Inclusive block chain protocols

Yoad Lewenberg, Yonatan Sompolinsky*, Aviv Zohar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

232 Scopus citations

Abstract

Distributed cryptographic protocols such as Bitcoin and Ethereum use a data structure known as the block chain to synchronize a global log of events between nodes in their network. Blocks, which are batches of updates to the log, reference the parent they are extending, and thus form the structure of a chain. Previous research has shown that the mechanics of the block chain and block propagation are constrained: if blocks are created at a high rate compared to their propagation time in the network, many conflicting blocks are created and performance suffers greatly. As a result of the low block creation rate required to keep the system within safe parameters, transactions take long to securely confirm, and their throughput is greatly limited. We propose an alternative structure to the chain that allows for operation at much higher rates. Our structure consists of a directed acyclic graph of blocks (the block DAG). The DAG structure is created by allowing blocks to reference multiple predecessors, and allows for more “forgiving” transaction acceptance rules that incorporate transactions even from seemingly conflicting blocks. Thus, larger blocks that take longer to propagate can be tolerated by the system, and transaction volumes can be increased. Another deficiency of block chain protocols is that they favor more connected nodes that spread their blocks faster—fewer of their blocks conflict. We show that with our system the advantage of such highly connected miners is greatly reduced. On the negative side, attackers that attempt to maliciously reverse transactions can try to use the forgiving nature of the DAG structure to lower the costs of their attacks. We provide a security analysis of the protocol and show that such attempts can be easily countered.

Original languageEnglish
Title of host publicationFinancial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers
EditorsTatsuaki Okamoto, Rainer Bohme
PublisherSpringer Verlag
Pages528-547
Number of pages20
ISBN (Print)9783662478530
DOIs
StatePublished - 2015
Event19th International Conference on Financial Cryptography and Data Security, FC 2015 - San Juan, Puerto Rico
Duration: 26 Jan 201530 Jan 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8975
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th International Conference on Financial Cryptography and Data Security, FC 2015
Country/TerritoryPuerto Rico
CitySan Juan
Period26/01/1530/01/15

Bibliographical note

Publisher Copyright:
© International Financial Cryptography Association 2015.

Fingerprint

Dive into the research topics of 'Inclusive block chain protocols'. Together they form a unique fingerprint.

Cite this