Most research modelling Bitcoin-style decentralised consensus protocols has assumed profit-motivated participants. Complementary to this analysis, we revisit the notion of attackers with an extrinsic motivation to disrupt the consensus process (Goldfinger attacks). We outline several routes for obtaining a majority of decision-making power in the consensus protocol (a hostile takeover). Our analysis suggests several fundamental differences between proof-of-work and proof-of-stake systems in the face of such an adversary.
CITATION STYLE
Bonneau, J. (2019). Hostile Blockchain Takeovers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10958 LNCS, pp. 92–100). Springer Verlag. https://doi.org/10.1007/978-3-662-58820-8_7
Mendeley helps you to discover research relevant for your work.