Abstract
We propose the formal study of blockchains that are owned and controlled by organizations and that neither create cryptocurrencies nor provide incentives to solvers of cryptographic puzzles. We view such approaches as frameworks in which system parts, such as the cryptographic puzzle, may be instantiated with different technology. Owners of such a blockchain procure puzzle solvers as resources they control, and use a mathematical model to compute optimal parameters for the cryptographic puzzle mechanism or other parts of the blockchain. We illustrate this approach with a use case in which blockchains record hashes of financial process transactions to increase their trustworthiness and that of their audits. For Proof of Work as cryptographic puzzle, we develop a detailed mathematical model to derive MINLP optimization problems for computing optimal Proof of Work configuration parameters that trade off potentially conflicting aspects such as availability, resiliency, security, and cost in this governed setting. We demonstrate the utility of such a mining calculus by applying it on some instances of this problem. We hope that our work may facilitate the creation of domain-specific blockchains for a wide range of applications such as trustworthy information in Internet of Things systems and bespoke improvements of legacy financial services.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ali, R., Barrdear, J., Clews, R., Southgate, J.: Innovations in payment technologies and the emergence of digital currencies. Q. Bull. (2014). Published by the Bank of England
Ben-Tal, A., Ghaoui, L.E., Nemirovski, A.: Robust Optimization. Princeton University Press, Princeton (2009)
Bird, R.: Thinking Functionally with Haskell. Cambridge University Press, Cambridge (2015)
Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proceedings of OSDI 1999, pp. 173–186 (1999)
Danezis, G., Meiklejohn, S.: Centrally banked cryptocurrencies. CoRR abs/1505.06895 (2015)
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the ACM CCS 2016, pp. 3–16 (2016)
Horne, D.: Hash chain. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd edn, pp. 542–543. Springer, Heidelberg (2011). doi:10.1007/978-1-4419-5906-5_780
Jünger, M., Liebling, T.M., Naddef, D., Nemhauser, G.L., Pulleyblank, W.R., Reinelt, G., Rinaldi, G., Wolsey, L.A. (eds.): 50 Years of Integer Programming 1958–2008 - From the Early Years to the State-of-the-Art. Springer, Heidelberg (2010)
Kokoris-Kogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: Proceedings of the USENIX Security 2016, pp. 279–296 (2016)
Lamport, L.: Paxos made simple. ACM SIGACT News 32(4), 18–25 (2001)
Lundbaek, L., D’Iddio, A.C., Huth, M.: Optimizing governed blockchains for financial process authentications. CoRR abs/1612.00407 (2016)
Misener, R., Floudas, C.A.: ANTIGONE: algorithms for continuous integer global optimization of nonlinear equations. J. Glob. Optim. 59(2–3), 503–526 (2014)
Nakamoto, S.: Bitcoin : A Peer-to-Peer Electronic Cash System. Published under Pseudonym, May 2008
Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)
Tawarmalani, M., Sahinidis, N.V.: A polyhedral branch-and-cut approach to global optimization. Math. Program. 103, 225–249 (2005)
Vigerske, S.: MINLP Library 2. http://www.gamsworld.org/minlp/minlplib2/html/
Vigerske, S.: Decomposition in multistage stochastic programming and a constraint integer programming approach to mixed-integer nonlinear programming. Ph.D. in Mathematics, Humboldt-University Berlin (2012)
Vukolić, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT Replication. In: Camenisch, J., Kesdoğan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112–125. Springer, Cham (2016). doi:10.1007/978-3-319-39028-4_9
Wattenhofer, R.: The Science of the Blockchain. Inverted Forest Publishing (2016)
Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of the SPW 2015, pp. 180–184 (2015)
Acknowledgements
This work was supported by the UK EPSRC with a Doctoral Training Fees Award for the first and second author and with projects [grant numbers EP/N020030/1 and EP/N023242/1]. We expressly thank Ruth Misener for having run some of our models on state-of-the-art global MINLP solvers – the tools ANTIGONE [12], BARON [15], and SCIP [17].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Lundbæk, LN., Callia D’Iddio, A., Huth, M. (2017). Centrally Governed Blockchains: Optimizing Security, Cost, and Availability. In: Aceto, L., Bacci, G., Bacci, G., Ingólfsdóttir, A., Legay, A., Mardare, R. (eds) Models, Algorithms, Logics and Tools. Lecture Notes in Computer Science(), vol 10460. Springer, Cham. https://doi.org/10.1007/978-3-319-63121-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-63121-9_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63120-2
Online ISBN: 978-3-319-63121-9
eBook Packages: Computer ScienceComputer Science (R0)