Estimation of Miner Hash Rates and Consensus on Blockchains A

Estimation of Miner Hash Rates and Consensus on Blockchains A

Estimation of Miner Hash Rates and Consensus on Blockchains A. Pinar Ozisik George Bissias Brian N. Levine College of Information and Computer Sciences, UMass Amherst ABSTRACT For merchants who are vulnerable to attack, applying We make several contributions that quantify the real-time these models to a blockchain at a particular moment in time hash rate and therefore the consensus of a blockchain. We is not possible without assigning an accurate value to p or q. show that by using only the hash value of blocks, we can This is a challenging task because miners do not publish their estimate and measure the hash rate of all miners or individual hash rates in real-time in a format that is verifiable by third miners, with quantifiable accuracy. We apply our techniques parties. Because no such information is available, merchants to the Ethereum and Bitcoin blockchains; our solution applies selling goods via Bitcoin and Ethereum have no guidance to any proof-of-work-based blockchain that relies on a numeric for when transactions are sufficiently safe from attacks. For target for the validation of blocks. We also show that if miners example, the core Bitcoin client displays a transaction as con- regularly broadcast status reports of their partial proof-of- firmed once it is exactly 6 blocks deep in the blockchain [7], work, the hash rate estimates are significantly more accurate an overly simplistic choice that is used regardless of any at a cost of slightly higher bandwidth. Whether using only other factors or conditions. Advice from the community is the blockchain, or the additional information in status reports, appropriately vague on when a block is confirmed [8]. merchants can use our techniques to quantify in real-time the To further complicate this problem, miners’ hash rates threat of double-spend attacks. can and do change dynamically (e.g., due to diurnal electric- ity rates), even though the POW algorithms are engineered to change their work targets glacially. In other words, mer- chants who seek a high probability that a transaction’s status 1 INTRODUCTION will not change should be concerned with not only block depth, but the instantaneous hash rate of the network. Mean- Blockchains, such as Bitcoin [27] and Ethereum [17], are while, honest consumers can grow impatient waiting for a among the most successful peer-to-peer (p2p) systems on large number of blocks to be appended to the blockchain in the Internet. Bitcoin has been adopted more widely for e- order to get their merchandise, especially when traditional commerce than any previous digital currency. Ethereum is bank-based commerce can take seconds. also quickly gaining prominence as a blockchain that runs Turing-complete distributed applications. Ethereum applica- tions include sub-currencies [12], distributed autonomous Contributions. In this paper, we make several contributions organizations with share holders [13], prediction markets [2], based on novel approaches to estimating the real-time hash and games [18]; and it currently has around half the market rate of miners and, therefore, the real-time consensus of capitalization of Bitcoin. a blockchain. We apply our techniques to both the actual There are many advantages to blockchains, including de- Ethereum and Bitcoin blockchains, and in fact, they can be centralized operation. One of the primary limitations of applied to any proof-of-work-based blockchain that relies blockchains is that the status of transactions, blocks, and on a numeric target for the validation of blocks [26, 31]. Our branches is not immutable — a fork of blocks supported contributions are summarized as follows. by greater proof of work (POW) can emerge at any time. • First, we design a method of accurate hash rate estima- Fortunately, the probability that there will be a change in tion based on compact status reports issued by miners. consensus regarding which fork to build on decreases expo- The reports add no computational load to miners, and nentially as the blockchain grows [27]. Specifically, consider are stored neither on the blockchain nor at peers that 1 receive them. They can be broadcast off-network, for an attacker, with a fraction of all mining power 0 < q < 2 , that wishes to create a fork starting from a point z blocks example via RSS or Twitter. Just like block headers, re- deep on the main chain. Let the mining power building on the ports are verifiable as authentic POW by third parties. main chain be p, such that q +p = 1. The probability [20] that • Second, we show hash rates can be estimated from the attacker will eventually produce a fork with more POW only blocks that are published to the blockchain. This q z approach requires no cooperation from the miners, but is ( p ) . Several models of blockchain security are largely based on the relative values of p, q, and z; see [19, 21]. is less accurate than status reports. 1 • We evaluate the accuracy of the two approaches using between addresses, via transactions, is recorded on a public a synthetic blockchain as ground truth. Additionally, ledger called a blockchain. Transactions are authenticated we derive Chernoff bounds for the accuracy of our esti- via a private key signature, and the balance of each account mates from status reports. We show that both methods can be derived from the blockchain. can be used together in support of incremental adop- Adding to the blockchain. To be added to the blockchain, tion by mining pools. Our blockchain-only method in- transactions are broadcast by users on Bitcoin’s p2p network. curs no network costs. Status reports incur extra traffic A set of miners on the p2p network verify that each trans- depending on their rate. For example, if all active min- action is signed correctly, does not conflict with a previous ers issue about 10 reports per block, the cost is about transaction, does not move more coin than is contained in 0.03 KBps for Bitcoin and 6.6 KBps for Ethereum; note the address, and other functions. Each miner independently that none of the report data needs to be archived. The agglomerates a set of valid transactions into a candidate block accuracy of both methods is tunable. and attempts to solve a predefined cryptographic puzzle as • We apply our estimates to calculating the probability POW, which involves data from the candidate block and of a double-spend attack against blocks as they garner a specific prior block. The new transactions are only valid descendants. We show that using status reports, 99% of if they do not conflict with the set of transactions that are blocks have a risk of 0.1% by depth of 13 for a worst- contained in all blocks that are direct ancestors. case estimate. We show that without status reports, The first miner to solve the problem broadcasts his solu- merchants should wait much longer. We characterize tion to the network, and by virtue of the solution, is able to the historical performance of Ethereum and Bitcoin, add the block to the ever-growing blockchain as a child of and show half of blocks require a depth of at least 40 the prior block. The miners then start over, using the newly before an attacker’s success is below 0.1% for a worst appended blockchain and the set of remaining transactions. case estimate. We also consider attacks against our ap- The miners’ incentive for discovering a new block is a reward proach. A public demo is at http://cs.umass.edu/~brian/ of coins, called the coinbase, consisting of a predetermined blockchain.html that provides a quantified, realtime block reward (currently worth 12.5 Bitcoins) and fees from estimate of the security of blocks. transactions included in the block. We begin with a background on blockchains and conclude In Bitcoin, the POW computation is dynamically calibrated with a discussion of limitations and related work. to take approximately ten minutes per block. When transac- tions appear in a block, they are confirmed, and each subse- 2 BACKGROUND quent block provides additional confirmation. To announce a The blockchain concept was introduced by Nakamoto [27] new block, a miner lists all transactions contained in the new as a method of probabilistic distributed consensus [35]. Orig- block along with a header that contains an easily-verifiable inally designed to be the backbone of the Bitcoin distributed POW solution. When a node or miner receives a new block, cryptographic currency, blockchains have since been applied he validates each transaction in the block and the POW. to a variety of scenarios. Bitcoin itself includes a scripting Notably, if there is a fork on the chain, honest miners language that supports a limited set of custom smart con- always select the prior block as the last block containing the tracts. Ethereum[17] is a blockchain-based distributed sys- largest amount of POW. However, due to propagation delays tem that supports Turing-complete software and includes in the network, miners can receive competing (but valid) a global data store. Transactions in Ethereum represent the block announcements, which bifurcates the chain, until one transfer of money or data among programs, allowing for a of the two forks is appended to first. richer space of distributed applications. Other blockchains Block Headers. Any entity can elect to be a miner for Bit- have been proposed and implemented to support anonymous coin, and there is no centralized party from whom to seek transactions [31], hedge funds [13], medical records [3], and approval for mining. If all miners were to simply vote on alternate currencies [12, 26]. Below we describe the aspects which block should be appended to the main chain, then the of Bitcoin and Ethereum that are relevant to us.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us