様々なブロックチェーンにインスピレーションを与えているプロトコルBitcoin-NG(Bitcoin Next Generation)の論文を見ていきます。本稿では「10. Conclusion」を見ます。




  • Bitcoin-NGは「コンセンサスレイテンシが単にネットワークの大きさのみに制限される」「スループットがノードの処理能力のみに制限される」というレベルでスケーリングが可能なプロトコルである。この技術はトラストレスなコンセンサスが必要な様々なアプリケーションを実現するブロックチェーンテクノロジに重要なものとなるだろう。


10. 結論




著者一同、Ayush Dubey、Gregory Maxwell、Malte Möser、Weijia Song、本論文の世話役を務めてくれたJay Lorch、そして草稿にコメントをくれた匿名レビュアーに感謝を申し上げる。


[1] ANDRESEN, G. O(1) block propagation. https://gist.github.com/gavinandresen/#file-blockpropagation-md, retrieved July. 2015.
[2] ASPNES, J. Randomized protocols for asynchronous consensus. Distributed Computing 16, 2-3 (2003), 165–175.
[3] BABAIOFF, M., DOBZINSKI, S., OREN, S., AND ZOHAR, A. On Bitcoin and red balloons. In ACM Conference on Electronic Commerce (Valencia, Spain, 2012), pp. 56–73.
WUILLE, P. Enabling blockchain innovations with pegged sidechains. http://cs.umd.edu/projects/coinscope/coinscope.pdf, 2014.
[5] BAMERT, T., DECKER, C., ELSEN, L., WATTENHOFER, R., AND WELTEN, S. Have a snack, pay with Bitcoins. In Peerto-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on (2013), IEEE, pp. 1–5.
[6] BELLARE, M., AND ROGAWAY, P. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computer and communications security (1993), ACM, pp. 62–73.
[7] BITCOIN COMMUNITY. Bitcoin source. https://github.com/bitcoin/bitcoin, retrieved Mar. 2015.
[8] BITCOIN COMMUNITY. Protocol rules. https://en.bitcoin.it/wiki/Protocol_rules, retrieved Sep. 2013.
[9] BITCOIN COMMUNITY. Protocol specification. https://en.bitcoin.it/wiki/Protocol_specification, retrieved Sep. 2013.
[10] BLOCKTRAIL. BlockTrail API. https://www.blocktrail.com/api/docs#api_data, retrieved Sep. 2015.
[11] BONNEAU, J., MILLER, A., CLARK, J., NARAYANAN, A., KROLL, J. A., AND FELTEN, E. W. Research perspectives on
Bitcoin and second-generation cryptocurrencies. In Symposium on Security and Privacy (San Jose, CA, USA, 2015), IEEE.
[12] BUTERIN, V. A next generation smart contract & decentralized application platform. https://www.ethereum.org/pdfs/EthereumWhitePaper.pdf/, retrieved Feb. 2015, 2013.
[13] BUTERIN, V. Slasher: A punitive proof-of-stake algorithm. https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-stake-algorithm/, January 2015.
[14] CNNMONEY STAFF. The Ashley Madison hack...in 2 minutes. http://money.cnn.com/2015/08/24/technology/ashley-madison-hack-in-2-minutes/, retrieved Sep. 2015.
[15] COINDESK. Bitcoin venture capital. http://www.coindesk.com/bitcoin-venture-capital/, retrieved Sep. 2015.
[16] COLORED COINS PROJECT. Colored Coins. http://coloredcoins.org/, retrieved Sep. 2015.
[17] CORALLO, M. High-speed Bitcoin relay network. http://sourceforge.net/p/bitcoin/mailman/message/31604935/, November 2013.
[18] DECKER, C., AND WATTENHOFER, R. Information propagation in the Bitcoin network. In IEEE P2P (Trento, Italy, 2013).
[19] DECKER, C., AND WATTENHOFER, R. A fast and scalable payment network with Bitcoin Duplex Micropayment Channels. In Stabilization, Safety, and Security of Distributed Systems - 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings (2015), Springer, pp. 3–18.
[20] DWORK, C., LYNCH, N. A., AND STOCKMEYER, L. J. Consensus in the presence of partial synchrony. J. ACM 35, 2 (1988), 288–323.
[21] EYAL, I. The miner’s dilemma. In IEEE Symposium on Security and Privacy (2015), pp. 89–103.
[22] EYAL, I., BIRMAN, K., AND VAN RENESSE, R. Cache serializability: Reducing inconsistency in edge transactions. In 35th IEEE International Conference on Distributed Computing Systems (2015), pp. 686–695.
[23] EYAL, I., GENCER, A. E., SIRER, E. G., AND VAN RENESSE, R. Bitcoin-ng: A scalable blockchain protocol. arXiv preprint arXiv:1510.02037 (2015).
[24] EYAL, I., AND SIRER, E. G. Bitcoin is broken. http://hackingdistributed.com/2013/11/04/bitcoin-is-broken/, 2013.
[25] EYAL, I., AND SIRER, E. G. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security (2014).
[26] GARAY, J. A., KIAYIAS, A., AND LEONARDOS, N. The Bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (2015), pp. 281–310.
[27] GARCIA-MOLINA, H. Elections in a distributed computing system. Computers, IEEE Transactions on 100, 1 (1982), 48–59.
[28] HEARN, M., AND SPILMAN, J. Rapidly-adjusted (micro)payments to a pre-determined party. https://en.bitcoin.it/wiki/Contract, retrieved Sep. 2015.
[29] HEILMAN, E., KENDLER, A., ZOHAR, A., AND GOLDBERG, S. Eclipse attacks on Bitcoin’s peer-to-peer network. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. (2015), pp. 129–144.
[30] KARAME, G. O., ANDROULAKI, E., AND CAPKUN, S. Doublespending fast payments in bitcoin. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (2012), CCS ’12, ACM, pp. 906–917.
[31] KOSBA, A., MILLER, A., SHI, E., WEN, Z., AND PAPAMANTHOU, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Cryptology ePrint Archive, Report 2015/675, 2015. http://eprint.iacr.org/.
[32] KROLL, J. A., DAVEY, I. C., AND FELTEN, E. W. The economics of Bitcoin mining or, Bitcoin in the presence of adversaries. In Workshop on the Economics of Information Security (2013).
[33] LAMPORT, L. Using time instead of timeout for fault-tolerant distributed systems. ACM Transactions on Programming Languages and Systems 6, 2 (Apr. 1984), 254–280.
[34] LE LANN, G. Distributed systems-towards a formal approach. In IFIP Congress (1977), vol. 7, Toronto, pp. 155–160.
[35] LEWENBERG, Y., BACHRACH, Y., SOMPOLINSKY, Y., ZOHAR, A., AND ROSENSCHEIN, J. S. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (2015), International Foundation for Autonomous Agents and Multiagent Systems, pp. 919–927.
[36] LEWENBERG, Y., SOMPOLINSKY, Y., AND ZOHAR, A. Inclusive block chain protocols. In Financial Cryptography (Puerto Rico, 2015).
[37] LITECOIN PROJECT. Litecoin, open source P2P digital currency. https://litecoin.org, retrieved Nov. 2014. USENIX Association 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16) 59
[38] MEIKLEJOHN, S., POMAROLE, M., JORDAN, G., LEVCHENKO, K., MCCOY, D., VOELKER, G. M., AND SAVAGE, S. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 Internet Measurement Conference, IMC 2013, Barcelona, Spain, October 23-25, 2013 (2013), pp. 127–140.
[39] MILLER, A., AND JANSEN, R. Shadow-Bitcoin: Scalable simulation via direct execution of multi-threaded applications. IACR Cryptology ePrint Archive 2015 (2015), 469.
[40] MILLER, A., AND JR., L. J. J. Anonymous Byzantine consensus from moderately-hard puzzles: A model for Bitcoin. https://socrates1024.s3.amazonaws.com/consensus.pdf, 2009.
[41] MILLER, A., LITTON, J., PACHULSKI, A., GUPTA, N., LEVIN, D., SPRING, N., AND BHATTACHARJEE, B. Preprint: Discovering Bitcoins public topology and influential nodes. http://cs.umd.edu/projects/coinscope/coinscope.pdf, 2015.
[42] MORARU, I., ANDERSEN, D. G., AND KAMINSKY, M. Egalitarian Paxos. In ACM Symposium on Operating Systems Principles (2012).
[43] NAKAMOTO, S. Bitcoin: A peer-to-peer electronic cash system. http://www.bitcoin.org/bitcoin.pdf, 2008.
[44] NAYAK, K., KUMAR, S., MILLER, A., AND SHI, E. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. IACR Cryptology ePrint Archive 2015 (2015), 796.
[45] PAZMINO˜ , J. E., AND DA SILVA RODRIGUES, C. K. Simply dividing a Bitcoin network node may reduce transaction verification time. The SIJ Transactions on Computer Networks and Communication Engineering (CNCE) 3, 2 (February 2015), 17–21.
[46] PEASE, M. C., SHOSTAK, R. E., AND LAMPORT, L. Reaching agreement in the presence of faults. J. ACM 27, 2 (1980), 228–234.
[47] PECK, M. E. Adam Back says the Bitcoin fork is a coup. http://spectrum.ieee.org/tech-talk/computing/networks/the-bitcoin-for-is-a-coup, Aug 2015.
[48] POON, J., AND DRYJA, T. The Bitcoin Lightning Network. http://lightning.network/lightning-network.pdf, February 2015. Draft 0.5.
[49] SAPIRSHTEIN, A., SOMPOLINSKY, Y., AND ZOHAR, A. Optimal selfish mining strategies in Bitcoin. CoRR abs/1507.06183 (2015).
[50] SCHNEIDER, F. B. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys 22, 4 (Dec. 1990), 299–319.
[51] SOMPOLINSKY, Y., AND ZOHAR, A. Accelerating Bitcoin’s transaction processing. fast money grows on trees, not chains. In Financial Cryptography (Puerto Rico, 2015).
[52] SOMPOLINSKY, Y., AND ZOHAR, A. Secure high-rate transaction processing in Bitcoin. In Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (2015), pp. 507–527.
[53] STATHAKOPOULOU, C. A faster Bitcoin network. Tech. rep., ETH, Zurich, January 2015. Semester Thesis, supervised by C. Decker and R. Wattenhofer.
[54] SWANSON, E. Bitcoin mining calculator. http://www.alloscomp.com/bitcoin/calculator, retrieved Sep. 2013.
[55] THE BITCOIN COMMUNITY. Release notes, bitcoin 0.12.0. https://github.com/bitcoin/bitcoin/blob/0.12/doc/release-notes.md, Feb 2012.
[56] THE ETHEREUM COMMUNITY. Ethereum white paper. https://github.com/ethereum/wiki/wiki/White-Paper, retrieved July. 2015.
[57] WIKIPEDIA. List of cryptocurrencies. https://en.wikipedia.org/wiki/List_of_cryptocurrencies, retrieved Oct. 2013.

Bitcoin-NG論文を見てみる19 ←← 前)|(最初に戻る →→ Bitcoin-NG論文を見てみる1




-, , ,

Copyright© 暗号通貨界隈のメモ書きなど。 , 2024 All Rights Reserved Powered by STINGER.