Bitcoin Forum
April 26, 2024, 09:48:48 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [Proposal] Solution for BWA(Block Withholding Attack) - Proof of Online  (Read 255 times)
qcitycoin (OP)
Newbie
*
Offline Offline

Activity: 35
Merit: 0


View Profile
September 27, 2018, 07:42:59 AM
Last edit: October 01, 2018, 05:42:21 AM by qcitycoin
 #1

      Proof Of Online - Solution for BWA(Block Withholding Attack)

  • Proof Of Online is used as a supplement to the Block Withholding Attack (BWA), a type of 51% attack on the block chain.
  • BWA (Block Withholding Attack) is a process that creates a longer malicious block in the off-line state and then invalidates the normal transaction.
  • All PoW-based coins, including Bitcoin, are potentially at risk and therefore suggest a way to fundamentally block off-line block generation.

[Contents of technology]

  • The height % n == 0 block of the block chain (eg, every xxx00, xxx10, xxx20, ..., xxx90 when n = 10) is called a PoO block.
  • Always include a signature signed by a particular signer, and the signature information is recorded by adding a VchBlockSig field to the header.
  • A particular signer is an account owned by a foundation or organization that initially designs the block chain or operates the block chain, and is called a verifier.
  • They sign the PoO block with the private key of the public address to provide that the block is synchronized to the network.
  • All other nodes accept the block by confirming that the PoO block has been signed with the public address of the foundation.
  • A node with a public key of a verifier is called a verifier node to distinguish it from an ordinary mining node.
  • It records the verifier public key list operated by the Foundation like the SeedNode operation method in the program source, and the block addition operation for online certification grants authority only to the verifier node.
  • With this logic, an attacker can only have fewer than the number of blocks defined by %n, so even if he seizes the network hash power, he can not get enough time to do a malicious double spending attack.
  • The miners of all blocks can be identified as the corresponding block with the seed node operated by the foundation.
  • For this reason, the name of this algorithm is called Proof Of Online.

[The way of operation]

  • In order to minimize the repulsion of existing miners, mining compensation for PoO block is limited to the commission of the transaction and the appropriate n value is set.
  • In the case where all of the verifier nodes stop operating, if the block time is more than twice the normal block time, the nth block will also enable mining of general miners.
  • If a verifier node is added or a transfer of authority is required, it is approved by a co-signature of more than a majority of verifiers, and the new verified verifier is managed in the client's internal database of each node

[Application of technology]

  • The PoO solution will be the first to be applied to the QCity Coin, and a detailed description of the technology will be replaced by the corresponding technical white paper.
  • Qcity coin technical white paper : http://www.qcitycoin.org/img/qcitycoin_tech.pdf


[Notoce]
We changed the subject of this post because there was a difference in views on 51% attack.

1714124928
Hero Member
*
Offline Offline

Posts: 1714124928

View Profile Personal Message (Offline)

Ignore
1714124928
Reply with quote  #2

1714124928
Report to moderator
1714124928
Hero Member
*
Offline Offline

Posts: 1714124928

View Profile Personal Message (Offline)

Ignore
1714124928
Reply with quote  #2

1714124928
Report to moderator
1714124928
Hero Member
*
Offline Offline

Posts: 1714124928

View Profile Personal Message (Offline)

Ignore
1714124928
Reply with quote  #2

1714124928
Report to moderator
Remember that Bitcoin is still beta software. Don't put all of your money into BTC!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714124928
Hero Member
*
Offline Offline

Posts: 1714124928

View Profile Personal Message (Offline)

Ignore
1714124928
Reply with quote  #2

1714124928
Report to moderator
HeRetiK
Legendary
*
Offline Offline

Activity: 2912
Merit: 2080


Cashback 15%


View Profile
September 27, 2018, 08:06:09 AM
Merited by suchmoon (4), ABCbits (2), mdayonliner (1)
 #2

The title is not only clickbait, but also utterly wrong.

Block withholding attacks and 51% attacks are two entirely different things.

51% attacks by definition always include the majority hashrate, block withholding attacks not necessarily do.

Granted, block withholding attacks such as selfish mining are at their most effective with the majority hashrate, but then again every attack on PoW is. In the end once a miner achieves majority hashrate they can attack the network whatever way the like, regardless whether they decide to withhold blocks or not.

Apart from attacks on the incentive structure of PoW such as selfish mining, block withholding attacks are usually thwarted by... waiting for confirmations. That is, by using the protocol the way it was meant to be used.

That being said:

  • A particular signer is an account owned by a foundation or organization that initially designs the block chain or operates the block chain, and is called a verifier.

So the solution to block withholding attacks is.... federated trust.

...

*slow clap*

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
AGD
Legendary
*
Offline Offline

Activity: 2069
Merit: 1164


Keeper of the Private Key


View Profile
September 27, 2018, 11:19:40 AM
 #3

So much work destroyed with 2 answers. Sorry for your loss of time...

Bitcoin is not a bubble, it's the pin!
+++ GPG Public key FFBD756C24B54962E6A772EA1C680D74DB714D40 +++ http://pgp.mit.edu/pks/lookup?op=get&search=0x1C680D74DB714D40
yangchigi
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
September 28, 2018, 03:43:34 AM
Last edit: September 28, 2018, 03:54:02 AM by yangchigi
 #4

it's same way too 51% attack and withholding attack.

if attacker can withholding block ,how attach network without 51% hashrate ?
if attacker can 51% hashrate , how attack without withholding block ?

two word looks like different , but  two word same way attack network.

The title is not only clickbait, but also utterly wrong.

Block withholding attacks and 51% attacks are two entirely different things.

51% attacks by definition always include the majority hashrate, block withholding attacks not necessarily do.

Granted, block withholding attacks such as selfish mining are at their most effective with the majority hashrate, but then again every attack on PoW is. In the end once a miner achieves majority hashrate they can attack the network whatever way the like, regardless whether they decide to withhold blocks or not.

Apart from attacks on the incentive structure of PoW such as selfish mining, block withholding attacks are usually thwarted by... waiting for confirmations. That is, by using the protocol the way it was meant to be used.

That being said:

  • A particular signer is an account owned by a foundation or organization that initially designs the block chain or operates the block chain, and is called a verifier.

So the solution to block withholding attacks is.... federated trust.

...

*slow clap*

yangchigi
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
September 28, 2018, 03:52:25 AM
 #5

how make checkpoint every n  block in blockchain software?
if make checkpoint every  n block in reference site , how trust reference site.
trust foundation work only insert trust block, it's not reason to turn back to centralized system.


So basically solve a problem with another problems (trusting a foundation) Tongue

Automated checkpoint every n blocks (between 144 - 2016 should be good) is simpler and more effective (for 51%+ attack and history manipulation, not selfish mining).
Besides by trusting a foundation, there's no point of consensus method or even decentralized system. We might as well turn back to centralized system (e.g. bank).
HeRetiK
Legendary
*
Offline Offline

Activity: 2912
Merit: 2080


Cashback 15%


View Profile
September 28, 2018, 10:07:16 AM
Merited by ABCbits (1)
 #6

it's same way too 51% attack and withholding attack.

No.

51% attacks may involve withholding blocks, but they not necessarily do.

Withholding blocks is more effective with the majority hashrate, but is not a prequisite for such an attack.


if attacker can withholding block ,how attach network without 51% hashrate ?

Selfish mining (an economical attack on fellow miners):
https://bitcoinmagazine.com/articles/selfish-mining-a-25-attack-against-the-bitcoin-network-1383578440/

Finney Attack (a double-spend attack):
https://bitcoin.stackexchange.com/questions/4942/what-is-a-finney-attack


if attacker can 51% hashrate , how attack without withholding block ?

An attacker that has the majority hashrate does not even need to bother with withholding blocks. They have full control over which transactions make their way onto the blockchain and can ensure that blocks found by their competitors always end up orphaned due to being able to outmine the minority hashrate for as long as they control more than 50% of the hashing power.



holding block/selfish mining
[...]
Can't be used invalidate recent transaction/block
[...]

The Finney attack mentioned above is a block withholding attack that can be used to invalidate the recent block without running majority hashrate.

For the most part it seems to be rather uneconomical though and is easily thwarted by waiting for at least 1 confirmation.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!