Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods

  • Giancarlo Bigi
  • Andrea BraccialiEmail author
  • Giovanni Meacci
  • Emilio Tuosto
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9465)


Decentralised smart contracts represent the next step in the development of protocols that support the interaction of independent players without the presence of a coercing authority. Based on protocols à la BitCoin for digital currencies, smart contracts are believed to be a potentially enabling technology for a wealth of future applications. The validation of such an early developing technology is as necessary as it is complex. In this paper we combine game theory and formal models to tackle the new challenges posed by the validation of such systems.


Markov Decision Process Security Protocol Discrete Time Markov Chain Statistical Model Check Fraudulent Behaviour 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Antonopoulos, A.: Mastering Bitcoin. O’Relly, San Francisco (2015)Google Scholar
  2. 2.
    Back, A.: Hashcash a denial of service counter-measure (2002).
  3. 3.
    Bartoletti, M., Cimoli, T., Zunino, R.: Compliance in behavioural contracts: a brief survey. In: Bodei, C., Ferrari, G.-L., Priami, C. (eds.) Programming Languages with Applications to Biology and Security - Colloquium in Honour of Pierpaolo Degano for his 65th Birthday. LNCS. Springer (2015) (to appear)Google Scholar
  4. 4.
    Bartoletti, M., Scalas, A., Tuosto, E., Zunino, R.: Honesty by typing. In: Beyer, D., Boreale, M. (eds.) FORTE 2013 and FMOODS 2013. LNCS, vol. 7892, pp. 305–320. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  5. 5.
    Basile, D., Degano, P., Ferrari, G.-L.: Automata for analysing service contracts. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 34–50. Springer, Heidelberg (2014). Google Scholar
  6. 6.
    Basile, D., Degano, P., Ferrari, G.L.: A formal framework for secure and complying services. J. Supercomput. 69(1), 43–52 (2014). CrossRefGoogle Scholar
  7. 7.
  8. 8.
    Bianco, A., de Alfaro, L.: Model checking of probabilistic and nondeterministic systems. In: Thiagarajan, P.S. (ed.) FSTTCS 1995. LNCS, vol. 1026, pp. 499–513. Springer, Heidelberg (1995) CrossRefGoogle Scholar
  9. 9.
  10. 10.
    BitcoinWiki: Script.
  11. 11.
    BitcoinWiki: Smart property.
  12. 12. Average transaction confirmation time.
  13. 13.
    Dai, W.: b-money (1998).
  14. 14.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Forejt, V., Kwiatkowska, M., Norman, G., Parker, D.: Automated verification techniques for probabilistic systems. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol. 6659, pp. 53–113. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  16. 16.
    Hansson, H., Jonsson, B.: A logic for reasoning about time and reliability. Formal Aspects Comput. 6(5), 512–535 (1994)CrossRefzbMATHGoogle Scholar
  17. 17.
    Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585–591. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  18. 18.
  19. 19.
    Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)CrossRefzbMATHGoogle Scholar
  20. 20.
    Malinowski, D., Mazurek, L., Andrychowicz, M., Dziembowski, S.: Secure multiparty computations on bitcoin. IACR Cryptology ePrint Archive, p. 784 (2013)Google Scholar
  21. 21.
    Muthoo, A.: Bargaining Theory with Applications. Cambridge University Press, Cambridge (1999)CrossRefzbMATHGoogle Scholar
  22. 22.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008).
  23. 23.
    Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)CrossRefzbMATHGoogle Scholar
  24. 24.
    Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)zbMATHGoogle Scholar
  25. 25.
    de Soto, H.P.: The property rights project.
  26. 26.
    Szabo, N.: Formalizing and securing relationships on public networks. First Monday (1997).
  27. 27.
    Szabo, N.: The idea of smart contracts (1997).
  28. 28.
    VV.AA: Special report bitcoin. Bloomberg Briefs (2015).
  29. 29.
    Zimbeck, D.: Two party double deposit trustless escrow in cryptographic networks and bitcoin (2014).

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Giancarlo Bigi
    • 1
  • Andrea Bracciali
    • 2
    Email author
  • Giovanni Meacci
    • 3
    • 4
  • Emilio Tuosto
    • 5
  1. 1.Università di PisaPisaItaly
  2. 2.Stirling UniversityStirlingUK
  3. 3.BitHaloLos AngelesUSA
  4. 4.Coin Cube LLCNew YorkUSA
  5. 5.Leicester UniversityLeicesterUK

Personalised recommendations