Skip to main content
Log in

Difficulty control for blockchain-based consensus systems

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Crypto-currencies like Bitcoin have recently attracted a lot of interest. A crucial ingredient into such systems is the “mining” of a Nakamoto blockchain. We model mining as a Poisson process with time-dependent intensity and use this model to derive predictions about block times for various hash-rate scenarios (exponentially rising hash rate being the most important). We also analyse Bitcoin’s method to update the “network difficulty” as a mechanism to keep block times stable. Since it yields systematically too fast blocks for exponential hash-rate growth, we propose a new method to update difficulty. Our proposed method performs much better at ensuring stable average block times over longer periods of time, which we verify both in simulations of artificial growth scenarios and with real-world data. Besides Bitcoin itself, this has practical benefits particularly for systems like Namecoin. It can be used to make name expiration times more predictable, preventing accidental loss of names.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Namecoin. https://www.namecoin.org/

  2. Antonopoulos AM (2014) Mastering Bitcoin: unlocking digital cryptocurrencies. O’Reilly Media

  3. Back A A partial hash collision based postage scheme. http://www.hashcash.org/papers/announce.txt

  4. Bahack L (2013) Theoretical Bitcoin attacks with less than half of the computational power. arXiv: 1312.7013

  5. Chaum D (1983) Blind signatures for untraceable payments. In: Advances in cryptology proceedings, vol 82, pp 199–203

  6. Cox D R (1955) Some statistical methods connected with series of events. J Royal Stat Soc Ser B 17(2):129–157

    MATH  Google Scholar 

  7. Decker C, Wattenhofer R (2013) Information Propagation in the Bitcoin Network. In: Proceedings of the 13-th IEEE international conference on peer-to-peer computing

  8. NIST digital library of mathematical functions. http://dlmf.nist.gov/, Release 1.0.9 of 2014-08-29. Online companion to [15]

  9. Eaton JW, Bateman D, Hauberg S (2009) GNU Octave version 3.0.1 manual: a high-level interactive language for numerical computations. CreateSpace independent publishing platform. https://www.gnu.org/software/octave/doc/interpreter. ISBN 1441413006

  10. Evans LC, Gariepy R F (1992) Measure theory and fine properties of functions. Studies in advanced mathematics. CRC Press

  11. Eyal I, Sirer E G (2014) Majority is not enough: Bitcoin mining is vulnerable. In: 18th international conference on financial cryptography and data security. Barbados

  12. Marsaglia G, Tsang WW (2000) The Ziggurat method for generating random variables. J Stat Softw 5

  13. Moore GE (1965) Cramming more components onto integrated circuits. Electron Mag

  14. Nakamoto S Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

  15. Olver FWJ, Lozier D W, Boisvert RF, Clark CW (eds) (2010) NIST handbook of mathematical functions. Cambridge University Press, New York. Print companion to [8]

    MATH  Google Scholar 

  16. Rosenfeld M (2014) Analysis of hashrate-based double spending. arXiv: http://arxiv.org/abs/1402.2009

  17. Ross S M (2013) Simulation, 5th edn. Academic Press

  18. Shomer A (2014) On the phase space of block-hiding strategies. Cryptology ePrint Archive, Report 2014/139. http://eprint.iacr.org/

  19. Swartz A (2011) Squaring the triangle: secure, decentralized, human-readable names

  20. Wilcox-O’Hearn Z Names: decentralized, secure, human-meaningful: choose two

Download references

Acknowledgments

The author would like to thank the Bitcoin and Namecoin communities for valuable input as well as pointing out that more stable name expiration times are an interesting research question in the first place. This work is supported by the Austrian Science Fund (FWF) and the International Research Training Group IGDK 1754.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Kraft.

Appendices

Appendix A: Notation used in the models

Table 3

Appendix B:: Compliance with ethical standards

Funding::

This work was funded by the Austrian Science Fund (FWF). No funding was received in relation to this work apart from the author’s employment at the University of Graz.

Conflict of Interest::

The author currently serves voluntarily as the main developer of the Namecoin project. No salary is received as part of that involvement.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kraft, D. Difficulty control for blockchain-based consensus systems. Peer-to-Peer Netw. Appl. 9, 397–413 (2016). https://doi.org/10.1007/s12083-015-0347-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0347-x

Keywords

Navigation