SlideShare a Scribd company logo
1 of 19
Lecture 3: Proof of Work and Nakamoto
Consensus
Longest Chain Rule
Decentralized Identity, Ownership, Transfer
Variable difficulty mining
Private attack; security analysis
Blockchain with Merkle Trees
Block: Header + Data
Header: Pointer to previous
block
= hash of the previous block
header and Merkle root of data
of previous block
Data: information specific to
block
Application: Centralized
tamper evident information log
with efficient proof of
membership of any data entry
Head of the chain being known
is enough to find tamper
evidence in any internal block
Decentralized Blockchain
Block: Header + Data +
Signature
Header: Pointer to previous
block
= hash of the previous block
header and Merkle root of data
of previous block
Data: information specific to
block
List of signatures known ahead
of time: permissioned
blockchains
Questions:
1. How is this list known
ahead of time?
2. Which user in this list gets
to add which block?
3. Who polices this?
This is the topic of this
Distributed Consensus
Question: Who maintains the ledger of transactions?
Distributed Consensus
Interactive Protocol
Allows distributed non-trusting nodes to come to agreement
Traditional area of computer science (Byzantine Fault
Tolerance)
Bitcoin’s consensus protocol is vastly different
decentralized identity (permissionless setting)
less pessimistic network assumptions
Decentralized Identity
Public keys are used as identity
Single entity can create vast number of identities
Sybil
Cannot do majority or super-majority voting
Network Assumption
Any node can broadcast to all nodes into the network
fully connected network
Every broadcast message reaches every node
albeit with some delay
Bitcoin: ten minutes
This is the focus of Lecture 4
Oracle
Time is organized into slots
Oracle selects one of the nodes (public identities)
random
everyone can verify the unique winner
The selected node is the proposer in that slot
constitutes a block with transactions
validates transactions
includes hash pointer to previous block
signs the block
Proof of Work
Practical method to simulate the Oracle
Mining
cryptographic hash function creates computational puzzle
Hash(nonce, block-hash) < Threshold
nonce is the proof of work
include nonce inside the block
Threshold
chosen such that a block is mined successfully on average once in 10
minutes
a successfully mined block will be broadcast to all nodes in the network
Properties of Proof of Work Mining
Random miner selected at each time
Independent randomness across time and across miners
Probability of successful mining proportional to fraction of total hash power
Sybil resistance
Spam resistance
Tamper proof
Longest Chain Protocol
Where should the mined block hash-point to?
Blockchain may have forks
because of network delays
because of adversarial action
Longest chain protocol
attach the block to the leaf of the longest chain in the block
what if two equal length chains? Discussed next
Why Variable Difficulty
Block Difficulty
As of March 2015, the mining target/threshold (in hexadecimal) is:
0000000000000000172EC0000000000000000000000000000000000000000000
So the hash of any valid block must be below this value.
In other words, only one in about 2^67 nonces that you try will work.
Difficulty of a block:
Block_difficulty = 1/mining_target
Bitcoin Rule
(a) The mining difficulty changes every 2016 blocks
next_difficulty = (previous_difficulty * 2016 * 10 minutes) / (time to mine last
2016 blocks)
(b) Adopt the heaviest chain instead of the longest chain
chain_difficulty = sum of block_difficulty
(c) Allow the difficulty to be adjusted only mildly every epoch
¼ < next_difficulty/previous_difficulty < 4
Alternate Bitcoin Rule (Only (b))
Let the miners choose their own difficulty and then use (b) the heaviest chain
rule.
Alternate Bitcoin Rule ((a) + (b))
Difficulty rising attack
Bitcoin Rule ((a) + (b) + (c))
Security Analysis: Private Attack
Adversary can point its block to an older part of the chain
Duplicate transaction inserted
Plausible Deniability
network latency
an offline user will not know which block came earlier
blocks have no wall clock reference (time stamps).
Satoshi’s Table
Security Analysis: k Deep Confirmation Rule
Security vs Latency with Private Attack

More Related Content

Similar to Lecture3

Understanding Blockchain
Understanding Blockchain Understanding Blockchain
Understanding Blockchain Razi Salih
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionDSCIITPatna
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptxGopalSB
 
Blockchain-SSM.pptx
Blockchain-SSM.pptxBlockchain-SSM.pptx
Blockchain-SSM.pptxAditya786867
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of TrustMarco Segato
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyNavin Kumar
 
Introduction to bit coin
Introduction to bit coinIntroduction to bit coin
Introduction to bit coinVivian S. Zhang
 
Do a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architectDo a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architectDustiBuckner14
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationDr. Mohamed Torky
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceAlecHo7
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfVISHNURAJSSNSCEAD
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & EthereumBlockchainHub Graz
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
Blockchain: An Innovative Technology
Blockchain: An Innovative TechnologyBlockchain: An Innovative Technology
Blockchain: An Innovative TechnologyIJSRED
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
 

Similar to Lecture3 (20)

Understanding Blockchain
Understanding Blockchain Understanding Blockchain
Understanding Blockchain
 
Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptx
 
Blockchain-SSM.pptx
Blockchain-SSM.pptxBlockchain-SSM.pptx
Blockchain-SSM.pptx
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
R1x g16 blockchain
R1x g16 blockchainR1x g16 blockchain
R1x g16 blockchain
 
Introduction to bit coin
Introduction to bit coinIntroduction to bit coin
Introduction to bit coin
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Do a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architectDo a research and make a PowerPoint about Insulation for architect
Do a research and make a PowerPoint about Insulation for architect
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in Space
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdf
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Blockchain: An Innovative Technology
Blockchain: An Innovative TechnologyBlockchain: An Innovative Technology
Blockchain: An Innovative Technology
 
The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin The Blockchain - The Technology behind Bitcoin
The Blockchain - The Technology behind Bitcoin
 

More from AEA Albania Energy Association

More from AEA Albania Energy Association (7)

Mpwat SDGs - 2023 Social Entrepreneurship and Social Innovation
Mpwat SDGs - 2023 Social Entrepreneurship and Social InnovationMpwat SDGs - 2023 Social Entrepreneurship and Social Innovation
Mpwat SDGs - 2023 Social Entrepreneurship and Social Innovation
 
Huawei Digitalization - Presentation for UNI Lu
Huawei   Digitalization - Presentation for UNI LuHuawei   Digitalization - Presentation for UNI Lu
Huawei Digitalization - Presentation for UNI Lu
 
Coronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptx
Coronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptxCoronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptx
Coronary-Artery-Revascularization-Guideline-Slide-Set-gl-revasc (1).pptx
 
Big Boss Assignment Solution_update.pptx
Big Boss Assignment Solution_update.pptxBig Boss Assignment Solution_update.pptx
Big Boss Assignment Solution_update.pptx
 
Seminar 3 Impiante Makanike
Seminar 3 Impiante Makanike Seminar 3 Impiante Makanike
Seminar 3 Impiante Makanike
 
PREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUT
PREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUTPREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUT
PREZANTIM-ISHTI-MBIKEQYRJA-E-TREGUT
 
Cool Startup Business Plan by Slidesgo.pptx
Cool Startup Business Plan by Slidesgo.pptxCool Startup Business Plan by Slidesgo.pptx
Cool Startup Business Plan by Slidesgo.pptx
 

Recently uploaded

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 

Recently uploaded (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 

Lecture3

  • 1. Lecture 3: Proof of Work and Nakamoto Consensus Longest Chain Rule Decentralized Identity, Ownership, Transfer Variable difficulty mining Private attack; security analysis
  • 2. Blockchain with Merkle Trees Block: Header + Data Header: Pointer to previous block = hash of the previous block header and Merkle root of data of previous block Data: information specific to block Application: Centralized tamper evident information log with efficient proof of membership of any data entry Head of the chain being known is enough to find tamper evidence in any internal block
  • 3. Decentralized Blockchain Block: Header + Data + Signature Header: Pointer to previous block = hash of the previous block header and Merkle root of data of previous block Data: information specific to block List of signatures known ahead of time: permissioned blockchains Questions: 1. How is this list known ahead of time? 2. Which user in this list gets to add which block? 3. Who polices this? This is the topic of this
  • 4. Distributed Consensus Question: Who maintains the ledger of transactions? Distributed Consensus Interactive Protocol Allows distributed non-trusting nodes to come to agreement Traditional area of computer science (Byzantine Fault Tolerance) Bitcoin’s consensus protocol is vastly different decentralized identity (permissionless setting) less pessimistic network assumptions
  • 5. Decentralized Identity Public keys are used as identity Single entity can create vast number of identities Sybil Cannot do majority or super-majority voting
  • 6. Network Assumption Any node can broadcast to all nodes into the network fully connected network Every broadcast message reaches every node albeit with some delay Bitcoin: ten minutes This is the focus of Lecture 4
  • 7. Oracle Time is organized into slots Oracle selects one of the nodes (public identities) random everyone can verify the unique winner The selected node is the proposer in that slot constitutes a block with transactions validates transactions includes hash pointer to previous block signs the block
  • 8. Proof of Work Practical method to simulate the Oracle Mining cryptographic hash function creates computational puzzle Hash(nonce, block-hash) < Threshold nonce is the proof of work include nonce inside the block Threshold chosen such that a block is mined successfully on average once in 10 minutes a successfully mined block will be broadcast to all nodes in the network
  • 9. Properties of Proof of Work Mining Random miner selected at each time Independent randomness across time and across miners Probability of successful mining proportional to fraction of total hash power Sybil resistance Spam resistance Tamper proof
  • 10. Longest Chain Protocol Where should the mined block hash-point to? Blockchain may have forks because of network delays because of adversarial action Longest chain protocol attach the block to the leaf of the longest chain in the block what if two equal length chains? Discussed next
  • 12. Block Difficulty As of March 2015, the mining target/threshold (in hexadecimal) is: 0000000000000000172EC0000000000000000000000000000000000000000000 So the hash of any valid block must be below this value. In other words, only one in about 2^67 nonces that you try will work. Difficulty of a block: Block_difficulty = 1/mining_target
  • 13. Bitcoin Rule (a) The mining difficulty changes every 2016 blocks next_difficulty = (previous_difficulty * 2016 * 10 minutes) / (time to mine last 2016 blocks) (b) Adopt the heaviest chain instead of the longest chain chain_difficulty = sum of block_difficulty (c) Allow the difficulty to be adjusted only mildly every epoch ¼ < next_difficulty/previous_difficulty < 4
  • 14. Alternate Bitcoin Rule (Only (b)) Let the miners choose their own difficulty and then use (b) the heaviest chain rule.
  • 15. Alternate Bitcoin Rule ((a) + (b)) Difficulty rising attack
  • 16. Bitcoin Rule ((a) + (b) + (c))
  • 17. Security Analysis: Private Attack Adversary can point its block to an older part of the chain Duplicate transaction inserted Plausible Deniability network latency an offline user will not know which block came earlier blocks have no wall clock reference (time stamps).
  • 18. Satoshi’s Table Security Analysis: k Deep Confirmation Rule
  • 19. Security vs Latency with Private Attack

Editor's Notes

  1. Need a figure here. Show forks and point out the longest chain
  2. The mining power of Bitcoin increased exponentially by an astonishing factor of 10^14 during its decade of deployment.
  3. 2016 * 10 minutes = 2 weeks
  4. Attack: The adversary tries to mine a "super" block that is as difficult as k honest block. For the adversarial mining process, although the mean is the same, the variance is much high. If the adversary is "luck", he can mine this super block before honest nodes mine k blocks, the probability of which is a constant rather than exponentially decaying in 𝑘.
  5. The adversary creates an epoch filled with timestamps extremely close-together, so that the difficulty adjustment rule from (a) will set the difficulty extremely high for the next epoch, at which point, the adversary can utilize the high variance of the mining similar to the aforementioned attack.
  6. When the adversary completes one epoch in its private chain, the honest chain is much longer. The adversary can only rise the difficulty by 4. To catch up, he still needs to mine lots of blocks (some fraction of 2016), hence the variance is controlled.
  7. Figure to be drawn here of the double spend attack
  8. Private attack in terms of voters over time. Need a better figure than this. Just focus on showing the private attack