2015
DOI: 10.1007/978-3-662-46803-6_10
|View full text |Cite
|
Sign up to set email alerts
|

The Bitcoin Backbone Protocol: Analysis and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

11
1,217
1
5

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 1,045 publications
(1,270 citation statements)
references
References 24 publications
11
1,217
1
5
Order By: Relevance
“…Implementing a consistent bulletin board is beyond our scope, however we note that it can be achieved in the standard model using Byzantine agrement (BA) (for BA, see e.g., [26]) by assuming secure channels between any pair of parties. In fact, recently, it is shown that one can achieve BA efficiently even without secure channels in a completely anonymous setting [27] hence removing the requirement for pairwise secure channels (but note that this latter work relies on proofs of work modeled in the RO model). Why previously known techniques do not work.…”
Section: Introductionmentioning
confidence: 99%
“…Implementing a consistent bulletin board is beyond our scope, however we note that it can be achieved in the standard model using Byzantine agrement (BA) (for BA, see e.g., [26]) by assuming secure channels between any pair of parties. In fact, recently, it is shown that one can achieve BA efficiently even without secure channels in a completely anonymous setting [27] hence removing the requirement for pairwise secure channels (but note that this latter work relies on proofs of work modeled in the RO model). Why previously known techniques do not work.…”
Section: Introductionmentioning
confidence: 99%
“…As in Garay et al's formal analysis of the Bitcoin backbone protocol [GKL15], the problem is made tractable by assuming that communications over the network are instantaneous. Honest miners are always working with the longest blockchain that they know of, and the broadcast messages are always received by all the miners.…”
Section: Game Modelmentioning
confidence: 99%
“…Relevant values for the delay ∆ can be deduced from the analysis performed in [GKL15] where the authors evaluate the probability to have a fork of two branches of a given length. From a practical point of view, a look back to the history of broadcast Bitcoin blocks permits to find all the accidental forks that have ever been observed.…”
Section: Relevant Values For ∆mentioning
confidence: 99%
“…Under certain assumptions about the network synchronicity and the hardness of the proof, the above mechanism has been shown to be robust in the sense of satisfying two properties, persistence (transactions remain stable in the "ledger") and liveness (all transactions are eventually inserted in the ledger) assuming that the honest parties are above majority [GKL15]. Puzzle-based cryptocurrencies have also drawn a lot of criticism due to the fact that they require a lot of natural resources (e.g., in [OM14] it is reported that Bitcoin mining in 2014 already consumed as much energy as the needs of the country of Ireland for electricity).…”
Section: Powork-based Cryptocurrenciesmentioning
confidence: 99%
“…The formal statement and proof of the theorem (that should also include a formalization of all relevant underlying properties of cryptocurrencies, both in the puzzle-based and knowledgebased setting, e.g., in the sense of [GKL15]) is out of scope for the present exposition.…”
Section: Powork-based Cryptocurrenciesmentioning
confidence: 99%