Skip to main content

Blockchain Using Proof-of-Interaction

  • Conference paper
  • First Online:
Networked Systems (NETYS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 12754))

Included in the following conference series:

Abstract

Proof-of-Work is originally a client-side puzzle proposed to prevent spam or denial of service attacks. In 2008, Satoshi Nakamoto used it as an election mechanism (or equivalently, to replace a centralized time server) in the first Blockchain: Bitcoin. In the same year, another spam prevention algorithm was proposed, based on a guided-tour puzzle, but received only little attention.

The main motivation of our work is to see if a Blockchain protocol can use the guided-tour puzzle like Bitcoin uses Proof-of-work.

In this paper we extend the guided tour puzzle to a new Puzzle called Proof-of-Interaction and we show how it can replace, in the Bitcoin protocol, the Proof-of-Work algorithm. We show that it uses a negligible amount of computational power compared to Bitcoin, and scales very well in term of number of messages. We analyze the security of our protocol and show that it is not subject to selfish mining. However, our protocol currently works only when the nodes in the network are known, but we discuss how this assumption could be weakened in future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    There are some ways to limit this attack, but we believe it will remain an important attack vector.

References

  1. Poet 1.0 specification. https://sawtooth.hyperledger.org/docs/core/releases/1.2.4/architecture/poet.html

  2. Abliz, M., Znati, T.: A guided tour puzzle for denial of service prevention. In: 2009 Annual Computer Security Applications Conference, pp. 279–288. IEEE (2009)

    Google Scholar 

  3. Alsunaidi, S.J., Alhaidari, F.A.: A survey of consensus algorithms for blockchain technology. In: 2019 International Conference on Computer and Information Sciences (ICCIS), pp. 1–6. IEEE (2019)

    Google Scholar 

  4. Back, A., et al.: Hashcash-a denial of service counter-measure (2002)

    Google Scholar 

  5. Bonnet, F., Bramas, Q., Défago, X.: Stateless distributed ledgers. arXiv preprint arXiv:2006.10985 (2020)

  6. Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20(4), 398–461 (2002)

    Article  Google Scholar 

  7. CBECI: Cambridge bitcoin electricity consumption index (2020). https://www.cbeci.org

  8. Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., Shi, W.: On security analysis of Proof-of-Elapsed-Time (PoET). In: Spirakis, P., Tsigas, P. (eds.) Stabilization, Safety, and Security of Distributed Systems, SSS 2017. LNCS, vol. 10616, pp. 282–297. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69084-1_19

  9. Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) Peer-to-Peer Systems, IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24

  10. Eyal, I., Sirer, E.G.: Majority Is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) Financial Cryptography and Data Security, FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28

  11. Gallersdörfer, U., Klaaßen, L., Stoll, C.: Energy consumption of cryptocurrencies beyond bitcoin. Joule (2020)

    Google Scholar 

  12. Gaži, P., Kiayias, A., Russell, A.: Stake-bleeding attacks on proof-of-stake blockchains. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 85–92. IEEE (2018)

    Google Scholar 

  13. IO, E.: Eos. IO technical white paper. EOS. IO (2017). https://github.com/EOSIO/Documentation. Accessed 18 December 2017

  14. King, S., Nadal, S.: Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19 (2012)

    Google Scholar 

  15. Kwon, J.: Tendermint: Consensus without mining. Draft v. 0.6, fall 1(11) (2014)

    Google Scholar 

  16. Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR (2004)

    Google Scholar 

  17. Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., Brooks, R.: A brief survey of cryptocurrency systems. In: 2016 14th annual conference on privacy, security and trust (PST), pp. 745–752. IEEE (2016)

    Google Scholar 

  18. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  19. Preneel, B.: Analysis and design of cryptographic hash functions. Ph.D. Thesis, Katholieke Universiteit te Leuven (1993)

    Google Scholar 

  20. Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30

    Chapter  Google Scholar 

  21. Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward non-parallelizable client puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) Cryptology and Network Security, pp. 247–264. Springer, Berlin Heidelberg, Berlin, Heidelberg (2007)

    Chapter  Google Scholar 

  22. Wang, W., Hoang, D.T., Hu, P., Xiong, Z., Niyato, D., Wang, P., Wen, Y., Kim, D.I.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328–22370 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jean-Philippe Abegg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abegg, JP., Bramas, Q., Noël, T. (2021). Blockchain Using Proof-of-Interaction. In: Echihabi, K., Meyer, R. (eds) Networked Systems. NETYS 2021. Lecture Notes in Computer Science(), vol 12754. Springer, Cham. https://doi.org/10.1007/978-3-030-91014-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91014-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91013-6

  • Online ISBN: 978-3-030-91014-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics