Advertisement

Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods

  • Giancarlo Bigi
  • Andrea Bracciali
  • Giovanni Meacci
  • Emilio Tuosto
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9465)

Abstract

Decentralised smart contracts represent the next step in the development of protocols that support the interaction of independent players without the presence of a coercing authority. Based on protocols à la BitCoin for digital currencies, smart contracts are believed to be a potentially enabling technology for a wealth of future applications. The validation of such an early developing technology is as necessary as it is complex. In this paper we combine game theory and formal models to tackle the new challenges posed by the validation of such systems.

Keywords

Markov Decision Process Security Protocol Discrete Time Markov Chain Statistical Model Check Fraudulent Behaviour 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Antonopoulos, A.: Mastering Bitcoin. O’Relly, San Francisco (2015)Google Scholar
  2. 2.
    Back, A.: Hashcash a denial of service counter-measure (2002). http://www.hashcash.org/papers/hashcash.pdf
  3. 3.
    Bartoletti, M., Cimoli, T., Zunino, R.: Compliance in behavioural contracts: a brief survey. In: Bodei, C., Ferrari, G.-L., Priami, C. (eds.) Programming Languages with Applications to Biology and Security - Colloquium in Honour of Pierpaolo Degano for his 65th Birthday. LNCS. Springer (2015) (to appear)Google Scholar
  4. 4.
    Bartoletti, M., Scalas, A., Tuosto, E., Zunino, R.: Honesty by typing. In: Beyer, D., Boreale, M. (eds.) FORTE 2013 and FMOODS 2013. LNCS, vol. 7892, pp. 305–320. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  5. 5.
    Basile, D., Degano, P., Ferrari, G.-L.: Automata for analysing service contracts. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 34–50. Springer, Heidelberg (2014). http://dx.doi.org/10.1007/978-3-662-45917-1_3 Google Scholar
  6. 6.
    Basile, D., Degano, P., Ferrari, G.L.: A formal framework for secure and complying services. J. Supercomput. 69(1), 43–52 (2014). http://dx.doi.org/10.1007/s11227-014-1211-0 CrossRefGoogle Scholar
  7. 7.
  8. 8.
    Bianco, A., de Alfaro, L.: Model checking of probabilistic and nondeterministic systems. In: Thiagarajan, P.S. (ed.) FSTTCS 1995. LNCS, vol. 1026, pp. 499–513. Springer, Heidelberg (1995) CrossRefGoogle Scholar
  9. 9.
  10. 10.
    BitcoinWiki: Script. https://en.bitcoin.it/wiki/script
  11. 11.
    BitcoinWiki: Smart property. https://en.bitcoin.it/wiki/Smart_Property
  12. 12.
    Blockchain.info: Average transaction confirmation time. https://blockchain.info/charts/avg-confirmation-time
  13. 13.
    Dai, W.: b-money (1998). http://www.weidai.com/bmoney.txt
  14. 14.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Forejt, V., Kwiatkowska, M., Norman, G., Parker, D.: Automated verification techniques for probabilistic systems. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol. 6659, pp. 53–113. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  16. 16.
    Hansson, H., Jonsson, B.: A logic for reasoning about time and reliability. Formal Aspects Comput. 6(5), 512–535 (1994)CrossRefzbMATHGoogle Scholar
  17. 17.
    Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585–591. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  18. 18.
  19. 19.
    Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)CrossRefzbMATHGoogle Scholar
  20. 20.
    Malinowski, D., Mazurek, L., Andrychowicz, M., Dziembowski, S.: Secure multiparty computations on bitcoin. IACR Cryptology ePrint Archive, p. 784 (2013)Google Scholar
  21. 21.
    Muthoo, A.: Bargaining Theory with Applications. Cambridge University Press, Cambridge (1999)CrossRefzbMATHGoogle Scholar
  22. 22.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
  23. 23.
    Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)CrossRefzbMATHGoogle Scholar
  24. 24.
    Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)zbMATHGoogle Scholar
  25. 25.
    de Soto, H.P.: The property rights project. http://www.ild.org.pe
  26. 26.
    Szabo, N.: Formalizing and securing relationships on public networks. First Monday (1997). http://firstmonday.org/ojs/index.php/fm/article/view/548/469
  27. 27.
    Szabo, N.: The idea of smart contracts (1997). http://szabo.best.vwh.net/smart_contracts_idea.html
  28. 28.
    VV.AA: Special report bitcoin. Bloomberg Briefs (2015). http://www.bloombergbriefs.com/
  29. 29.
    Zimbeck, D.: Two party double deposit trustless escrow in cryptographic networks and bitcoin (2014). https://bithalo.org/

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Giancarlo Bigi
    • 1
  • Andrea Bracciali
    • 2
  • Giovanni Meacci
    • 3
    • 4
  • Emilio Tuosto
    • 5
  1. 1.Università di PisaPisaItaly
  2. 2.Stirling UniversityStirlingUK
  3. 3.BitHaloLos AngelesUSA
  4. 4.Coin Cube LLCNew YorkUSA
  5. 5.Leicester UniversityLeicesterUK

Personalised recommendations