Rigorous and Generalized Proof of Security of Bitcoin Protocol with Bounded Network Delay
By: Christopher Blake , Chen Feng , Xuechao Wang and more
Potential Business Impact:
Proves Bitcoin is safe even with delays.
A proof of the security of the Bitcoin protocol is made rigorous, and simplified in certain parts. A computational model in which an adversary can delay transmission of blocks by time $Δ$ is considered. The protocol is generalized to allow blocks of different scores and a proof within this more general model is presented. An approach used in a previous paper that used random walk theory is shown through a counterexample to be incorrect; an approach involving a punctured block arrival process is shown to remedy this error. Thus, it is proven that with probability one, the Bitcoin protocol will have infinitely many honest blocks so long as the fully-delayed honest mining rate exceeds the adversary mining rate.
Similar Papers
How to Beat Nakamoto in the Race
Cryptography and Security
Makes blockchains safer from attacks.
Larger-scale Nakamoto-style Blockchains Offer Better Security
Cryptography and Security
Makes blockchain safer by using slow communication.
How to Beat Nakamoto in the Race
Cryptography and Security
Makes blockchains safer from hackers' tricks.