interactive Protocol Allows distributed non-trusting nodes to come to agreement Traditional area of computer science (Byzantine Fault Tolerance) Bitcoin’s consensus protocol is vastly different decentralized identity (permissionless setting) less pessimistic network assumptions
  • 5. Decentralized Identity Public keys are used as identity Single entity can create vast number of identities Sybil Cannot do majority or super-majority voting
  • 6. Network Assumption Any node can broadcast to all nodes into the network fully connected network Every broadcast message reaches every node albeit with some delay Bitcoin: ten minutes This is the focus of Lecture 4
  • 7. Oracle Time is organized into slots Oracle selects one of the nodes (public identities) random everyone can verify the unique winner The selected node is the proposer in that slot constitutes a block with transactions validates transactions includes hash pointer to previous block signs the block
  • 8. Proof of Work Practical method to simulate the Oracle Mining cryptographic hash function creates computational puzzle Hash(nonce, block-hash) < Threshold nonce is the proof of work include nonce inside the block Threshold chosen such that a block is mined successfully on average once in 10 minutes a successfully mined block will be broadcast to all nodes in the network
  • 9. Properties of Proof of Work Mining Random miner selected at each time Independent randomness across time and across miners Probability of successful mining proportional to fraction of total hash power Sybil resistance Spam resistance Tamper proof
  • 10. Longest Chain Protocol Where should the mined block hash-point to? Blockchain may have forks because of network delays because of adversarial action Longest chain protocol attach the block to the leaf of the longest chain in the block what if two equal length chains? Discussed next
  • 12. Block Difficulty As of March 2015, the mining target/threshold (in hexadecimal) is: 0000000000000000172EC0000000000000000000000000000000000000000000 So the hash of any valid block must be below this value. In other words, only one in about 2^67 nonces that you try will work. Difficulty of a block: Block_difficulty = 1/mining_target
  • 13. Bitcoin Rule (a) The mining difficulty changes every 2016 blocks next_difficulty = (previous_difficulty * 2016 * 10 minutes) / (time to mine last 2016 blocks) (b) Adopt the heaviest chain instead of the longest chain chain_difficulty = sum of block_difficulty (c) Allow the difficulty to be adjusted only mildly every epoch ¼ < next_difficulty/previous_difficulty < 4
  • 14. Alternate Bitcoin Rule (Only (b)) Let the miners choose their own difficulty and then use (b) the heaviest chain rule.
  • 15. Alternate Bitcoin Rule ((a) + (b)) Difficulty rising attack
  • 16. Bitcoin Rule ((a) + (b) + (c))
  • 17. Security Analysis: Private Attack Adversary can point its block to an older part of the chain Duplicate transaction inserted Plausible Deniability network latency an offline user will not know which block came earlier blocks have no wall clock reference (time stamps).
  • 18. Satoshi’s Table Security Analysis: k Deep Confirmation Rule
  • 19. Security vs Latency with Private Attack

Notes de l'éditeur

  1. Need a figure here. Show forks and point out the longest chain
  2. The mining power of Bitcoin increased exponentially by an astonishing factor of 10^14 during its decade of deployment.
  3. 2016 * 10 minutes = 2 weeks
  4. Attack: The adversary tries to mine a "super" block that is as difficult as k honest block. For the adversarial mining process, although the mean is the same, the variance is much high. If the adversary is "luck", he can mine this super block before honest nodes mine k blocks, the probability of which is a constant rather than exponentially decaying in 𝑘.
  5. The adversary creates an epoch filled with timestamps extremely close-together, so that the difficulty adjustment rule from (a) will set the difficulty extremely high for the next epoch, at which point, the adversary can utilize the high variance of the mining similar to the aforementioned attack.
  6. When the adversary completes one epoch in its private chain, the honest chain is much longer. The adversary can only rise the difficulty by 4. To catch up, he still needs to mine lots of blocks (some fraction of 2016), hence the variance is controlled.
  7. Figure to be drawn here of the double spend attack
  8. Private attack in terms of voters over time. Need a better figure than this. Just focus on showing the private attack