Affiliation:
1. School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
Abstract
In the blockchain network, the communication delay between different nodes is a great threat to the distributed ledger consistency of each miner. Blockchain is the core technology of Bitcoin. At present, some research has proven the security of the PoW protocol when the number of delay rounds is small, but in complex asynchronous networks, the research is insufficient on the security of the PoW protocol when the number of delay rounds is large. This paper improves the proposed blockchain main chain record model under the PoW protocol and then proposes the TOD model, which makes the main chain record in the model more close to the actual situation and reduces the errors caused by the establishment of the model in the analysis process. By comparing the differences between the TOD model and the original model, it is verified that the improved model has a higher success rate of attack when the probability of mining the delayable block increases. Then, the long delay attack is improved on the balance attack in this paper, which makes the adversary control part of the computing power and improves the success rate of the adversary attack within a certain limit.
Funder
National Natural Science Foundation of China
Foundation for the Key Research and Development Program of Gansu Province, China
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference20 articles.
1. Longo, R., Mascia, C., Meneghetti, A., Santilli, G., and Tognolini, G. (2022). Adaptable Cryptographic Primitives in Blockchains via Smart Contracts. Cryptography, 6.
2. Romano, D., and Schmid, G. (2021). Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology. Cryptography, 5.
3. Martínez, V.G., Hernández-Álvarez, L., and Encinas, L.H. (2020). Analysis of the Cryptographic Tools for Blockchain and Bitcoin. Mathematics, 8.
4. Caldarola, F., d’Atri, G., and Zanardo, E. (2022). Neural Fairness Blockchain Protocol Using an Elliptic Curves Lottery. Mathematics, 10.
5. Heilman, E., Kendler, A., Zohar, A., and Goldberg, S. (2015, January 12–14). Eclipse Attacks on Bitcoin’s Peer-to-Peer Network. Proceedings of the 24th USENIX Security Symposium, Washington, DC, USA.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献