The Bitcoin Backbone Protocol: Analysis and Applications

Juan A. Garay,Aggelos Kiayias,Nikos Leonardos
DOI: https://doi.org/10.1145/3653445
IF: 2.269
2024-04-18
Journal of the ACM
Abstract:Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone , and prove three of its fundamental properties which we call Common Prefix , Chain Quality and Chain Growth in the static setting where the number of players remains fixed. Our proofs hinge on appropriate and novel assumptions on the “hashing power” of the protocol participants and their interplay with the protocol parameters and the time needed for reliable message passing between honest parties in terms of computational steps. A takeaway from our analysis is that, all else being equal, the protocol’s provable tolerance in terms of the number of adversarial parties (or, equivalently, their “hashing power” in our model) decreases as the duration of a message passing round increases. Next, we propose and analyze applications that can be built “on top” of the backbone protocol, specifically focusing on Byzantine agreement (BA) and on the notion of a public transaction ledger. Regarding BA, we observe that a proposal due to Nakamoto falls short of solving it, and present a simple alternative which works assuming that the adversary’s hashing power is bounded by 1/3. The public transaction ledger captures the essence of Bitcoin’s operation as a cryptocurrency, in the sense that it guarantees the liveness and persistence of committed transactions. Based on this notion we describe and analyze the Bitcoin system as well as a more elaborate BA protocol and we prove them secure assuming the adversary’s hashing power is strictly less than 1/2. Instrumental to this latter result is a technique we call 2-for-1 proof-of-work (PoW) that has proven to be useful in the design of other PoW-based protocols.
computer science, information systems, theory & methods, software engineering, hardware & architecture
What problem does this paper attempt to address?
The paper attempts to address issues primarily focused on the core part of the Bitcoin protocol and demonstrates its effectiveness and security in different application scenarios. Specifically: 1. **Extracting and Analyzing the Core Part of the Bitcoin Protocol**: - The paper extracts the core part of the Bitcoin protocol, referred to as the "Bitcoin backbone protocol," and proves its three fundamental properties: Common Prefix, Chain Quality, and Chain Growth. These properties are analyzed in a static environment. 2. **Preventing Double-Spending Attacks**: - In the Bitcoin system, an important issue is preventing double-spending attacks. The paper demonstrates through formal analysis how to ensure transaction consistency and persistence, thereby preventing such attacks. 3. **Application of Byzantine Fault Tolerance Protocol**: - The paper explores how to construct a Byzantine Agreement (BA) protocol based on the Bitcoin backbone protocol. Specifically, it proposes a BA protocol suitable for up to 1/3 malicious nodes and proves its effectiveness. 4. **Application of Public Transaction Ledger**: - Based on the Bitcoin backbone protocol, the paper also explores how to construct a "robust public transaction ledger." This includes ensuring the persistence and liveness of transactions, meaning that once a transaction is confirmed, it will not be revoked, and all honest users' transactions will eventually be included in the ledger. 5. **Analyzing the Impact of Network Delays**: - The paper also analyzes the protocol's performance under network synchrony and delay conditions, particularly noting that as network delay increases, the protocol's tolerance for the number of malicious nodes decreases. Overall, this paper aims to analyze the core mechanisms of the Bitcoin protocol through formal methods and demonstrate its potential and limitations in various application scenarios.