Bribe & Fork: Cheap Bribing Attacks via Forking Threat (2402.01363v2)
Abstract: In this work, we reexamine the vulnerability of Payment Channel Networks (PCNs) to bribing attacks, where an adversary incentivizes blockchain miners to deliberately ignore a specific transaction to undermine the punishment mechanism of PCNs. While previous studies have posited a prohibitive cost for such attacks, we show that this cost may be dramatically reduced (to approximately \$125), thereby increasing the likelihood of these attacks. To this end, we introduce Bribe & Fork, a modified bribing attack that leverages the threat of a so-called feather fork which we analyze with a novel formal model for the mining game with forking. We empirically analyze historical data of some real-world blockchain implementations to evaluate the scale of this cost reduction. Our findings shed more light on the potential vulnerability of PCNs and highlight the need for robust solutions.
- Blocks list in btc 2022. https://explorer.btc.com/btc/blocks. Accessed: 2023-10-06.
- Blocks list in etc 2022. https://explorer.btc.com/etc/insights-pools. Accessed: 2023-10-06.
- Blocks list in ltc 2022. https://explorer.btc.com/ltc/insights-pools. Accessed: 2023-10-06.
- Live income estimation of all known asic miners. https://www.asicminervalue.com. Accessed: 2023-10-06.
- Total hash rate (th/s) for bitcoin. https://www.blockchain.com/explorer/charts/hash-rate. Accessed: 2023-10-06.
- Generalized bitcoin-compatible channels. Cryptology ePrint Archive 2020 (2020), 476.
- Bitcoin-compatible virtual channels. In IEEE Symposium on Security and Privacy (2021).
- Sleepy channels: Bi-directional payment channels without watchtowers. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 179–192.
- Brick: Asynchronous incentive-compatible payment channels. In International Conference on Financial Cryptography and Data Security (2021).
- Suborn channels: Incentives against timelock bribes. In Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers (2022), vol. 13411 of Lecture Notes in Computer Science, Springer, pp. 488–511.
- Cerberus channels: Incentivizing watchtowers for bitcoin. In International Conference on Financial Cryptography and Data Security (2020), Springer, pp. 346–366.
- How to use bitcoin to design fair protocols. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference (2014), vol. 8617 of Lecture Notes in Computer Science, Springer, pp. 421–439.
- Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy (2015), pp. 104–121.
- Rapidash: Foundations of side-contract-resilient fair exchange. Cryptology ePrint Archive, Paper 2022/1063, 2022. https://eprint.iacr.org/2022/1063.
- On scaling decentralized blockchains. In International Conference on Financial Cryptography and Data Security (2016), Springer, pp. 106–125.
- eltoo: A simple layer2 protocol for bitcoin. https://blockstream.com/eltoo.pdf, 2019.
- A fast and scalable payment network with bitcoin duplex micropayment channels. In Stabilization, Safety, and Security of Distributed Systems (2015), Springer, pp. 3–18.
- Perun: Virtual payment hubs over cryptocurrencies. In 2019 IEEE Symposium on Security and Privacy (SP) (2019), IEEE, pp. 344–361.
- General state channel networks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), ACM, pp. 949–966.
- Sok: Layer-two blockchain protocols. In Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers (2020), J. Bonneau and N. Heninger, Eds., vol. 12059 of Lecture Notes in Computer Science, Springer, pp. 201–226.
- Lightweight virtual payment channels. In Cryptology and Network Security (2020), Springer International Publishing, pp. 365–384.
- Measuring miner decentralization in proof-of-work blockchains. arXiv preprint arXiv:2203.16058 (2022).
- Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems (2018), pp. 99–104.
- Miller, A. Feather-forks: enforcing a blacklist with sub-50% hash power.
- Zero-collateral lotteries in bitcoin and ethereum, 2017.
- Timelocked bribing. In Financial Cryptography and Data Security - 25th International Conference, FC (2021), vol. 12674 of Lecture Notes in Computer Science, Springer, pp. 53–72.
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008. http://bitcoin.org/bitcoin.pdf.
- The bitcoin lightning network: Scalable off-chain instant payments. https://lightning.network/lightning-network-paper.pdf (1 2016).
- A theoretical model for fork analysis in the bitcoin network.
- A survey on various attacks in bitcoin and cryptocurrency. In 2019 International Conference on Communication and Signal Processing (ICCSP) (2019), IEEE, pp. 0220–0224.
- Spilman, J. Anti dos for tx replacement. https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2013-April/002433.html, 2013. Accessed: 2020-11-22.
- MAD-HTLC: because HTLC is crazy-cheap to attack. In 42nd IEEE Symposium on Security and Privacy, SP (2021), IEEE, pp. 1230–1248.
- He-htlc: Revisiting incentives in HTLC. In 30th Annual Network and Distributed System Security Symposium, NDSS (2023), The Internet Society.
- Temporary censorship attacks in the presence of rational miners. In 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops (2019), IEEE, pp. 357–366.
- Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper (2014).
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.