Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 77 tok/s
Gemini 2.5 Pro 54 tok/s Pro
GPT-5 Medium 29 tok/s Pro
GPT-5 High 26 tok/s Pro
GPT-4o 103 tok/s Pro
Kimi K2 175 tok/s Pro
GPT OSS 120B 454 tok/s Pro
Claude Sonnet 4.5 38 tok/s Pro
2000 character limit reached

Bribe & Fork: Cheap Bribing Attacks via Forking Threat (2402.01363v2)

Published 2 Feb 2024 in cs.CR

Abstract: In this work, we reexamine the vulnerability of Payment Channel Networks (PCNs) to bribing attacks, where an adversary incentivizes blockchain miners to deliberately ignore a specific transaction to undermine the punishment mechanism of PCNs. While previous studies have posited a prohibitive cost for such attacks, we show that this cost may be dramatically reduced (to approximately \$125), thereby increasing the likelihood of these attacks. To this end, we introduce Bribe & Fork, a modified bribing attack that leverages the threat of a so-called feather fork which we analyze with a novel formal model for the mining game with forking. We empirically analyze historical data of some real-world blockchain implementations to evaluate the scale of this cost reduction. Our findings shed more light on the potential vulnerability of PCNs and highlight the need for robust solutions.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (35)
  1. Blocks list in btc 2022. https://explorer.btc.com/btc/blocks. Accessed: 2023-10-06.
  2. Blocks list in etc 2022. https://explorer.btc.com/etc/insights-pools. Accessed: 2023-10-06.
  3. Blocks list in ltc 2022. https://explorer.btc.com/ltc/insights-pools. Accessed: 2023-10-06.
  4. Live income estimation of all known asic miners. https://www.asicminervalue.com. Accessed: 2023-10-06.
  5. Total hash rate (th/s) for bitcoin. https://www.blockchain.com/explorer/charts/hash-rate. Accessed: 2023-10-06.
  6. Generalized bitcoin-compatible channels. Cryptology ePrint Archive 2020 (2020), 476.
  7. Bitcoin-compatible virtual channels. In IEEE Symposium on Security and Privacy (2021).
  8. Sleepy channels: Bi-directional payment channels without watchtowers. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 179–192.
  9. Brick: Asynchronous incentive-compatible payment channels. In International Conference on Financial Cryptography and Data Security (2021).
  10. Suborn channels: Incentives against timelock bribes. In Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers (2022), vol. 13411 of Lecture Notes in Computer Science, Springer, pp. 488–511.
  11. Cerberus channels: Incentivizing watchtowers for bitcoin. In International Conference on Financial Cryptography and Data Security (2020), Springer, pp. 346–366.
  12. How to use bitcoin to design fair protocols. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference (2014), vol. 8617 of Lecture Notes in Computer Science, Springer, pp. 421–439.
  13. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy (2015), pp. 104–121.
  14. Rapidash: Foundations of side-contract-resilient fair exchange. Cryptology ePrint Archive, Paper 2022/1063, 2022. https://eprint.iacr.org/2022/1063.
  15. On scaling decentralized blockchains. In International Conference on Financial Cryptography and Data Security (2016), Springer, pp. 106–125.
  16. eltoo: A simple layer2 protocol for bitcoin. https://blockstream.com/eltoo.pdf, 2019.
  17. A fast and scalable payment network with bitcoin duplex micropayment channels. In Stabilization, Safety, and Security of Distributed Systems (2015), Springer, pp. 3–18.
  18. Perun: Virtual payment hubs over cryptocurrencies. In 2019 IEEE Symposium on Security and Privacy (SP) (2019), IEEE, pp. 344–361.
  19. General state channel networks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), ACM, pp. 949–966.
  20. Sok: Layer-two blockchain protocols. In Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers (2020), J. Bonneau and N. Heninger, Eds., vol. 12059 of Lecture Notes in Computer Science, Springer, pp. 201–226.
  21. Lightweight virtual payment channels. In Cryptology and Network Security (2020), Springer International Publishing, pp. 365–384.
  22. Measuring miner decentralization in proof-of-work blockchains. arXiv preprint arXiv:2203.16058 (2022).
  23. Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems (2018), pp. 99–104.
  24. Miller, A. Feather-forks: enforcing a blacklist with sub-50% hash power.
  25. Zero-collateral lotteries in bitcoin and ethereum, 2017.
  26. Timelocked bribing. In Financial Cryptography and Data Security - 25th International Conference, FC (2021), vol. 12674 of Lecture Notes in Computer Science, Springer, pp. 53–72.
  27. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008. http://bitcoin.org/bitcoin.pdf.
  28. The bitcoin lightning network: Scalable off-chain instant payments. https://lightning.network/lightning-network-paper.pdf (1 2016).
  29. A theoretical model for fork analysis in the bitcoin network.
  30. A survey on various attacks in bitcoin and cryptocurrency. In 2019 International Conference on Communication and Signal Processing (ICCSP) (2019), IEEE, pp. 0220–0224.
  31. Spilman, J. Anti dos for tx replacement. https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2013-April/002433.html, 2013. Accessed: 2020-11-22.
  32. MAD-HTLC: because HTLC is crazy-cheap to attack. In 42nd IEEE Symposium on Security and Privacy, SP (2021), IEEE, pp. 1230–1248.
  33. He-htlc: Revisiting incentives in HTLC. In 30th Annual Network and Distributed System Security Symposium, NDSS (2023), The Internet Society.
  34. Temporary censorship attacks in the presence of rational miners. In 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops (2019), IEEE, pp. 357–366.
  35. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper (2014).
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

This paper has been mentioned in 2 posts and received 0 likes.