Detail publikace

DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy

PEREŠÍNI, M. BENČIĆ, F. MALINKA, K. HOMOLIAK, I.

Originální název

DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy

Typ

článek ve sborníku mimo WoS a Scopus

Jazyk

angličtina

Originální abstrakt

In response to the bottleneck of processing throughput inherent to single chain PoW blockchains, several proposals have substituted a single chain for Directed Acyclic Graphs (DAGs). In this work, we investigate two notable DAG-oriented designs. We focus on PHANTOM (and its optimization GHOSTDAG), which proposes a custom transaction selection strategy that enables to increase the throughput of the network. However, the related work lacks a thorough investigation of corner cases that deviate from the protocol in terms of transaction selection strategy. Therefore, we build a custom simulator that extends open source simulation tools to support multiple chains and enables us to investigate such corner cases. Our experiments show that malicious actors who diverge from the proposed transaction selection strategy make more profit as compared to honest miners. Moreover, they have a detrimental effect on the processing throughput of the PHANTOM (and GHOSTDAG) due to same transactions being included in more than one block of different chains. Finally, we show that multiple miners not following the transaction selection strategy are incentivized to create a shared mining pool instead of mining independently, which has a negative impact on decentralization.

Autoři

PEREŠÍNI, M.; BENČIĆ, F.; MALINKA, K.; HOMOLIAK, I.

Vydáno

31. 12. 2021

Nakladatel

Institute of Electrical and Electronics Engineers

Místo

Rotkreuz

Strany od

1

Strany do

8

Strany počet

8

URL

BibTex

@inproceedings{BUT175815,
  author="Martin {Perešíni} and Federico M. {Benčić} and Kamil {Malinka} and Ivan {Homoliak}",
  title="DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy",
  year="2021",
  pages="1--8",
  publisher="Institute of Electrical and Electronics Engineers",
  address="Rotkreuz",
  url="https://arxiv.org/abs/2109.01102"
}