But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-03-31

AUTHORS

Christian Badertscher , Juan Garay , Ueli Maurer , Daniel Tschudi , Vassilis Zikas

ABSTRACT

An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure if and only if the majority of the mining power is honest. Despite their great impact, however, these works do not address an incisive question asked by positivists and Bitcoin critics, which is fuelled by the fact that Bitcoin indeed works in reality: Why should the real-world system adhere to these assumptions?In this work we employ the machinery from the Rational Protocol Design (RPD) framework by Garay et al. [FOCS 2013] to analyze Bitcoin and address questions such as the above. We show that under the natural class of incentives for the miners’ behavior—i.e., rewarding them for adding blocks to the blockchain but having them pay for mining—we can reserve the honest majority assumption as a fallback, or even, depending on the application, completely replace it by the assumption that the miners aim to maximize their revenue.Our results underscore the appropriateness of RPD as a “rational cryptography” framework for analyzing Bitcoin. Along the way, we devise significant extensions to the original RPD machinery that broaden its applicability to cryptocurrencies, which may be of independent interest. More... »

PAGES

34-65

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-78375-8_2

DOI

http://dx.doi.org/10.1007/978-3-319-78375-8_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1101874789


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Badertscher", 
        "givenName": "Christian", 
        "id": "sg:person.010232721040.24", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010232721040.24"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Texas A&M University, College Station, USA", 
          "id": "http://www.grid.ac/institutes/grid.264756.4", 
          "name": [
            "Texas A&M University, College Station, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Garay", 
        "givenName": "Juan", 
        "id": "sg:person.015655737162.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015655737162.07"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maurer", 
        "givenName": "Ueli", 
        "id": "sg:person.01316567627.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Aarhus University, Aarhus, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.7048.b", 
          "name": [
            "Aarhus University, Aarhus, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tschudi", 
        "givenName": "Daniel", 
        "id": "sg:person.011112577475.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011112577475.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Edinburgh and IOHK, Edinburgh, UK", 
          "id": "http://www.grid.ac/institutes/grid.4305.2", 
          "name": [
            "University of Edinburgh and IOHK, Edinburgh, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zikas", 
        "givenName": "Vassilis", 
        "id": "sg:person.012007513121.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012007513121.08"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2018-03-31", 
    "datePublishedReg": "2018-03-31", 
    "description": "An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure if and only if the majority of the mining power is honest. Despite their great impact, however, these works do not address an incisive question asked by positivists and Bitcoin critics, which is fuelled by the fact that Bitcoin indeed works in reality: Why should the real-world system adhere to these assumptions?In this work we employ the machinery from the Rational Protocol Design (RPD) framework by Garay et al. [FOCS 2013] to analyze Bitcoin and address questions such as the above. We show that under the natural class of incentives for the miners\u2019 behavior\u2014i.e., rewarding them for adding blocks to the blockchain but having them pay for mining\u2014we can reserve the honest majority assumption as a fallback, or even, depending on the application, completely replace it by the assumption that the miners aim to maximize their revenue.Our results underscore the appropriateness of RPD as a \u201crational cryptography\u201d framework for analyzing Bitcoin. Along the way, we devise significant extensions to the original RPD machinery that broaden its applicability to cryptocurrencies, which may be of independent interest.", 
    "editor": [
      {
        "familyName": "Nielsen", 
        "givenName": "Jesper Buus", 
        "type": "Person"
      }, 
      {
        "familyName": "Rijmen", 
        "givenName": "Vincent", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-78375-8_2", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-78374-1", 
        "978-3-319-78375-8"
      ], 
      "name": "Advances in Cryptology \u2013 EUROCRYPT 2018", 
      "type": "Book"
    }, 
    "keywords": [
      "security of Bitcoin", 
      "rational cryptography", 
      "cryptographic assumptions", 
      "system adhere", 
      "Bitcoin", 
      "mining power", 
      "design framework", 
      "Garay et al", 
      "independent interest", 
      "recent line", 
      "framework", 
      "natural class", 
      "incentives", 
      "blockchain", 
      "revenue", 
      "cryptography", 
      "assumption", 
      "security", 
      "great impact", 
      "mining", 
      "cryptocurrencies", 
      "miners", 
      "significant extension", 
      "work", 
      "nutshell", 
      "questions", 
      "fallback", 
      "impact", 
      "reality", 
      "address questions", 
      "applications", 
      "et al", 
      "extension", 
      "applicability", 
      "critics", 
      "fact", 
      "block", 
      "way", 
      "power", 
      "class", 
      "appropriateness", 
      "interest", 
      "behavior", 
      "results", 
      "positivist", 
      "machinery", 
      "adhere", 
      "al", 
      "lines", 
      "majority", 
      "RPD", 
      "design treatments", 
      "treatment", 
      "incisive questions"
    ], 
    "name": "But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin", 
    "pagination": "34-65", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1101874789"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-78375-8_2"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-78375-8_2", 
      "https://app.dimensions.ai/details/publication/pub.1101874789"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:43", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_251.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-78375-8_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-78375-8_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-78375-8_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-78375-8_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-78375-8_2'


 

This table displays all metadata directly associated to this object as RDF triples.

156 TRIPLES      23 PREDICATES      79 URIs      72 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-78375-8_2 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nb6f747b3c1fc49ea90be650ea84c8fed
4 schema:datePublished 2018-03-31
5 schema:datePublishedReg 2018-03-31
6 schema:description An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure if and only if the majority of the mining power is honest. Despite their great impact, however, these works do not address an incisive question asked by positivists and Bitcoin critics, which is fuelled by the fact that Bitcoin indeed works in reality: Why should the real-world system adhere to these assumptions?In this work we employ the machinery from the Rational Protocol Design (RPD) framework by Garay et al. [FOCS 2013] to analyze Bitcoin and address questions such as the above. We show that under the natural class of incentives for the miners’ behavior—i.e., rewarding them for adding blocks to the blockchain but having them pay for mining—we can reserve the honest majority assumption as a fallback, or even, depending on the application, completely replace it by the assumption that the miners aim to maximize their revenue.Our results underscore the appropriateness of RPD as a “rational cryptography” framework for analyzing Bitcoin. Along the way, we devise significant extensions to the original RPD machinery that broaden its applicability to cryptocurrencies, which may be of independent interest.
7 schema:editor N276788a764ec45e0b36df349dc9b5cdd
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nc51c4fe5ef7b46e6be2553282967f36a
12 schema:keywords Bitcoin
13 Garay et al
14 RPD
15 address questions
16 adhere
17 al
18 applicability
19 applications
20 appropriateness
21 assumption
22 behavior
23 block
24 blockchain
25 class
26 critics
27 cryptocurrencies
28 cryptographic assumptions
29 cryptography
30 design framework
31 design treatments
32 et al
33 extension
34 fact
35 fallback
36 framework
37 great impact
38 impact
39 incentives
40 incisive questions
41 independent interest
42 interest
43 lines
44 machinery
45 majority
46 miners
47 mining
48 mining power
49 natural class
50 nutshell
51 positivist
52 power
53 questions
54 rational cryptography
55 reality
56 recent line
57 results
58 revenue
59 security
60 security of Bitcoin
61 significant extension
62 system adhere
63 treatment
64 way
65 work
66 schema:name But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin
67 schema:pagination 34-65
68 schema:productId N35e886ac260448a7b756bed8c7fc3ba4
69 Nc779d6dab59d4494a3e16e6f8dc77423
70 schema:publisher N1f5962534dea412d9b54e9ec739d32ee
71 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101874789
72 https://doi.org/10.1007/978-3-319-78375-8_2
73 schema:sdDatePublished 2022-05-10T10:43
74 schema:sdLicense https://scigraph.springernature.com/explorer/license/
75 schema:sdPublisher N6fccf21057364f8d96608d846281f2e5
76 schema:url https://doi.org/10.1007/978-3-319-78375-8_2
77 sgo:license sg:explorer/license/
78 sgo:sdDataset chapters
79 rdf:type schema:Chapter
80 N1f5962534dea412d9b54e9ec739d32ee schema:name Springer Nature
81 rdf:type schema:Organisation
82 N276788a764ec45e0b36df349dc9b5cdd rdf:first N655781c93e634c7fadeb4891124bdb56
83 rdf:rest N8f06c8a6e11b472ea89577fef06bbb86
84 N35e886ac260448a7b756bed8c7fc3ba4 schema:name dimensions_id
85 schema:value pub.1101874789
86 rdf:type schema:PropertyValue
87 N519b091a8c8e497fa8900f275180f2e1 rdf:first sg:person.011112577475.84
88 rdf:rest N7935345710cb437888252a3282758b17
89 N655781c93e634c7fadeb4891124bdb56 schema:familyName Nielsen
90 schema:givenName Jesper Buus
91 rdf:type schema:Person
92 N6fccf21057364f8d96608d846281f2e5 schema:name Springer Nature - SN SciGraph project
93 rdf:type schema:Organization
94 N7935345710cb437888252a3282758b17 rdf:first sg:person.012007513121.08
95 rdf:rest rdf:nil
96 N8f06c8a6e11b472ea89577fef06bbb86 rdf:first Na61fff95c5ee488193e540cbb0c1bcca
97 rdf:rest rdf:nil
98 N9d12cfbac8ba4f78b540366b9e1fcb37 rdf:first sg:person.01316567627.91
99 rdf:rest N519b091a8c8e497fa8900f275180f2e1
100 Na61fff95c5ee488193e540cbb0c1bcca schema:familyName Rijmen
101 schema:givenName Vincent
102 rdf:type schema:Person
103 Nb6f747b3c1fc49ea90be650ea84c8fed rdf:first sg:person.010232721040.24
104 rdf:rest Nbc3f631929ce412aad092e9836fec53b
105 Nbc3f631929ce412aad092e9836fec53b rdf:first sg:person.015655737162.07
106 rdf:rest N9d12cfbac8ba4f78b540366b9e1fcb37
107 Nc51c4fe5ef7b46e6be2553282967f36a schema:isbn 978-3-319-78374-1
108 978-3-319-78375-8
109 schema:name Advances in Cryptology – EUROCRYPT 2018
110 rdf:type schema:Book
111 Nc779d6dab59d4494a3e16e6f8dc77423 schema:name doi
112 schema:value 10.1007/978-3-319-78375-8_2
113 rdf:type schema:PropertyValue
114 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
115 schema:name Information and Computing Sciences
116 rdf:type schema:DefinedTerm
117 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
118 schema:name Data Format
119 rdf:type schema:DefinedTerm
120 sg:person.010232721040.24 schema:affiliation grid-institutes:grid.5801.c
121 schema:familyName Badertscher
122 schema:givenName Christian
123 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010232721040.24
124 rdf:type schema:Person
125 sg:person.011112577475.84 schema:affiliation grid-institutes:grid.7048.b
126 schema:familyName Tschudi
127 schema:givenName Daniel
128 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011112577475.84
129 rdf:type schema:Person
130 sg:person.012007513121.08 schema:affiliation grid-institutes:grid.4305.2
131 schema:familyName Zikas
132 schema:givenName Vassilis
133 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012007513121.08
134 rdf:type schema:Person
135 sg:person.01316567627.91 schema:affiliation grid-institutes:grid.5801.c
136 schema:familyName Maurer
137 schema:givenName Ueli
138 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91
139 rdf:type schema:Person
140 sg:person.015655737162.07 schema:affiliation grid-institutes:grid.264756.4
141 schema:familyName Garay
142 schema:givenName Juan
143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015655737162.07
144 rdf:type schema:Person
145 grid-institutes:grid.264756.4 schema:alternateName Texas A&M University, College Station, USA
146 schema:name Texas A&M University, College Station, USA
147 rdf:type schema:Organization
148 grid-institutes:grid.4305.2 schema:alternateName University of Edinburgh and IOHK, Edinburgh, UK
149 schema:name University of Edinburgh and IOHK, Edinburgh, UK
150 rdf:type schema:Organization
151 grid-institutes:grid.5801.c schema:alternateName ETH Zurich, Zürich, Switzerland
152 schema:name ETH Zurich, Zürich, Switzerland
153 rdf:type schema:Organization
154 grid-institutes:grid.7048.b schema:alternateName Aarhus University, Aarhus, Denmark
155 schema:name Aarhus University, Aarhus, Denmark
156 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...