Skip to main content

Short Paper: Revisiting Difficulty Control for Blockchain Systems

  • Conference paper
  • First Online:
Data Privacy Management, Cryptocurrencies and Blockchain Technology (DPM 2017, CBT 2017)

Abstract

The Bitcoin whitepaper [1] states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism.

In this paper we introduce and analyze a new kind of attack on the mining difficulty retargeting function used in Bitcoin which we call “coin-hopping”. In a coin-hopping attack, a malicious miner increases his mining profits while at the same time increasing the average delay between blocks.

We propose an alternative difficulty adjustment algorithm in order to reduce the incentive to perform a coin-hopping attack, and also decrease inter-block delays. Finally, we evaluate our proposed approach and show how its novel algorithm performs better than the original algorithm of Bitcoin.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  2. Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 475–490. IEEE (2014)

    Google Scholar 

  3. Biryukov, A., Khovratovich, D.: Equihash: asymmetric proof-of-work based on the generalized birthday problem. Ledger 2 (2017)

    Google Scholar 

  4. Kraft, D.: Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, pp. 1–17 (2015)

    Google Scholar 

  5. Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems, arXiv preprint arXiv:1112.4980. https://arxiv.org/pdf/1112.4980.pdf

  6. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46803-6_10

    Chapter  Google Scholar 

  7. Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol with chains of variable difficulty. IACR Cryptology ePrint Archive. https://eprint.iacr.org/2016/1048

  8. The timejacking attack (2011). http://culubas.blogspot.com

  9. ArtForz, The time wrapping attack (2011). https://bitcointalk.org/index.php?topic=43692.msg521772#msg521772

  10. Bahack, L.: Theoretical bitcoin attacks with less than half of the computational power, arXiv preprint arXiv: 1312.7013

  11. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). doi:10.1007/978-3-662-45472-5_28

    Chapter  Google Scholar 

  12. Lawson, C.L., Hanson, R.J.: Solving Least Squares Problems. SIAM, Philadelphia (1974)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Chepurnoy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Meshkov, D., Chepurnoy, A., Jansen, M. (2017). Short Paper: Revisiting Difficulty Control for Blockchain Systems. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds) Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM CBT 2017 2017. Lecture Notes in Computer Science(), vol 10436. Springer, Cham. https://doi.org/10.1007/978-3-319-67816-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67816-0_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67815-3

  • Online ISBN: 978-3-319-67816-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics