Nakamoto consensus
Longest-chain fork-choice rule & proof-of-work
Security properties
The Bitcoin Backbone Protocol: Analysis and Applications
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
Eurocrypt'15, Related Slide by Kiayias
Originally in the lock-step model, updated for non-lock-step
Follow-up: Full Analysis of Nakamoto Consensus in Bounded-Delay Networks (2020.3)
Analysis of the Blockchain Protocol in Asynchronous Networks (2016)
Rafael Pass (Cornell Tech), Lior Seeman (Harvard University), abhi shelat (U of Virginia)
Eurocrypt'17 Slide (Refined slide)
Hybrid Freezing Model for simplicity and prove that it's OK
Follow-up: Rethinking Large-Scale Consensus (Video)
Towards better bounds
A Better Method to Analyze Blockchain Consistency
Lucianna Kiffer, Rajmohan Rajaraman and abhi shelat (Northeastern University)
CCS'18 Video, Video @Simons Institute
Prove the consistency (Definition 2.1) of Longest-chain, GHOST, CliqueChain (a variation of the Chainweb) with Markov-chain-based framework
Analysis of Nakamoto Consensus
Ling Ren (UIUC)
Video @Simons Institute, Followup post
Continuous time (no "round"), ideal lottery instead of random oracle model
Tight Consistency Bounds for Bitcoin
Peter Gaˇzi, Aggelos Kiayias, and Alexander Russell (IOHK)
CCS'20
Concurrent work: Everything is a Race and Nakamoto Always Wins (similar results, CCS'20)
Proofs in different approches/models
Bitcoin as a Transaction Ledger: A Composable Treatment (2018)
Christian Badertscher (ETH), Ueli Maurer (ETH), Daniel Tschudi (Aarhus), and Vassilis Zikas (Edinburgh)
UC model of the Bitcoin blockchain and of general permissionless blockchains
The Bitcoin Backbone Protocol Against Quantum Adversaries
Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
A State-Space Modeling Framework for Engineering Blockchain-Enabled Economic Systems
Slide Medium
The Bitcoin Cash Backbone Protocol
Juan Garay and Yu Shen
The Longest-Chain Protocol Under Random Delays
Suryanarayana Sankagiri (UIUC), Shreyas Gandlur, Bruce Hajek
Weakening the assumptions
Security of the Blockchain against Long Delay Attack
Puwen Wei Quan Yuan (Shandong University), and Yuliang Zheng (University of Alaba)
AsiaCrypto'18
Improve to tolerate Long delay attack (network delay larger than the mining rate)
Redefine the properties of chain growth rate and common prefix
Bitcoin Security under Temporary Dishonest Majority
Georgia Avarikioti, Lukas K ̈appeli, Yuyi Wang, and Roger Wattenhofer (ETH Zurich)
Extension to Garay et al.
(Abstract) We prove Bitcoin is secure under temporary dishonest majority. We assume the adversary can corrupt a specific fraction of parties and also introduce crash failures, i.e., some honest participants are offline during the execution of the protocol. We demand a majority of honest on-line participants on expectation. We explore three different models and present the requirements for proving Bitcoin’s security in all of them. We first examine a synchronous model, then extend to a bounded delay model and last we consider a synchronous model that allows message losses.
FC'19
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos
IACR PKC '18
Bootstrap the genesis block
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
Juan Garay, Aggelos Kiayias, and Nikos Leonardos
Prove that Nakamoto’s protocol achieves, under suitable conditions, consistency and liveness in bounded-delay networks with adaptive (as opposed to predetermined) dynamic participation assuming, as in previous works, that the majority of the computational power favors the honest parties.
Difficulty adjustment
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
Revisiting Difficulty Control for Blockchain Systems
Dmitry Meshko (IOHK) et al.
Deep dive into Current PoW Difficulty Adjustment Algorithm and a Possible Alternative @ethresear.ch
A Lucas Critique to the Difficulty Adjustment Algorithm of the Bitcoin System
Shunya Noda, Kyohei Okumura, Yoshinori Hashimoto
Japanese
Others
Improvements
Bobtail: Improved Blockchain Security with Low-Variance Mining
George Bissias Brian N. Levine (UMass Amherst)
NDSS'20, Scailing'17
Origin of PoW
Pricing via Processing or Combatting Junk Mail
Cynthia Dwork (IBM), Moni Naor
Proofs of Work and Bread Pudding Protocols
Markus Jakobsson
Survey
Agreement with Satoshi – On the Formalization of Nakamoto Consensus
Nicholas Stifter∗†, Aljosha Judmayer∗, Philipp Schindler∗, Alexei Zamyatin‡∗, Edgar Weippl∗†
∗SBA Research, ‡Imperial College London, †Christian Doppler Laboratory for Security and Quality Improvement in the Production System Lifecycle (CDL-SQI), TU Wien
#Layer1 #PoW