170 likes | 409 Views
Bitcoin’s Transaction Processing. Yonatan Sompolinsky joint work with Aviv Zohar. Bitcoin. decentralized cryptocurrency. hard to get easy to pass no authority, no money printing pseudonymous relatively secure high transaction volume.
E N D
Bitcoin’s Transaction Processing Yonatan Sompolinsky joint work with Aviv Zohar
Bitcoin decentralized cryptocurrency • hard to get • easy to pass • no authority, no money printing • pseudonymous • relatively secure • high transaction volume current protocol: conflictghost protocol: in accord
Transactions in Bitcoin tx tx tx’ tx tx tx tx tx tx tx’ tx tx tx’ tx tx tx’ tx tx tx tx’ tx’ • irreversible Bob Calvin
The Blockchain txs: txs: txs: ~ 10 min block #83 block #81 block #82 • consistent • grows in time • kept locally at each node Time
Conflicting blockchains maintain one main chain only B1 A the ”longest chain” rule B2 delays => forks blocks discarded & txs cancelled Time
Block tree vs Block chain 3 6 4 λ:= block creation rate = 6 per hourβ:= growth rate of main chain = 4 per hour efficiency:=β/λ=4/6<1 2 1 5 delays => forks => inefficiency Time
Block size, Delay & Efficiency Block Propagation Time 0.95 Efficiency = 0 λ = block creation rateβ= growth rate of main chain • analysis of data provided to us by Decker and Wattenhofer
Throughput (TPS) • Transactions Processed per Second = • (block size) X (growth rate of the main chain) • efficiency 2000 1/600 • TPS < 3.3 why? • TPS ~ 1736
Security - double spend attack tx tx tx main chain Bob Calvin tx’ publish ! secret
Success of attack • computational power needed to create blocks • share of blocks proportional to fraction of computational power • an attacker with computational power will eventually fail • conversely, an attacker with will always succeed • security threshold is thus
Effect of increasing throughput • ↑ • efficiency↓ delay ↑ • TPS ↑ • security ↓
Security limitation on TPS high TPS: more bandwidth needed Bitcoin today: secure butlow throughput TPS vulnerable TPS secure TPS attacker computational power (fraction)
Greedy Heaviest Observed Sub-Tree longest chain • security ↓ efficiency ↓
Greedy Heaviest Observed Sub-Tree main chain according to “longest” rule C1 4 10 D1 B tx B A 5 1 C2 6 1 1 D2 2 main chain according to “ghost” E1 D3 C3 main chain according to “longest” rule tx’ Time
GHOST throughput • no security constraint • hardware constraints, e.g., network congestion, limit the feasible TPS • 8.5-fold increase of current bandwidth can withstandTPS = 2000 • in pipeline: improvement of ghost, same bandwidth more TPS • … • security • high transaction volume