This Week in Blockchain Research Issue #16
|zk Capital||Jul 10, 2019|
Paper of the Week:
The first comprehensive systematization of incentive attacks (bribing attacks and similar techniques) within permissionless proof-of-work cryptocurrencies.
The purpose is to highlight unconsidered attack types and present new and improved techniques that address several of these open questions, in an effort to fill some gaps.
First, a comparison and categorization of the varying system models of previously proposed attacks is presented along with interesting observations.
Next, three new pay-to-win incentive attacks are introduced that are trustless, both for the attacker and the collaborating miners, and do not require the adversary to control any hash rate.
Each attack is then thoroughly explained by presenting (i) a general overview of the attack, (ii) a step-by-step description, (iv) attack evaluations, and (v) analysis of the attack properties.
With this research, it is demonstrated that the hash rate distribution among permissionless PoW based cryptocurrencies does not play a central role in defining the underlying security guarantees.
In face, the ratio of rational miners and available funds for performing bribes also form a key component that demands further study.
1. Paper Title: A Composable Security Treatment of the Lightning Network.
Summary: The first complete security analysis of the lightning network in the universal composition (UC) setting.
Summary: This work puts forward elements that constitute essential steps towards the development of an exhaustive formalization of the MimbleWimble cryptocurrency protocol, the analysis of its properties and the verification of its implementations.
1. Paper Title: Metamorphic IOTA.
1. Paper Title: Cryptocurrency Egalitarianism: A Quantitative Approach.
Summary: The first work to provide a quantitative evaluation of cryptocurrency egalitarianism and a treatment of this property that acts as the foundation for comparing cryptocurrency fairness when it comes to reward distribution.
2. Paper Title: Fair Byzantine Agreements for Blockchains.
Summary: This work presents a novel notion called for Byzantine agreement and then propose a fair, responsive and partition-resilient Byzantine agreement protocol tolerating up to 1/3 corruptions.
Affiliations: * Taipei, Taiwan.
3. Paper Title: STAKEDAG: Stake-Based Consensus for Scalable Trustless Systems.
Summary: This paper proposes a new family of consensus protocols that uses Proof of Stake to achieve more scalable and robust consensus in a DAG.
Authors: Quan Nguyen*, Andre Cronje*, Michael Kong*, Alex Kampa*, and George Samman*,
Affiliations: * FANTOM.
Summary: This paper examines the use of Bitcoin in money remittance markets as a specific illustration of wider emerging issues relating to the use of cryptocurrencies.
Authors: Jared Cotton*,
Affiliations: * Victoria University of Wellington.
Summary: The objective of this study is to investigate the potential advantages and challenges of blockchain technology and ICOs, and how they are going to affect the entrepreneurial environment.
“Significant research in the blockchain space is constantly being achieved by academic researchers. Unfortunately, a lot of this research is overlooked due to the massive numbers of papers being generated and the way they are being promoted and published. We’ve put together a categorized list of academic papers that can guide our subscribers and keep them up to date.”
Thanks for reading! If we missed anything, shoot us an email so that we can feature it in our next newsletter!
This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.