• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Cryptographic puzzles and dos resilience, revisited. Designs, Codes and Cryptography, (2013)

by Bogdan Groza, Bogdan Warinschi
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Non-outsourceable scratch-off puzzles to discourage bitcoin mining coalitions

by Andrew Miller, Ahmed Kosba, Jonathan Katz, Elaine Shi , 2014
"... Abstract—An implicit goal of Bitcoin’s reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin’s security claims rely on no single entity wielding a sufficiently large portion of the net-work’s overall computational power. ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Abstract—An implicit goal of Bitcoin’s reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin’s security claims rely on no single entity wielding a sufficiently large portion of the net-work’s overall computational power. Unfortunately, rather than participating independently, most Bitcoin miners join coalitions called mining pools in which a central pool administrator largely directs the pool’s activity, leading to a consolidation of power. Recently, the largest mining pool has accounted for more than half of network’s total mining capacity. Relatedly, “hosted mining” service providers offer their clients the benefit of economies-of-scale, tempting them away from independent participation. We argue that the prevalence of mining coalitions is due to a limitation of the Bitcoin proof-of-work puzzle – specifically, that it affords an effective mechanism for enforcing cooperation in a coalition. We present several definitions and constructions for “nonoutsourceable ” puzzles that thwart such enforcement mechanisms, thereby deterring coalitions. We also provide an implementation and benchmark results for our schemes to show they are practical. I.
(Show Context)

Citation Context

...d. Although the Bitcoin puzzle is commonly referred to as a proof-of-work puzzle, the requirements of the puzzle are somewhat different than existing definitions for proof-of-work puzzles [15], [19], =-=[24]-=-, [47]. Before proceeding with our main contribution of nonoutsourceable puzzles, we first provide a formal definition of the basic requirements of the Bitcoin puzzle, which we call a scratch-off puzz...

PREPRINT: Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions

by Andrew Miller , Elaine Shi , Jonathan Katz , Ahmed Kosba
"... ABSTRACT An implicit goal of Bitcoin's reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin's security claims rely on no single entity wielding a sufficiently large portion of the network's overall compu ..."
Abstract - Add to MetaCart
ABSTRACT An implicit goal of Bitcoin's reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin's security claims rely on no single entity wielding a sufficiently large portion of the network's overall computational power Unfortunately, rather than participating independently, most Bitcoin miners join coalitions called mining pools in which a central pool administrator largely directs the pool's activity, leading to a consolidation of power. Recently, the largest mining pool, GHash.IO, has accounted for more than half of network's total mining capacity. 1 Relatedly, "hosted mining" service providers offer their clients the benefit of economies-of-scale, tempting them away from independent participation. We argue that the prevalence of mining coalitions is due to a limitation of the Bitcoin proof-of-work puzzle -specifically, that it supports an effective mechanism for enforcing cooperation in a coalition. We present several definitions and constructions for "nonoutsourceable" puzzles that thwart such enforcement mechanisms, thereby deterring coalitions. We also provide an implementation and benchmark results for our schemes to show they are practical.
(Show Context)

Citation Context

...market price. We believe this provides a sufficiently strong deterrent against mining coalitions. 1.2 Related Work Computational puzzles. Moderately hard computational puzzles, often referred to as “proofs of work,” were originally proposed for the purpose of combating email spam [13] (though this application is nowadays generally considered impractical [20]). Most work on computational puzzles has focused instead on “client puzzles,” which can be used to prevent denial-of-service attacks [18]. Recently, several attempts have been made to provide formal security definitions for client puzzles [9, 16, 30]. Theoretical and economic understanding of Bitcoin. Although a purely digital currency has been long sought after by researchers [7, 8, 10], Bitcoin’s key insight is to frame the problem as a consensus protocol and to provide an incentive for users to participate. Although Bitcoin’s security has initially been proven (informally) in the “honest majority” model [24, 25], this assumption is unsatisfying in practice, since it says nothing about what design requirements the incentive scheme should satisfy in order to ensure an honest majority. An economic analysis of Bitcoin mining was provided b...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University