Nakamoto invented the longest chain protocol, and claimed its security by analyzing the private double-spend attack, a race between the adversary and the honest nodes to grow a longer chain. But is it the worst attack? We answer the question in the affirmative for three classes of longest chain protocols, designed for different consensus models: 1) Nakamoto's original Proof-of-Work protocol; 2) Ouroboros and SnowWhite Proof-of-Stake protocols; 3) Chia Proof-of-Space protocol. As a consequence, exact characterization of the maximum tolerable adversary power is obtained for each protocol as a function of the average block time normalized by the network delay. The security analysis of these protocols is performed in a unified manner by a novel method of reducing all attacks to a race between the adversary and the honest nodes.
CITATION STYLE
Dembo, A., Kannan, S., Tas, E. N., Tse, D., Viswanath, P., Wang, X., & Zeitouni, O. (2020). Everything is a Race and Nakamoto Always Wins. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 859–878). Association for Computing Machinery. https://doi.org/10.1145/3372297.3417290
Mendeley helps you to discover research relevant for your work.