Bobtail: Improved Blockchain Security with Low-Variance Mining

Total Page:16

File Type:pdf, Size:1020Kb

Bobtail: Improved Blockchain Security with Low-Variance Mining Bobtail: Improved Blockchain Security with Low-Variance Mining George Bissias Brian N. Levine University of Massachusetts Amherst University of Massachusetts Amherst [email protected] [email protected] Abstract—Blockchain systems are designed to produce blocks systems craft blocks by repeatedly changing a nonce in the at a constant average rate. The most popular systems currently block header until the cryptographic hash of that header is less employ a Proof of Work (PoW) algorithm as a means of creating than a target value t, 0 < t < S, where S is the largest hash these blocks. An unfortunate limitation of all deployed PoW value (typically S = 2256 − 1). In other words, the hash of blockchain systems is that the time between blocks has high each header is a sample from [0;S] taken randomly from a variance. For example, Bitcoin produces, on average, one block discrete uniform distribution. A block is discovered when the every 10 minutes. However, 5% of the time, Bitcoin’s inter-block time is at least 30 minutes. first order statistic (i.e., the minimum value) of all sampled values is less than target t. The resulting inter-block times are In this paper, we show that high variance is at the root exponentially distributed (a result we show formally), and have of fundamental attacks on PoW blockchains. We propose an a variance equal to the square of the mean. alternative process for PoW-based block discovery that results in an inter-block time with significantly lower variance. Our Intuitively, variance explains why a miner with a small algorithm, called Bobtail, generalizes the current algorithm, fraction of the system’s total hash rate can successfully which uses a single PoW sample, to one that incorporates k doublespend. Whenever the honest miners are unlucky and samples. We show that the variance of inter-block times decreases encounter high inter-block times, it’s an opportunity for the as k increases. Bobtail significantly thwarts doublespend and selfish mining attacks. For example, for Bitcoin and Ethereum, attacker to conversely be lucky, mine with relatively smaller a doublespending attacker with 35% of the mining power will inter-block times, and produce a longer chain. In sum, if PoW succeed with 44% probability when the merchant sets up an mining could be achieved with a lower inter-block time variance, embargo of 1 block; however, when k ≥ 40, the probability of then doublespend and selfish mining attacks would fail more success for the same attacker falls to less than 1%. Similarly, often. for Bitcoin and Ethereum currently, a selfish miner with 45% of the mining power will claim about 71% of blocks; however, In this paper, we propose an improved process for PoW- when k ≥ 20, the same miner will find that selfish mining is less based block discovery that results in an inter-block time successful than honest mining. We also investigate attacks newly with significantly lower variance. As a result, our approach made possible by Bobtail and show how they can be defeated. The is significantly more secure against doublespend and selfish primary costs of our approach are larger blocks and increased mining attacks. Our algorithm generalizes the current algorithm, network traffic. which uses a single PoW sample, to one that incorporates k samples. We show that the variance of inter-block times I. INTRODUCTION decreases as k increases. For example, if our approach were Blockchain systems are designed to produce blocks of applied to Bitcoin, nearly every block would be found within 5 validated transactions at a constant average rate. The most to 18 minutes; and the average inter-block time would remain popular systems employ a Proof of Work (PoW) algorithm as at 10 minutes. In comparison, currently 5% of Bitcoin’s blocks a means of creating these blocks [35], including Bitcoin [8], have inter-block times of at least 30 minutes. We call our Bitcoin Cash [9], Ethereum [21], and Litecoin [33]. Whether approach Bobtail mining. a pure PoW or hybrid approach [11, 16, 31], the two most As a result, in Bobtail, doublespend and selfish mining fundamental attacks on PoW blockchains are selfish mining [23] attack efficacies are drastically reduced. For example, in either and the doublespend [35]. Bitcoin or Ethereum, a doublespending attacker with 35% of A direct consequence of using a PoW algorithm is that the mining power will succeed with 44% probability when the the time between blocks has high variance and the distribution merchant sets up an embargo of 1 block; however, for Bobtail, of inter-block times has a very long tail. As we show in this the probability of success for the same attacker falls to less paper, high variance is responsible for enabling doublespend than 1% (when k ≥ 40). Similarly, for Bitcoin and Ethereum and selfish mining attacks. Generally, miners in all deployed currently, a selfish miner with 45% of the mining power will claim about 71% of blocks; however, when k ≥ 20, the same miner will find that selfish mining is defeated, resulting in a Network and Distributed Systems Security (NDSS) Symposium 2020 smaller fraction of blocks than honest mining. 23–26 February 2020, San Diego, CA, USA ISBN 1-891562-61-4 One disadvantage of Bobtail is that new withholding and https://dx.doi.org/10.14722/ndss.2020.23095 denial-of-service attacks are possible. However, we show how www.ndss-symposium.org these attacks can be thwarted with careful protocol design. Miner-2 block header seeking a value near tk, a threshold that varies Header Proof 1 Miner-3 Miner-3 with security parameter k. As illustrated in Fig. 1(Left), once Proofs Proof 2 (Graphene) a suitable header is found, a miner announces it to all other Proof 3 Miner-1 Coinbase miners; for clarity we call the announcement a proof set and its Proof 4 … Signature hash value simply a proof. If the mean of the k-lowest proofs Txns is equal to or lower than the target tk, then a new block is Proof k Miner-4 (Graphene) Proof k+1 found. The miner with the lowest of all proofs is the only one that can announce the new block and is the one that controls Fig. 1: (Left) In Bobtail, miners each broadcast proof sets whose the list of transactions confirmed by the block, as shown in hash values are called proofs. When the average of k proofs is Fig. 1(Right). To be clear, Bobtail blocks are not the result at or below the target, a new block is found. (Right) The miner of of k proofs from one miner, but the k-lowest from all miners. the lowest proof selects the transactions that are included in the The coinbase reward is split evenly among all contributors new block and announces that block to the network. Coinbase (proportional to number proofs contributed), which leads to is rewarded to miners proportional to the number of proofs a smoother short-term distribution of rewards among lower they contributed. Proofs (and transactions) in the block can be hash rate miners than does the status quo. We now define this efficiently announced using Graphene [38]. process more formally. A. Problem Statement Contributions. Our contributions are summarized as follows. Imagine that the mining process is carried out for exactly h hashes during time interval I, generating hash values • We derive the statistical characteristics of our approach H ;:::;H from [0;S] uniformly at random. Now define V and validate each empirically. For example, we derive 1 h i to be the value of the ith order statistic at the end of I, i.e. expressions for the expectation and variance of Bobtail V = H in standard notation. Let W be a random variable block times and the amount of work performed for any i (i) k representing the average value over the k-lowest order statistics value of k. Using these expressions, we quantify the after h hashes. reduction in variance of inter-block time for values of k k > 1. We show that variance in block discovery time is 1 X W = V : (1) reduced by O(1=k) relative to the status quo. k k i i=1 • We demonstrate that low-variance mining significantly Wk constitutes the collective mining proof for the entire mitigates the threats to security posed by doublespend and network. Our Bobtail mining criterion says that a new block is selfish mining attacks, as stated above. discovered when a realized value of Wk falls at or below the • We demonstrate that, due to our protocol mechanisms, target tk: Bobtail mining has the same or lower orphaned block rate wk ≤ tk: (2) as existing schemes. Notably, this approach is a generalization of current systems, • We quantify the increased network overhead of Bobtail, which are the special case where k = 1. and demonstrate how these costs can be kept minimal by The primary goals of our paper are therefore to show the leveraging the statistical characteristics that we derive. following, given values of k > 1. • We show that new intra-block DoS and withholding attacks • Inter-block time variance is significantly reduced (Sec- are possible for Bobtail. However, through careful protocol tion IV). design, these attacks are mitigated. • Selfish mining and doublespend attacks are significantly Bobtail is also a convenience for consumers, who would more difficult to carry out as k increases (Section V). benefit from reduced block time variance and a more consistent • Costs are relatively small. Orphan rates are no worse than flow of validated transactions through the system. for k = 1 (Section VI), and the increases in block size and network traffic are small and manageable (Section VII).
Recommended publications
  • Creation and Resilience of Decentralized Brands: Bitcoin & The
    Creation and Resilience of Decentralized Brands: Bitcoin & the Blockchain Syeda Mariam Humayun A dissertation submitted to the Faculty of Graduate Studies in partial fulfillment of the requirements for the degree of Doctor of Philosophy Graduate Program in Administration Schulich School of Business York University Toronto, Ontario March 2019 © Syeda Mariam Humayun 2019 Abstract: This dissertation is based on a longitudinal ethnographic and netnographic study of the Bitcoin and broader Blockchain community. The data is drawn from 38 in-depth interviews and 200+ informal interviews, plus archival news media sources, netnography, and participant observation conducted in multiple cities: Toronto, Amsterdam, Berlin, Miami, New York, Prague, San Francisco, Cancun, Boston/Cambridge, and Tokyo. Participation at Bitcoin/Blockchain conferences included: Consensus Conference New York, North American Bitcoin Conference, Satoshi Roundtable Cancun, MIT Business of Blockchain, and Scaling Bitcoin Tokyo. The research fieldwork was conducted between 2014-2018. The dissertation is structured as three papers: - “Satoshi is Dead. Long Live Satoshi.” The Curious Case of Bitcoin: This paper focuses on the myth of anonymity and how by remaining anonymous, Satoshi Nakamoto, was able to leave his creation open to widespread adoption. - Tracing the United Nodes of Bitcoin: This paper examines the intersection of religiosity, technology, and money in the Bitcoin community. - Our Brand Is Crisis: Creation and Resilience of Decentralized Brands – Bitcoin & the Blockchain: Drawing on ecological resilience framework as a conceptual metaphor this paper maps how various stabilizing and destabilizing forces in the Bitcoin ecosystem helped in the evolution of a decentralized brand and promulgated more mainstreaming of the Bitcoin brand. ii Dedication: To my younger brother, Umer.
    [Show full text]
  • Segwit2x –
    SegWit2x – A New Statement The Overwhelming power of SegWit2x In order to safeguard the community from an undesired chain split, the upgrade should be overwhelming, but it’s not enough. It should also ‘appear’ as overwhelming. People, businesses and services needs to be certain about what is going to happen and the risks if they won’t follow. My impression is that still too many speaking english people in the western world think the upgrade will be abandoned before or immediately after block 494784 is mined, thus they are going to simply ignore it. That could lead to unprepared patch up and confusion, while naïve users risk to harm themselves. For this reason and for the sake of the Bitcoin community as a whole, we need to show again, clearly and publicly the extent of the support to SegWit2x. We also need to commit ourselves in a widespread communication campaign. I know this is not a strict technical matter, but it could help a lot avoiding technical issues in the future. What we have to do First, we need a new statement from the original NYA signers and all the business, firms and individuals who joined the cause later. That statement should be slightly different from the original NYA though, and I am explaining why. We all know that what Bitcoin is will be ultimately determined by market forces, comprehensive of all the stakeholders involved: businesses, miners, users, developers, traders, investors, holders etc. Each category has its own weight in the process, and everybody has incentives in following the market.
    [Show full text]
  • Facilitating Cross-Chain Cryptocurrency Exchanges: an Inquiry Into Blockchain Technology and Interoperability with an Emphasis on Cryptocurrency Arbitrage
    Eastern Michigan University DigitalCommons@EMU Senior Honors Theses & Projects Honors College 2020 Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Samuel Grone Follow this and additional works at: https://commons.emich.edu/honors Part of the Computer Sciences Commons Facilitating cross-chain cryptocurrency exchanges: An inquiry into blockchain technology and interoperability with an emphasis on cryptocurrency arbitrage Abstract Since the introduction and proliferation of the blockchain-based cryptocurrency Bitcoin, alternative cryptocurrencies also based on blockchain technology have exploded in number. It was once believed that one, or very few, cryptocurrencies would eventually dominate the market and drive out competitors. This assumption, however, was incorrect. Thousands of cryptocurrencies exist concurrently. The vast number of cryptocurrencies leads to a problem—what if the cryptocurrency that an individual possesses does not meet their current needs as well as another cryptocurrency might? The attempt to solve this problem has led to the rise of many cryptocurrency exchanges and exchange schemes. In this paper, we will discuss the motivations for an individual to be interested in exchanging two or more cryptocurrencies by describing and comparing various popular cryptocurrencies with different desirable attributes. While we will discuss these attributes, this paper will give special focus to arbitrage in particular. In addition, we will describe various cryptocurrency exchange schemes and their advantages and disadvantages. Finally, we contribute to the understanding of cryptocurrency exchangeability and interoperability by comparing the historical price data of several cryptocurrencies to determine how often arbitrage has been possible in the past. Degree Type Open Access Senior Honors Thesis Department Computer Science First Advisor Weitian Tong Second Advisor S.
    [Show full text]
  • Bitcoin Mining Bitcoin
    Bitcoin Mining Explained BITCOIN MINING BITCOIN MINING Bitcoin Mining Explained Copyright © 2018 2 Table of Contents INTRODUCTION 4 WHAT IS BITCOIN MINING? 5 BITCOIN MINING TERMINOLOGY 6 WHY DO PEOPLE MINE BITCOIN? 9 GETTING STARTED MINING 12 TOP HARDWARE FOR BITCOIN MINING 13 WHAT SOFTWARE IS NEEDED? 16 MINING APPS 17 ELECTRICAL COSTS FOR MINING 22 OTHER BITCOIN MINING OPTIONS 23 CLOUD MINING 23 MINING POOLS 23 HOW TO SET UP A BITCOIN MINING OPERATION 25 HOW TO CALCULATE BITCOIN MINING PROFITS 26 RISKS AND REWARDS OF BITCOIN MINING 27 RISKS 27 REWARDS 27 CONCLUSION 29 3 Introduction It is no longer news that the adoption of digital currencies as a means of making payment is rapidly gaining momentum around the world. Bitcoin, which is the first example of the growing category of money known as the cryptocurrency, is the most popular and widely accepted of them all. Bitcoin is a peer-to-peer electronic cash system that was invented by a software developer called Satoshi Nakamoto, and it is currently taking the lead amongst other digital currencies. It is an electronic payment system based on mathematical proof that is created and held electronically. Bitcoin is also a decentralized form of cryptocurrency that is independent of any central authority – meaning, there is no single institution controlling the Bitcoin network. This eBook is going to help you go beyond a basic understanding of Bitcoin and the mining of it. When you are finished reading, you’ll be ready to get started mining Bitcoins today! 4 What is Bitcoin Mining? In traditional fiat currency systems, money is printed by the government and released into circulation whenever it is needed.
    [Show full text]
  • Trust and Verifiable Computation for Smart Contracts in Permissionless Blockchains
    DEGREE PROJECT IN INFORMATION AND COMMUNICATION TECHNOLOGY, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2017 Trust and verifiable computation for smart contracts in permissionless blockchains DOMINIK HARZ KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY Abstract Blockchains address trust through cryptography and consensus. Bitcoin is the first digital currency without trusted agents. Ethereum extends this technology by enabling agents on a blockchain, via smart contracts. However, a systemic trust model for smart contracts in blockchains is missing. This thesis describes the ecosystem of smart contracts as an open multi-agent system. A trust model introduces social control through deposits and review agents. Trust-related attributes are quantified in 2,561 smart contracts from GitHub. Smart contracts employ a mean of three variables and functions and one in ten has a security-related issue. Moreover, blockchains restrict computation tasks. Resolving these restrictions while maintaining trust requires verifiable computation. An algorithm for verifiable computation is developed and implemented in Solidity. It uses an arbiter enforcing the algorithm, computation services providing and verifying solutions, and a judge assessing solutions. Experiments are performed with 1000 iterations for one to six verifiers with a cheater prior probability of 30%, 50%, and 70%. The algorithm shows linear complexity for integer multiplication. The verification depends on cheater prior probability and amount of verifiers. In the experiments, six verifiers are sufficient to detect all cheaters for the three prior probabilities. Keywords: blockchain; smart contract; trust; multi-agent system; verifiable compu- tation Referat Blockchains adresserar tillit genom kryptografi och konsensus. Bitcoin är den första digitala valutan utan betrodda agenter.
    [Show full text]
  • Altcoins, Ethereum Projects, and More – Bonus Content
    Altcoins, Ethereum projects, and More – Bonus Content Welcome to the bonus online content for Mastering Blockchain – Third Edition! This content complements the main text, with the intention to enhance the reader learning experience. The material covered here has not been included in the core book for reasons of brevity and scope, but it contains valuable information, and has thus been included here for reference and further learning. We'll list and briefly describe the topics covered in these pages here, as an idea of what will be covered in this package. The topics are best read in conjunction with the chapters specified here, but can also be accessed as a reference guide for various topics at any point! • Bitcoin forks: It is recommended that this topic is read after Chapter 7, Bitcoin Network and Payments. It covers alternative Bitcoin projects such as Bitcoin Cash and Bitcoin Unlimited. • Alternative coins: This is intended to be read in conjunction with Chapter 9, Alternative Coins. This topic covers some important cryptocurrency projects such as Zcash and Primecoin. We cover in detail, among other things, how various clients can be installed, and how mining can be performed. • Ethereum networks, trading and investment: It's recommended to read this material with Chapter 11, Ethereum 101. This topic briefly introduces the different types of Ethereum networks and some technical details. Also, we introduce some basics regarding the trading and investment of ether, the Ethereum cryptocurrency. • Ethereum EVM opcodes: This topic should be read in conjunction with Chapter 12, Further Ethereum. Here, we list all EVM opcodes, with descriptions and some technical details, such as their opcode representation and gas consumption.
    [Show full text]
  • Articles of Federation
    Bitcoin Unlimited: Articles of Federation Bitcoin is at a crossroads that will determine whether it becomes a worldwide public good, embodying a trustless ledger and currency for all people, companies, and financial institutions worldwide. The Bitcoin Unlimited project seeks to provide a voice, in terms of code and hash power, to all stakeholders in the Bitcoin ecosystem. As a foundational principle, we assert that Bitcoin is and should be whatever its users define by the code they run and the rules they vote for with their hash power. This project seeks to remove existing practical barriers to stakeholders expressing their views in these ways. We see in the Bitcoin ecosystem many companies, groups and economic actors that have made large investment decisions based on maintaining the current trajectory of growth - a growth that would naturally ensue if Bitcoin is available as a public good. These include payment processors, micro-payment solutions, exchanges, merchants, and more. We recognize the importance of the mining industry and the necessity to increase transaction revenue to support its growth as the block subsidy decreases. This growth is aligned with the interests of the Bitcoin network as a whole since it increases network security. In the Bitcoin Core variant, we do NOT see a venue for these actors to formally express their desires in regards to the evolution of the network. Instead we see a project controlled by a small group of developers employed by finance-oriented for- profit startup companies, and the emergence of corporate products (Lightning network, Side-chains and permissioned ledgers) that would materially benefit from a Bitcoin network that is incapable of handling the transactional demand required for a worldwide public good.
    [Show full text]
  • Transaction Fees, Block Size Limit, and Auctions in Bitcoin
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Archivio della Ricerca - Università degli Studi di Siena ISSN 2379-5980 (online) DOI 10.5915/LEDGER.2019.145 RESEARCH ARTICLE Transaction Fees, Block Size Limit, and Auctions in Bitcoin Nicola Dimitri*† Abstract. Confirmation of Bitcoin transactions is executed in blocks, which are then stored in the Blockchain. As compared to the number of transactions in the mempool, the set of transactions which are verified but not yet confirmed, available space for inclusion in a block is typically limited. For this reason, successful miners can only process a subset of such transactions, and users compete with each other to enter the next block by offering confirmation fees. Assuming that successful miners pursue revenue maximization, they will include in the block those mempool transactions that maximize earnings from related fees. In the paper we model transaction fees as a Nash Equilibrium outcome of an auction game with complete information. In the game the successful miner acts as an auctioneer selling block space, and users bid for shares of such space to confirm their transactions. Moreover, based on expected fees we also discuss what the optimal, revenue maximizing, block size limit should be for the successful miner. Consistently with the intuition, the optimal block size limit resolves the trade-off between including additional transactions (which possibly lower the unit fees collected) and keeping the block capacity limited (with, however, higher unit fees). 1. Introduction Cryptocurrencies, notably Bitcoin, have recently drawn much attention within the academic community, among investors and the public, for more than one reason, and in particular for the highly variable behavior of the Dollar/Bitcoin exchange rate.
    [Show full text]
  • A Study on Nine Years of Bitcoin Transactions: Understanding Real-World Behaviors of Bitcoin Miners and Users
    A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users Binbing Hou∗ Feng Chen LinkedIn Co. Louisiana State University [email protected] [email protected] Abstract—Bitcoin is the world’s first blockchain-based, peer-to- and finalize transactions to make payments. Being designed peer cryptocurrency system. Being tremendously successful, the to support reliable, secure, and trusted transactions between Bitcoin system is designed to support reliable, secure, and trusted untrusted peers, the Bitcoin system provides a high degree transactions between untrusted peers. Since its release in 2009, the Bitcoin system has rapidly grown to an unprecedentedly large of freedom for the participants, allowing them to prioritize scale. However, the real-world behaviors of miners and users in transaction processing, customize transaction implementation, the system and the efficacy of the original Bitcoin system design determine transaction confirmation, etc. In other words, ex- in the field deployment still remain unclear, hindering us from cept following several basic system protocols and rules, the understanding its internals and developing the next-generation participants in the Bitcoin system have a high degree of cryptocurrency system. In this paper, we study the behaviors of Bitcoin miners and flexibility and freedom to make decisions based on their own users and their interactions based on quantitative analysis of more interests. Unfortunately, such “optimizations” could sometimes than nine years of Bitcoin transaction history, from its first release be against the original design purposes and cause unexpected on January 3rd, 2009 to April 30th, 2018. We have analyzed system performance deficiency and even security loopholes, as over 300 million transaction records to study the transactions’ we will discuss later in this paper.
    [Show full text]
  • CY18 Q4 December a Collection of Bitcoin Commentary from the Brightest Minds in the Crypto Community
    CY18 Q4 December A collection of Bitcoin commentary from the brightest minds in the crypto community. Crypto Words CY18 December Contents Goals and Scope ......................................................................................................................................................................... 2 Support Crypto Words .......................................................................................................................................................... 3 Skeptic’s Guide to Bitcoin: Unpacking Bitcoin’s Social Contract ...................................................... 4 The “Bitcoin mining death spiral” debate explained .................................................................................10 Beware of Lazy Research: Let’s Talk Electricity Waste & How Bitcoin Mining Can Power A Renewable Energy Renaissance......................................................................................................... 13 Skeptic’s Guide to Bitcoin: Bitcoin and the Promise of Independent Property Rights ................................................................................................................................................................................................................. 26 Introducing Realized Capitalization ........................................................................................................................ 32 Who Controls Bitcoin Core? .........................................................................................................................................
    [Show full text]
  • Note from the Editor
    ISSN 2379-5980 (online) DOI 10.5915/LEDGER.2018.115 Note From The Editor =======================BEGIN SIGNED MESSAGE======================= It has been a particularly exciting year in the blockchain technology space. Interest in blockchain technology has been growing continually since Bitcoin was unleashed on the world, but 2017 will be remembered, I believe, as a year of unusually rapid growth. This year’s volume of Ledger continues to exemplify the interdisciplinary nature of blockchain research. From computer science and game theory (see, “Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem” by Alex Biryukov and Dmitry Khovratovich, and “Bitcoin Mining as a Contest” by Nicola Dimitri), to education research and political science (see, “From Smileys to Smileycoins: Using a Cryptocurrency in Education” by Gunnar Stefansson and Jamie Lentin, and “What Diplomacy in the Ancient Near East Can Tell Us About Blockchain Technology” by Chris Berg). In this issue we even have an article about the use of cryptocurrencies to help fund scientific research (see “Funding Science with Science: Cryptocurrency and Independent Academic Research Funding” by Edward Lehner, Dylan Hunzeker, and John R. Ziegler). What you do not see in this year’s volume are all of the interactions among academics and scholars in disparate fields who are only beginning to discover each other. There have been several new centers of blockchain research announced this year at universities around the globe. Whereas entrepreneurs and investors were quick to network with each other in the early years, we academics have been making cross-disciplinary connections at a more measured pace. Nevertheless, we are optimistic about the formation of new blockchain-focused academic communities in 2018.
    [Show full text]
  • Current Trends in Sustainability of Bitcoins and Related Blockchain Technology
    sustainability Review Current Trends in Sustainability of Bitcoins and Related Blockchain Technology Pasquale Giungato 1,* ID , Roberto Rana 2, Angela Tarabella 3 and Caterina Tricase 2 1 Department of Chemistry, University of Bari, Bari 70125, Italy 2 Department of Economics, University of Foggia, Foggia 71121, Italy; [email protected] (R.R.); [email protected] (C.T.) 3 Department of Economics and Management, University of Pisa, Pisa 56126, Italy; [email protected] * Correspondence: [email protected]; Tel.: +39-099-4725-234 Received: 26 October 2017; Accepted: 27 November 2017; Published: 30 November 2017 Abstract: Bitcoin is a digital currency based on a peer-to-peer payment system managed by an open source software and characterized by lower transaction costs, greater security and scalability than fiat money and no need of a central bank. Despite criticisms about illegal uses and social consequences, it is attracting the interest of the scientific community. The purpose of this work is to define and evaluate the current trends of the literature concerned with the sustainability of bitcoin, considering the environmental impacts, social issues and economic aspects. From the analysis it emerges that the transition of the whole monetary system in the new cryptocurrency will result in an unacceptable amount of energy consumed to mine new bitcoins and to maintain the entire virtual monetary system, and probably bitcoin will remain a niche currency. Blockchain, which is the base for a distributed and democratically-sustained public ledger of the transactions, could foster new and challenging opportunities. Sharing the framework of medical data, energy generation and distribution in micro-grids at the citizen level, block-stack and new state-driven cryptocurrencies, may benefit from the wide spread of blockchain-based transactions.
    [Show full text]