51% Attack via Difficulty Increase with a Small Quantum Miner (2403.08023v2)
Abstract: We present a strategy for a single quantum miner with relatively low hashing power, with the same ramifications as a 51% attack. Bitcoin nodes consider the chain with the highest cumulative proof-of-work to be the valid chain. A quantum miner can manipulate the block timestamps to multiply the difficulty by $c$. The fork-choice rule counts every block with increased difficulty with weight $c$. By using Grover's algorithm, it is only $O(\sqrt c)$ harder for the quantum miner to mine such blocks. By picking a high enough $c$, the single quantum miner can create a competing chain with fewer blocks, but more cumulative proof-of-work. The time required is $O(\frac{1}{r2})$ epochs, where $r$ is the fraction of the block rewards that the quantum miner would have received if they mined honestly. Most proof-of-work cryptocurrencies, including Bitcoin, are vulnerable to our attack. However, it will likely be impossible to execute in forthcoming years, as it requires an extremely fast and fault-tolerant quantum computer.
- A. M. Antonopoulos. Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O’Reilly Media, Inc., 2nd edition, 2017.
- Prism: Deconstructing the blockchain to approach physical limits. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pages 585–602, 2019.
- The Bitcoin Backbone Protocol Against Quantum Adversaries. Cryptology ePrint Archive, Paper 2019/1150, 2019.
- Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin’s Post-Quantum Security. Quantum, 7:944, March 2023.
- The Bitcoin Backbone Protocol with Chains of Variable Difficulty. In J. Katz and H. Shacham, editors, Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I, volume 10401 of Lecture Notes in Computer Science, pages 291–323. Springer, 2017.
- Strategies for Quantum Races. In A. Blum, editor, 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, volume 124 of LIPIcs, pages 51:1–51:21. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2019, arXiv: 1809.03671.
- S. Nakamoto. Bitcoin: a Peer-to-Peer Electronic Cash System, 2008.
- M. Nielsen and I. Chuang. Quantum Computing and Quantum Information. University Press, Cambridge, 2000.
- Conditions for advantageous quantum Bitcoin mining. Blockchain: Research and Applications, 4(3):100141, 2023.
- R. Pass and E. Shi. FruitChains. In Proceedings of the ACM Symposium on Principles of Distributed Computing. ACM, July 2017, Cryptology ePrint Archive: https://ia.cr/2016/916.
- O. Sattath. On the insecurity of quantum Bitcoin mining. Int. J. Inf. Sec., 19(3):291–302, 2020, arXiv: 1804.08118.
- SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive, 2016:1159, 2016.
- Y. Sompolinsky and A. Zohar. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers, pages 507–527, 2015.
- C. Zalka. Grover’s quantum searching algorithm is optimal. Phys. Rev. A, 60:2746–2751, Oct 1999.