Targeted Nakamoto: A Bitcoin Protocol to Balance Network Security and Energy Consumption
- URL: http://arxiv.org/abs/2405.15089v2
- Date: Mon, 06 Jan 2025 03:07:03 GMT
- Title: Targeted Nakamoto: A Bitcoin Protocol to Balance Network Security and Energy Consumption
- Authors: Daniel Aronoff,
- Abstract summary: Targeted Nakamoto is a Proof-of-Work protocol augmentation that incentivizes miners to hone in on a target hashrate interval.
When hashrate is above target a ceiling is placed on the block reward a miner can receive.
When hashrate is below target a floor is placed underneath the miner's block reward.
- Score: 0.0
- License:
- Abstract: In a Proof-of-Work blockchain such as Bitcoin mining hashrate is increasing in the block reward. An increase in hashrate reduces network vulnerability to attack (a reduction in security cost) while increasing carbon emissions and electricity cost (an increase in externalities cost). This implies a tradeoff in total cost at different levels of hashrate and the existence of a hashrate interval where total cost is minimized. Targeted Nakamoto is a Proof-of-Work protocol augmentation that incentivizes miners to hone in on a target hashrate interval. When hashrate is above target a ceiling is placed on the block reward a miner can receive. When hashrate is below target a floor is placed underneath the miner's block reward. Monetary neutrality is maintained by a proportional increase in spending potential among addresses holding UTXO's to match a deduction from total block reward when the ceiling is operative and a proportional reduction in spending potential among addresses holding UTXO's to match an increase over the total block reward when the floor is binding.
Related papers
- Zaptos: Towards Optimal Blockchain Latency [52.30047458198369]
We introduce Zaptos, a parallel pipelined architecture designed to minimize end-to-end latency.
Zaptos achieves a throughput of 20,000 transactions per second with sub-second latency.
arXiv Detail & Related papers (2025-01-18T00:22:22Z) - Double Spending Analysis of Nakamoto Consensus for Time-Varying Mining Rates with Ruin Theory [33.689236895881216]
We introduce a ruin-theoretical model of double spending for Nakamoto consensus under the $k$-deep confirmation rule.
Time-varying mining rates are considered to capture the intrinsic characteristics of the peer to peer network delays.
arXiv Detail & Related papers (2024-12-24T18:54:30Z) - Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining [5.893888881448058]
As Bitcoin experiences more halving events, the protocol reward converges to zero, making transaction fees the primary source of miner rewards.
Previous security analyses of Bitcoin have either considered a fixed block reward model or a highly simplified volatile model.
This paper presents a reinforcement learning-based tool to develop mining strategies under a more realistic volatile model.
arXiv Detail & Related papers (2024-11-18T16:29:20Z) - Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding [8.782016890474873]
Bandwidth limitation is the major bottleneck that hinders scaling throughput of proof-of-work blockchains.
We propose Manifoldchain, a sharding protocol that alleviates the impact of slow miners to maximize blockchain throughput.
arXiv Detail & Related papers (2024-07-23T08:52:51Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Undetectable Selfish Mining [4.625489011466493]
A strategic Bitcoin miner may profit by deviating from the intended Bitcoin protocol.
We develop a selfish mining variant that is provably *statistically undetectable*
We show that our strategy is strictly profitable for attackers with $38.2% ll 50%$ of the total hashrate.
arXiv Detail & Related papers (2023-09-13T09:51:32Z) - Cobalt: Optimizing Mining Rewards in Proof-of-Work Network Games [6.052883613180156]
A key factor affecting mining rewards earned is the connectivity between miners in the peer-to-peer network.
We formulate the problem of deciding whom to connect to for miners as a bandit problem.
A key contribution of our work is the use of network coordinates based model for learning the network structure within the bandit algorithm.
arXiv Detail & Related papers (2023-07-10T16:50:58Z) - Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities [45.90740335615872]
Bitcoin is the most secure blockchain in the world, supported by the immense hash power of its Proof-of-Work miners.
Proof-of-Stake chains are energy-efficient, have fast finality but face several security issues.
We show that these security issues are inherent in any PoS chain without an external trusted source.
We propose a new protocol, Babylon, where an off-the-shelf PoS protocol checkpoints onto Bitcoin to resolve these issues.
arXiv Detail & Related papers (2022-07-18T06:01:25Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Toward Low-Cost and Stable Blockchain Networks [10.790006312359795]
We propose a blockchain mining resources allocation algorithm to reduce the mining cost in PoW-based (proof-of-work-based) blockchain networks.
arXiv Detail & Related papers (2020-02-19T06:42:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.