Abstract
Proof-of-Work is originally a client-side puzzle proposed to prevent spam or denial of service attacks. In 2008, Satoshi Nakamoto used it as an election mechanism (or equivalently, to replace a centralized time server) in the first Blockchain: Bitcoin. In the same year, another spam prevention algorithm was proposed, based on a guided-tour puzzle, but received only little attention.
The main motivation of our work is to see if a Blockchain protocol can use the guided-tour puzzle like Bitcoin uses Proof-of-work.
In this paper we extend the guided tour puzzle to a new Puzzle called Proof-of-Interaction and we show how it can replace, in the Bitcoin protocol, the Proof-of-Work algorithm. We show that it uses a negligible amount of computational power compared to Bitcoin, and scales very well in term of number of messages. We analyze the security of our protocol and show that it is not subject to selfish mining. However, our protocol currently works only when the nodes in the network are known, but we discuss how this assumption could be weakened in future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
There are some ways to limit this attack, but we believe it will remain an important attack vector.
References
Poet 1.0 specification. https://sawtooth.hyperledger.org/docs/core/releases/1.2.4/architecture/poet.html
Abliz, M., Znati, T.: A guided tour puzzle for denial of service prevention. In: 2009 Annual Computer Security Applications Conference, pp. 279–288. IEEE (2009)
Alsunaidi, S.J., Alhaidari, F.A.: A survey of consensus algorithms for blockchain technology. In: 2019 International Conference on Computer and Information Sciences (ICCIS), pp. 1–6. IEEE (2019)
Back, A., et al.: Hashcash-a denial of service counter-measure (2002)
Bonnet, F., Bramas, Q., Défago, X.: Stateless distributed ledgers. arXiv preprint arXiv:2006.10985 (2020)
Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20(4), 398–461 (2002)
CBECI: Cambridge bitcoin electricity consumption index (2020). https://www.cbeci.org
Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., Shi, W.: On security analysis of Proof-of-Elapsed-Time (PoET). In: Spirakis, P., Tsigas, P. (eds.) Stabilization, Safety, and Security of Distributed Systems, SSS 2017. LNCS, vol. 10616, pp. 282–297. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69084-1_19
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) Peer-to-Peer Systems, IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24
Eyal, I., Sirer, E.G.: Majority Is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) Financial Cryptography and Data Security, FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28
Gallersdörfer, U., Klaaßen, L., Stoll, C.: Energy consumption of cryptocurrencies beyond bitcoin. Joule (2020)
Gaži, P., Kiayias, A., Russell, A.: Stake-bleeding attacks on proof-of-stake blockchains. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 85–92. IEEE (2018)
IO, E.: Eos. IO technical white paper. EOS. IO (2017). https://github.com/EOSIO/Documentation. Accessed 18 December 2017
King, S., Nadal, S.: Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19 (2012)
Kwon, J.: Tendermint: Consensus without mining. Draft v. 0.6, fall 1(11) (2014)
Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR (2004)
Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., Brooks, R.: A brief survey of cryptocurrency systems. In: 2016 14th annual conference on privacy, security and trust (PST), pp. 745–752. IEEE (2016)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Preneel, B.: Analysis and design of cryptographic hash functions. Ph.D. Thesis, Katholieke Universiteit te Leuven (1993)
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30
Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward non-parallelizable client puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) Cryptology and Network Security, pp. 247–264. Springer, Berlin Heidelberg, Berlin, Heidelberg (2007)
Wang, W., Hoang, D.T., Hu, P., Xiong, Z., Niyato, D., Wang, P., Wen, Y., Kim, D.I.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328–22370 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Abegg, JP., Bramas, Q., Noël, T. (2021). Blockchain Using Proof-of-Interaction. In: Echihabi, K., Meyer, R. (eds) Networked Systems. NETYS 2021. Lecture Notes in Computer Science(), vol 12754. Springer, Cham. https://doi.org/10.1007/978-3-030-91014-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-91014-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91013-6
Online ISBN: 978-3-030-91014-3
eBook Packages: Computer ScienceComputer Science (R0)