Security of Search and Verification Protocol in Multidimensional Blockchain
- Authors: Shilov I.M1, Zakoldaev D.A1
-
Affiliations:
- ITMO University
- Issue: Vol 20, No 4 (2021)
- Pages: 793-819
- Section: Information security
- URL: https://journals.rcsi.science/2713-3192/article/view/266323
- DOI: https://doi.org/10.15622/ia.20.4.2
- ID: 266323
Cite item
Full Text
Abstract
The issue of secure data exchange and performing external transactions between robust distributed ledgers has recently been among the most significant in the sphere of designing and implementing decentralized technologies. Several approaches have been proposed to speed up the process of verifying transactions on adjacent blockchains. The problem of search has not been under research yet. The paper contains security evaluation of data exchange between independent robust distributed ledgers inside multidimensional blockchain. Main principles, basic steps of the protocol and major requirements for it are observed: centralized approach, subset principle and robust SVP. An equivalence of centralized approach and ideal search and verification functionality is proven. The probability of successful verification in case of using fully connected network graph or equivalent approach with fully connected graph between parent and child blockchain is shown. The insecurity of approach with one-to-one links between child and parent ledgers or with a subset principle is proven. A robust search and verification protocol for blocks and transactions based on the features of robust distributed ledgers is presented. The probability of attack on this protocol is mostly defined by the probability of attack on verification and not on search. An approach to protection against an attacker with 50% of nodes in the network is given. It is based on combination of various search and verification techniques.
About the authors
I. M Shilov
ITMO University
Email: ilia.shilov@yandex.ru
Kronverksky pr. 49
D. A Zakoldaev
ITMO University
Email: d.zakoldaev@itmo.ru
Kronverksky pr. 49
References
- Шилов И.М., Заколдаев Д.А. Многомерный блокчейн и его преимущества // Информационные технологии. 2020. Т. 26. № 6. С. 360–367.
- Badertscher C., Maurer U., Tschudi D., Zikas V. Bitcoin as a Transaction Ledger: A Composable Treatment // Advances in Cryptology – CRYPTO 2017. 2017. pp. 324-356.
- Vukolic M. Rethinking permissioned blockchains // Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. 2017. pp. 3-7.
- Cachin C., Guerraoui R., Rodrigues L. Introduction to Reliable and Secure Distributed Programming. // Springer-Verlag, Berlin, Heidelberg. 2011. P. 279.
- Pease M., Shostak R., Lamport L. Reaching agreement in the presence of faults // Journal of the ACM. 1980. vol. 27. pp. 228-234.
- Шилов И.М., Заколдаев Д.А. Модель устойчивого распределенного реестра для анализа безопасности многомерного блокчейна // Научно-технический вестник информационных технологий, механики и оптики. 2021. Т. 21. №2. С. 249-255.
- Garay J., Kiayias A., Leonardos N. The Bitcoin Backbone Protocol: Analysis and Applications // Advances in Cryptology - EUROCRYPT 2015. 2015. vol. 9057. pp. 281-310.
- Badertscher C., Gaži P., Kiayias A., Russell A., Zikas V. Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability // ACM Conference on Computer and Communications Security – ACM CCS 2018. 2018. pp. 913–930.
- David B., Gaži P., Kiayias A., Russell A. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain // Advances in Cryptology – EUROCRYPT 2018. 2018. vol. 10821. pp. 66-98.
- Garay J., Kiayias A., Leonardos N. The Bitcoin Backbone Protocol with Chains of Variable Difficulty // Advances in Cryptology – CRYPTO 2017. 2017. vol. 10401. pp. 291-323.
- Kiayias A., Lamprou N., Stouka AP. Proofs of Proofs of Work with Sublinear Complexity // Financial Cryptography and Data Security. 2016. vol. 9604. pp. 61-78.
- Kiayias A., Miller A., Zindros D. Non-interactive Proofs of Proof-of-Work // Financial Cryptography and Data Security. 2020. vol. 12059. pp. 505-522.
- Back A., Corallo M., Dashjr L., Friedenbach M., Maxwell G., Miller A., Poelstra A., Timon J., Wuille P. Enabling Blockchain Innovations with Pegged Sidechains. URL: https://blockstream.com/sidechains.pdf (дата обращения: 29.04.2021).
- Gazi P., Kiayias A., Zindros D. Proof-of-Stake Sidechains // 2019 IEEEE Symposium on Security and Privacy (SP). 2019. vol. 1. pp. 677-694.
- Sompolinsky Y., Zohar A. Accelerating Bitcoin's Transaction Processing Fast Money Grows on Trees, Not Chains // IACR Cryptology ePrint Archive. 2013.
- Singh A., Click K., Parizi R.M., Zhang Q., Dehghantanha A., Choo K.K.R. Sidechain technologies in blockchain networks: An examination and state-of-the-art review // Journal of Network and Computer Applications. 2020. vol. 149.
- Kiayias A., Russell A., David B., Oliynykov R. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol // Advances in Cryptology – CRYPTO 2017. 2017. vol. 10401. pp. 357-388.
- Canetti R. Universally composable security: a new paradigm for cryptographic protocols // Proceedings 42nd IEEE Symposium on Foundations of Computer Science. 2001. pp. 136-145.
- Canetti R. Universally composable signatures, certification, and authentication // Proceedings of 17th Computer Security Foundations Workshop (CSFW). 2014. pp. 219-235.
- Canetti R., Dodis Y., Pass R., Walfish S. Universally Composable Security with Global Setup // Theory of Cryptography. 2007. vol. 4392. pp. 61-85.
- Canetti R., Shahaf D., Vald M. Universally Composable Authentication and Key-Exchange with Global PKI // Public-Key Cryptography – PKC 2016. 2016. vol. 9615. pp. 265-296.
- Bentov I., Gabizon A., Mizrahi A. Cryptocurrencies Without Proof of Work // Financial Cryptography and Data Security. 2016. vol. 9604. pp. 142-157.
- David B., Dowsley R., Larangeira M. ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement // Financial Cryptography and Data Security. vol. 11598. pp. 282-300.
- Duan S., Meling H., Peisert S., Zhang H. BChain: Byzantine Replication with Hight Throughput and Embedded Reconfiguration // Principles of Distributed Systems – OPODIS 2014. 2014. vol. 8878. pp. 91-106.
Supplementary files

