Skip to main content

ADESS: A Proof-of-Work Protocol to Deter Double-Spend Attacks

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2024)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 920))

Included in the following conference series:

Abstract

A principal vulnerability of a proof-of-work (“PoW”) blockchain is that an attacker can re-write the history of transactions by forking a previously published block and building a new chain segment containing a different sequence of transactions. If the attacker’s chain has the most cumulative mining puzzle difficulty, nodes will recognize it as canonical. We propose a modification to PoW protocols, called ADESS, that contains two novel features. The first modification enables a node to identify the attacker chain by comparing the temporal sequence of blocks on competing chains. The second modification penalizes the attacker by requiring it to apply exponentially increasing hashrate in order to make its chain canonical. We demonstrate two things; (i) the expected cost of carrying out a double-spend attack is weakly higher under ADESS compared to the current PoW protocols and (ii) for any value of transaction, there is a penalty setting in ADESS that renders the expected profit of a double-spend attack negative.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For Ethereum Classic see Andrew Singer [11] and James Lovejoy [6]. For data on double-spend attacks on PoW cryptocurrencies prior to 2020, see the MIT Digital Currency Initiative 51% reorg tracker [7]

  2. 2.

    Alice’s transfer to Bob remains in the pool of transactions that could be appended by a miner to a block in chain \(\mathcal {A}\). However, since her original wallet is empty, the transaction would be invalid, as there are no tokens in her wallet to send to Bob.

  3. 3.

    The ranking of chains in terms of mining puzzle difficulty does not necessarily match the ranking in terms of hashrate. The reason is that the rate of solving puzzles is stochastic. A lucky string of quickly solved puzzles on one chain will generate more blocks - and more cumulative puzzle difficulty - on that chain compared to another chain with more hashrate but less good luck in solving puzzles.

  4. 4.

    Nakamoto [9] Sect. 11, pp. 6–7.

  5. 5.

    Nakamoto [9] Sect. 6, p. 4 states “[A miner] ought to find it more profitable to play by the rules, such rules favor him with more new coins than everyone else combined, than to undermine the system and the validity of his own wealth.”

  6. 6.

    Budish [1]) also pointed out that a short seller of Bitcoin could profit from a disruption that caused the exchange value to decline.

  7. 7.

    Another dimension from which the double-spend attack can be analyzed is the expected profit from an attack using less than the honest miner hashrate. For example, an attack in which 30% of the hashrate applied to chain \(\mathcal{I}\mathcal{C}\) was applied to chain \(\mathcal {A}\) would, in expectation, recoup 30% of its hashrate cost from block rewards and earn a third of the value of the transaction. In our example, the minimum value of the transaction required to make the attack profitable would be \( v > 3\big (c\xi + (2/3)N\big )\). See Gervais et al. [3] for a detailed simulations in a Markov Decision process framework. Gervais et al. also evaluate the relationship of the stale block rate and the block reward to the expected profit of a double-spend attack. We do not evaluate those dimensions.

  8. 8.

    In the Moroz et al. [8] model, it is assumed that the victim and the attacker build the chains. The other miners step aside until the bifurcation is resolved.

  9. 9.

    The Moroz et al. (2020) model assumes the puzzle difficulty remains constant, which implies \(\gamma = 0\).

  10. 10.

    https://etherscan.io/uncles

  11. 11.

    Another reason for increasing confirmation depth may be to protect against the possibility of a double-spend attack. However, as we demonstrated in Sect. 2.2, Nakamoto does not intrinsically deter double-spend attacks at any confirmation depth. Any security provided by increasing confirmation depth under Nakamto arises from the contingent circumstances in which the transaction takes place.

  12. 12.

    Equation 5 is part of Theorem 1 of Gou and Ren (2022). The precondition in Theorem 1 requires that \(\lambda \varDelta < ln(\rho )ln(1/2)\).

  13. 13.

    Alternatively, \(\alpha \) can be viewed as the lower bound of node confirmation blocks.

  14. 14.

    Guo and Ren [4] prove that any successful double-spend attack strategy can be carried out privately. It follows that an attack strategy that is optimal when the attacker chain is built in secret, is globally optimal.

  15. 15.

    The ADESS criteria for comparing chains after chain \(\mathcal {A}\) has reached the canonical boundary is explored in Appendix.

  16. 16.

    It is worth pointing out that ADESS conforms to the Axioms of Leshno and Strack [5] since it does not alter the underlying Nakamoto entry and reward structure for miners.

  17. 17.

    The target blockchain growth rate T can be represented as a Bernoulli Process \(\mathbb {E}[T] = D/h\), where D denotes mining puzzle difficulty; the probability of guessing the puzzle solution is 1/D and hashrate is h. In our example \(T =1\) and initial \(h = 1\). The Bernoulli Process yields \(D =1\) at the first block. Full adjustment implies that an increase of hashrate to \(1+ \gamma \) causes difficulty to increase to \(D = 1 + \gamma \) and so forth.

  18. 18.

    Schelling [10].

  19. 19.

    The model derives an upper bound to double-spend vulnerability, since an attack, once launched, may be discontinued before it reaches completion.

  20. 20.

    The normalization reflects that the attacker’s profit from mining is equal to the market return on investment. This may, or may not, imply a restriction on mining market structure. For example, if a mining oligopoly resulted from active miners having a lower cost of hashrate compared to other miners, the attacker would not earn an extra-normal return from its mining. On the other hand, a low cost miner does not need to create a fork (i.e. launch an attack) in order to earn an extra-normal profit. It can earn the profit so by mining chain \(\mathcal{I}\mathcal{C}\).

  21. 21.

    Confirmation depth \(\alpha \) is an equilibrium outcome of a game between the counterparties that we do not model.

  22. 22.

    The problem can be stated as \(\arg \min \limits _{\tau }\gamma = N(1 + \xi ) + \tau + 1\).

  23. 23.

    The exponent of the discount rate is divided by the growth rate to adjust for the intervals of time between blocks on chain \(\mathcal {A}\) prior to reaching the canonical boundary, which is less than 1. The bracketed expression \(\lceil N(1+\xi )-1\rceil \) indicates that the number of blocks on chain \(\mathcal{I}\mathcal{C}\) is rounded up from the value inside the brackets.

  24. 24.

    In an abuse of notation, \(\lambda \) in the attacker’s ex-ante decision problem denotes the mean of the distribution of the random variable \(\sigma \).

  25. 25.

    This is not a complete characterization of the attacker’s decision problem since it does not pin down the block that the attacker will fork. The conclusions are conditional on \(\lambda \). However, this imprecision turns out not to matter for the results we are interested in.

  26. 26.

    If \(d\xi \) does not cause the number blocks on chain \(\mathcal {A}\) required to reach the canonical boundary to increase, the leftmost and rightmost terms of Eq. 11 drop out and \(M(\xi )\) remains negative.

  27. 27.

    The proof is as follows. By strict concavity, for \(\xi ' > \xi " \; \frac{\pi (\xi ') - \pi (0)}{\xi '} \le \frac{\pi (\xi ") - \pi (o)}{\xi "}\implies \pi (\xi ') \le (\xi '(\pi (\xi ") - \pi (0)) + \pi (0)\). Since \(\pi (\cdot )\) is decreasing in \(\xi \), profit is negative for any \(\xi > \xi '\).

  28. 28.

    In the context of footnote 15, partial adjustment implies that an increase of hashrate to \(1+ \gamma \) causes difficulty to increase to \(D = 1 + \beta \gamma \), and so forth.

  29. 29.

    Note that this result holds when latency slows the growth rate of chain \(\mathcal{I}\mathcal{C}\) due to conflicts arising from uncle chains.

  30. 30.

    Unique paths, running from the root node to end nodes, are a feature of directed tree graphs.

  31. 31.

    From Sect. 4.3, \(\lambda \) is the number of blocks in chain IC (in the generalized context the baseline chain \(B_{m'}\)) between the fork-block and the block onto which the transaction is appended. \(\lambda > 0\) at fork n would be denoted \(\alpha + \lambda (f_{n}):f_{n}\), which would not affect Proposition 1.

  32. 32.

    A baseline chain at one fork-block can be a penalized chain at another fork-block.

References

  1. Budish, E.: The Economic Limits of Bitcoin and the Blockchain. National Bureau of Economic Research Working Paper 24717, June 2018 (2018). https://www.nber.org/papers/w24717

  2. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28

    Chapter  Google Scholar 

  3. Gervais, A., Glykantzis, V., Karame, G.O., Ritzdorf, H., Wurst, K., Capkun, S.: On the security and performance of proof of work blockchains. In: CCS 2016: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, United States, pp. 3–16. Association for Computing Machinery (2016)

    Google Scholar 

  4. Guo, D., Ren, L.: Bitcoin’s Latency - Security Analysis Made Simple arxiv2203.06357v3 (2022). https://arxiv.org/abs/2203.06357

  5. Leshno, J., Strack, P.: Bitcoin: an axiomatic approach and an impossibility theorem. Am. Econ. Rev. Insights 2(3), 269–286 (2020). American Economic Association

    Google Scholar 

  6. Lovejoy, J.: Reorgs on Bitcoin Gold: Counterattacks in the wild (2020). Medium https://medium.com/mit-media-lab-digital-currency-initiative/reorgs-on-bitcoin-gold-counterattacks-in-the-wild-da7e2b797c21

  7. MIT Media Lab Digital Currency Initiative reorg tracker (2020). 51% attacks - reorg tracker. https://dci.mit.edu/51-attacks

  8. Moroz, D., Aronoff, D., Narula, N., Parkes, D.: Double Spend Counterattacks (2020). http://arxiv.org/abs/2002.10736[cs.CR] https://doi.org/10.48550/arXiv.2002.10736

  9. Nakamoto, S.: Bitcoin; A Peer - to - Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf.Original Bitcoin code https://satoshi.nakamotoinstitute.org/code/ (2008) Original Bitcoin code https://satoshi.nakamotoinstitute.org/code/

  10. Schelling, T.C.: The Strategy of Conflict. Harvard University Press, Cambridge (1960)

    Google Scholar 

  11. Singer, A.: Fight fire with fire: MIT scholar suggests ETC counters 51% attacks. Cointelegraph Set. 15 (2020). https://cointelegraph.com/news/fight-fire-with-fire-mit-scholar-suggests-etc-counters-51-attacks

  12. Wood, G.: Ethereum: A secure Decentralised Generalised Transaction Ledger - Berlin Version d77a387, 26 April 2022 (2021). https://ethereum.github.io/yellowpaper/paper.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Aronoff .

Editor information

Editors and Affiliations

Appendix

Appendix

Generalizing \(\boldsymbol{ADESS}\) to Multiple Chains and Multiple Forks

ADESS can be extended to a general blockchain network in which there are multiple forks, each with two or more descendant chains where penalty assignments are made at each fork. To accommodate this, we generalize the ADESS protocol so that a penalized chain cannot become canonical until it has overcome all penalties assigned to it. Proposition 1 and its Corollary prove that there is always exactly one canonical chain.

Tree Graph Representation of a Blockchain Network. A blockchain network can be represented as a directed tree graph. A chain is a unique directed path running from a fork-block to a chain head.Footnote 30 At any time t there are N fork-blocks in the blockchain network, each one denoted \(f_{n},\; n \in \{1,...,n,...,N\}\) and M heads, each one denoted \(B_{m},\; m \in \{1,...,m,...,M\}\). We also denote \(B_{m}\) as the chain connecting a fork-block to a chain head. Figure 6 displays the blockchain network as a directed tree graph at t periods after the Genesis block was broadcast.

Penalty Nomenclature. We simplify the presentation by assuming that an attacker forks the parent of the block to which the transaction is appended, so that \(\lambda = 0\).Footnote 31 The baseline chain for fork-block \(f_{n}\) is the first chain to broadcast \(\alpha \) post-fork blocks, which is denoted \(\alpha :f_{n}\). For example in Fig. 6, \(\alpha :f_{2}\) indicates that chain \(B_{4}\) is the baseline chain relative to \(f_{2}\), since it was the first chain to broadcast a chain segment with \(\alpha \) blocks, starting at \(f_{2}\). A more complicated example involves chain \(B_{1}\). \(\alpha :f_{1}\) indicates that \(B_{1}\) was the first chain to broadcast a chain segment with \(\alpha \) blocks, starting at \(f_{1}\) and \(\alpha :f_{3}\) indicates that chain \(B_{2}\) was the first chain to broadcast a chain segment with \(\alpha \) blocks, starting at \(f_{3}\). In this case \(B_{1}\) is the baseline chain for fork \(f_{1}\) and is not the baseline chain for fork \(f_{3}\). At each fork \(f_{n}\) a penalty may (or may not) be assigned to one or more chains \(B_{m}\). When a assignment is made, the penalized chain is compared to the baseline chain \(B_{m'}\).Footnote 32

The penalty is “active” at fork-block \(f_{n}\) so long as the penalized chain has not overcome the penalty. The tuple \(<B_{m}:\widehat{f}_{n}:B_{m'}:t>\) denotes that \(B_{m}\) is actively penalized relative to \(B_{m'}\) at \(f_{n}\) at time t. The penalty is “inactive” after it has been overcome by the penalized chain. An inactive penalty is denoted \(<B_{m}:f_{n}:B_{m'},t>\). In the latter case, \(B_{m}\) has become the baseline chain relative to fork \(f_{n}\). In general, \(\widehat{f}_{n}\) indicates a currently active penalty and \(f_{n}\) indicates a past penalty that has been overcome. The set of active and inactive penalties assigned to \(B_{m}\) at time t is denoted by a list such as \(\{<B_{m}:\widehat{f}_{n}:B_{m'}:t>, <B_{m}:f_{n+i}:B_{m'+j}:t>, ...\}\).

Fig. 6.
figure 6

A blockchain network

Generalized Penalty Assignment Rule and Penalty Function. We restate the penalty assignment rule and penalty function for the general case.

Generalized Penalty Assignment Rule

  1. (i)

    Apply the ADESS Penalty Assignment Rule to each fork-block \(f_{n}\) (i.e. a chain that is not first to broadcast \(\alpha \) post-fork blocks is assigned a penalty relative to the chain that is first to broadcast \(\alpha \) post-fork blocks) with the exception that

  2. (ii)

    If the chain that is first to broadcast \(\alpha \) blocks after a fork-block \(f_{n}\) is subject to an active penalty at the time of the broadcast, then no penalty assignment is made at fork-block \(f_{n}\).   \(\square \)

Generalized Penalty Function

  1. (i)

    Apply the ADESS Penalty Function to each penalized chain at fork-block \(f_{n}\).

  2. (ii)

    At the time a chain \(B_{m}\) has overcome every penalty assigned to it, it has no active penalties and the protocol for \(B_{m}\) reverts to the Nakamoto criteria of comparing cumulative mining puzzle difficulty with other chains that do not face active penalties. When it has overcome its last penalty, the score of \(B_{m}\) is re-set to equal the cumulative mining puzzle difficulty of the baseline chain for the last penalty, plus a small additional amount \(\epsilon \). For example, if \(<B_{m}:f_{n}:B_{m'}:t>\) is the last penalty to become inactive, \(B_{m}\) is assigned an adjusted cumulative mining puzzle difficulty = (\(B_{m'}\) cumulative puzzle difficulty at t) + \(\epsilon \). If \(B_{m}\) has more than one active penalties and all are overcome at the same time, the baseline chain with the highest score is used for the re-set.   \(\square \)

The Canonical Chain. At any time the set of chains can be partitioned into two groups. One group are chains that have been assigned at least one penalty that has not been overcome. These chains are not eligible to be canonical. Among chains in the other group, those ranked by (possibly adjusted) cumulative mining puzzle difficulty, one will be canonical - provided there is at least one chain in this group. Proposition 2 establishes that there is at least one chain that is eligible to be canonical.

Proposition 2

Under the generalized ADESS Protocol, there is at least one chain to which no penalty has ever been applied at any time.

Proof

We prove the proposition by construction. Start at the Genesis block and proceed to the first fork-block \(f_{1}\). There will be at least one post-fork chain that is not penalized. Choose one of the non-penalized chains and proceed to the next fork-block. There will be at least one post-fork chain that is not penalized. Choose one of the non-penalized chains and proceed to the next fork-block, and so forth until a head \(B_{m}\) is reached. The chain \(B_{m}\) is not penalized at any fork.   \(\square \)

The example in the proof is displayed in Fig. 6 when comparing chains \(B_{1}\) and \(B_{2}\). If \(B_{1}\) is the un-penalized chain at \(f_{1}\), then either \(B_{1}\) or \(B_{2}\) must be un-penalized.

Corollary 2

There is exactly one canonical chain under generalized ADESS.

Proof

Proposition 2 states that there is at least one chain to which no penalty has ever been applied at any time. Such a chain is eligible to be canonical. Suppose there is more than one chain without active penalties at a point in time. These chains are compared on the basis of cumulative mining puzzle difficulty. Under Nakamoto the chain with the most work is canonical.   \(\square \)

Finally, ADESS applies to a circumstance where there is only one fork-block with actively mined descendant chains and none of those chains have forks. ADESS is the application of generalized ADESS in the case where there is one fork-block, two fork chains and neither chain has an active penalty from a prior fork. In that case, chain \(\mathcal {A}\) is penalized relative to chain \(\mathcal{I}\mathcal{C}\).

Relaxing the Restriction on Growth Rate of Chain \(\boldsymbol{\mathcal {A}}\)

The model limits the attacker to choosing a constant growth rate \(\gamma \) for chain \(\mathcal {A}\). We now relax that restriction and allow the attacker to choose the growth rate of each block n on chain \(\mathcal {A}\) as the function \(\gamma (n,\xi )\). Equation 11 becomes

figure a

We do not evaluate all possible functional forms of \(\gamma (n,\xi )\). We show that Theorem 1 and Corollary 1 continue to hold if the growth rate is a affine function of \(\xi \). Let \(\gamma (n,\xi ) = \rho + \xi f(n)\) for some scalar \(\rho > 0\) and function \(f(n) > 0\). The derivative for the discounted cost of an attack at nth block on chain \(\mathcal {A}\) is

$$\begin{aligned} & d/d\xi (\delta ^{n/(1+\gamma (\xi ,n))}(1+ \gamma (\xi ,n))^{n}) =\\ & \qquad \qquad \qquad \qquad \,\,\,\, nf(n)(\xi f(n)+\rho )^{n-1}\delta ^{n/(\xi f(n) + \rho +1)} \\ & \qquad \qquad \,\,\,\, - nf(n)log(\delta )[(\xi f(n) + \rho )^{n} + 1]\delta ^{n/(\xi f(n) + \rho + 1)}[\xi f(n) + \rho +1]^{-2} \end{aligned}$$

The expression is positive, noting that \(log(\delta ) < 0\), since \(\delta \in (0,1)\). Therefore Equation 10’ is negative. Noting that n, \(\delta \) and \(\xi \) are strictly positive, the expression is bounded away from zero, which implies that there is no upper bound to the expression. It follows that there is a value \(\underline{\xi }\) for which \(\pi (\underline{\xi }) < 0\), which proves Theorem 1 and Corollary 1.

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aronoff, D., Ardis, I. (2024). ADESS: A Proof-of-Work Protocol to Deter Double-Spend Attacks. In: Arai, K. (eds) Advances in Information and Communication. FICC 2024. Lecture Notes in Networks and Systems, vol 920. Springer, Cham. https://doi.org/10.1007/978-3-031-53963-3_11

Download citation

Publish with us

Policies and ethics