Tailstorm: A Secure and Fair Blockchain for Cash Transactions (2306.12206v1)
Abstract: Proof-of-work (PoW) cryptocurrencies rely on a balance of security and fairness in order to maintain a sustainable ecosystem of miners and users. Users demand fast and consistent transaction confirmation, and in exchange drive the adoption and valuation of the cryptocurrency. Miners provide the confirmations, however, they primarily seek rewards. In unfair systems, miners can amplify their rewards by consolidating mining power. Centralization however, undermines the security guarantees of the system and might discourage users. In this paper we present Tailstorm, a cryptocurrency that strikes this balance. Tailstorm merges multiple recent protocol improvements addressing security, confirmation latency, and throughput with a novel incentive mechanism improving fairness. We implement a parallel proof-of-work consensus mechanism with $k$ PoWs per block to obtain state-of-the-art consistency guarantees. Inspired by Bobtail and Storm, we structure the individual PoWs in a tree which, by including a list of transactions with each PoW, reduces confirmation latency and improves throughput. Our proposed incentive mechanism discounts rewards based on the depth of this tree. Thereby, it effectively punishes information withholding, the core attack strategy used to reap an unfair share of rewards. We back our claims with a comprehensive analysis. We present a generic system model which allows us to specify Bitcoin, $B_k$, and Tailstorm from a joint set of assumptions. We provide an analytical bound for the fairness of Tailstorm and Bitcoin in honest networks and we confirm the results through simulation. We evaluate the effectiveness of dishonest behaviour through reinforcement learning. Our attack search reproduces known optimal strategies against Bitcoin, uncovers new ones against $B_k$, and confirms that Tailstorm's reward discounting makes it more resilient to incentive layer attacks.
- Modeling coordinated vs. P2P mining: An analysis of inefficiency and inequality in proof-of-work blockchains, 2021. arXiv:2106.02970.
- Generalizing weighted trees: A bridge from Bitcoin to GHOST. In Conference on Advances in Financial Technologies, pages 156–169. ACM, 2021.
- Bitcoin: A natural oligopoly. Management Science, 68(7):4755–4771, 2022.
- awemany. Storm. https://github.com/awemany/storm-sim/blob/master/whitepaper/, 2019.
- Prism: Deconstructing the blockchain to approach physical limits. In Conference on Computer and Communications Security, pages 585–602. ACM, 2019.
- SoK: Consensus in the age of blockchains. In Conference on Advances in Financial Technologies, pages 183–198. ACM, 2019.
- Efficient MDP analysis for selfish-mining in blockchains. In Conference on Advances in Financial Technologies, pages 113–131. ACM, 2020.
- Fairness and efficiency in DAG-based cryptocurrencies. In Financial Cryptography and Data Security, volume 12059 of LNCS, pages 79–96. Springer, 2020.
- George Bissias. Radium: Improving dynamic PoW targeting. In Workshop on Cryptocurrencies and Blockchain Technology, volume 12484 of LNCS, pages 374–389. Springer, 2020.
- Bobtail: Improved blockchain security with low-variance mining. In Network and Distributed Systems Security Symposium. Internet Society, 2020.
- OpenAI Gym, 2016. arXiv:1606.01540.
- On the instability of Bitcoin without the block reward. In Conference on Computer and Communications Security, pages 154–167. ACM, 2016.
- Matt Corallo. BIP152: Compact Block Relay. https://github.com/bitcoin/ bips/blob/master/bip-0152.mediawiki, 2016.
- TxProbe: Discovering Bitcoin’s network topology using orphan transactions. In Financial Cryptography and Data Security, volume 11598 of LNCS, pages 550–566. Springer, 2019.
- Everything is a race and Nakamoto always wins. In Conference on Computer and Communications Security, pages 859–878. ACM, 2020.
- Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, volume 8437 of LNCS, pages 436–454. Springer, 2014.
- Selfish mining in Ethereum. In International Conference on Distributed Computing Systems, pages 1306–1316, 2019.
- Analysis of difficulty control in Bitcoin and proof-of-work blockchains. In Conference on Decision and Control, pages 5988–5992. IEEE, 2018.
- SoK: A consensus taxonomy in the blockchain era. In Topics in Cryptology – CT-RSA 2020, volume 12006 of Lecture Notes in Computer Science, pages 284–318. Springer, 2020.
- The Bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology – EUROCRYPT 2015, volume 9057 of LNCS, pages 281–310. Springer, 2015.
- On the security and performance of proof of work blockchains. In Conference on Computer and Communications Security, pages 3–16. ACM, 2016.
- Algorand: Scaling byzantine agreements for cryptocurrencies. In Symposium on Operating Systems Principles, pages 51–68. ACM, 2017.
- Tailstorm node implementation. https://gitlab.com/georgebissias/BCHUnlimited/-/tree/tailstorm_prototype, 2023.
- Bitcoin’s latency–security analysis made simple. In Conference on Advances in Financial Technologies. ACM, 2022.
- Thomas M. Harding. Real-time block rate targeting. Ledger, 5, 2020.
- SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. In Network and Distributed Systems Security Symposium. Internet Society, 2021.
- Nonlinear feedback control and stability analysis of a proof-of-work blockchain. Modeling, Identification and Control, 38(4):157–168, 2017.
- Patrik Keller. PyPI release of our reinforcement learning environment as OpenAI Gym. https://pypi.org/project/cpr-gym/0.7.0/, 2023.
- Parallel proof-of-work with concrete bounds. In Conference on Advances in Financial Technologies. ACM, 2022.
- Source code for our simulator, evaluations, and attack search. https://github.com/pkel/cpr/tree/arxiv-v1, 2023.
- Blockchain mining games. In Conference on Economics and Computation, pages 365–382. ACM, 2016.
- Ouroboros: A provably secure proof-of-stake blockchain protocol. In Advances in Cryptology – CRYPTO 2017, volume 10401 of LNCS, pages 357–388. Springer, 2017.
- HaPPY-mine: Designing a mining reward function. In Financial Cryptography and Data Security, volume 12675 of LNCS, pages 250–268. Springer, 2021.
- A better method to analyze blockchain consistency. In Conference on Computer and Communications Security, pages 729–744. ACM, 2018.
- Daniel Kraft. Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 9(2):397–413, 2016.
- Impossibility of full decentralization in permissionless blockchains. In Conference on Advances in Financial Technologies, pages 110–123. ACM, 2019.
- Close latency–security trade-off for the Nakamoto consensus. In Conference on Advances in Financial Technologies, pages 100–113. ACM, 2021.
- All that glitters is not Bitcoin – unveiling the centralized nature of the BTC (IP) network. In Network Operations and Management Symposium. IEEE, 2020.
- Competing (semi-)selfish miners in Bitcoin. In Conference on Advances in Financial Technologies, pages 89–109. ACM, 2019.
- Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Technical report, 2008.
- Selfish mining re-examined. In Financial Cryptography and Data Security, volume 12059 of LNCS, pages 61–78. Springer, 2020.
- Graphene: Efficient interactive set reconciliation applied to blockchain propagation. In Special Interest Group on Data Communication, pages 303–317. ACM, 2019.
- FruitChains: A fair blockchain. In Symposium on Principles of Distributed Computing, pages 315–324. ACM, 2017.
- Peter R. Rizun. Subchains: A technique to scale bitcoin and improve the user experience. Ledger, 1:38–52, 2016.
- Kadcast: A structured approach to broadcast in blockchain networks. In Conference on Advances in Financial Technologies, pages 199–213. ACM, 2019.
- Blockchain layer zero: Characterizing the bitcoin network through measurements, models, and simulations. In Conference on Local Computer Networks, pages 9–16. IEEE, 2021.
- Sheldon M. Ross. Introduction to Probability Models. Elsevier, 2014.
- Optimal selfish mining strategies in Bitcoin. In Financial Cryptography and Data Security, volume 9603 of LNCS, pages 515–532. Springer, 2016.
- Proximal policy optimization algorithms, 2017. arXiv:1707.06347.
- Asynchronous proof-of-stake. In Stabilization, Safety, and Security of Distributed Systems, volume 13046 of LNCS, pages 194–208. Springer, 2021.
- Phantom Ghostdag: A scalable generalization of Nakamoto consensus. In Conference on Advances in Financial Technologies, pages 57–70. ACM, 2021.
- Secure high-rate transaction processing in Bitcoin. In Financial Cryptography and Data Security, volume 8975 of LNCS, pages 507–527. Springer, 2015.
- Pricing ASICs for cryptocurrency mining, 2023. arXiv:2002.11064.
- OHIE: Blockchain scaling made simple. In Symposium on Security and Privacy, pages 112–127. IEEE, 2020.
- Lay down the common metrics: Evaluating proof-of-work consensus protocols’ security. In Symposium on Security and Privacy, pages 1190–1207. IEEE, 2019.
Collections
Sign up for free to add this paper to one or more collections.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.