http://www.dagstuhl.de/18461

11. – 16. November 2018, Dagstuhl Seminar 18461

Blockchain Security at Scale

Organisatoren

Rainer Böhme (Universität Innsbruck, AT)
Joseph Bonneau (Stanford University, US)
Ittay Eyal (Technion – Haifa, IL)

Auskunft zu diesem Dagstuhl Seminar erteilen

Susanne Bach-Bernhard zu administrativen Fragen

Andreas Dolzmann zu wissenschaftlichen Fragen

Motivation

The security of blockchain-based systems has attracted great interest in the research community following the initial financial success of Bitcoin. Several security notions for blockchain-based systems have been proposed, varying in degree of formality and applicability to real-world systems. However, a major blind spot remains about the environment surrounding blockchain-based systems. This environment is typically assumed to be static (irresponsive to activities of the blockchain system). This is a sound starting point for security analysis while the stakes involved are small compared to the environment (i. e., the global economic and political system). However, if blockchain-based systems truly offer compelling advantages over legacy systems, they may eventually become the dominant form of organizing certain social choice problems. This „scale change“ challenges the assumption that the blockchain-based system remains below the threshold of relevance for the parts of its environment that are vital for its security. One instance where this may already occur is the influence of mining puzzles on hardware design and electricity prices.

The purpose of this Dagstuhl Seminar is to bring together researchers with expertise in various subfields of blockchain-based systems to jointly revisit security foundations. The primary goal is to incorporate explicit consideration of reciprocity effects between properties of cryptocurrency protocols and their environment.

The primary intended outcome of this seminar is proposing a new principle of protocol design, viewing security as a key scalability property to consider in addition to performance and efficiency. Second, the seminar will aim to converge on standard terminology for security notions that are robust to scale. Third, we will apply this new methodology to Bitcoin specifically as a test case, producing a sort-of „break glass in case of rampant runaway growth“ security plan.

Specific questions are:

  1. From micro-level to macro-level incentives: Bitcoin's ecosystem remains small relative to large multinational corporations. What happens to incentives when a cryptocurrency reaches a scale similar to large national economies?<
  2. Cryptographic agility: How does the ability to upgrade cryptographic algorithms might change in the future as cryptocurrency protocols become widely embedded in hardware and/or codified in the law?
  3. Reciprocity effects on hardware design: How will the hardware industry be affected by the increasing importance of superior hardware for mining, and possibly trusted execution environments (TEE) in the future?
  4. Mining economics at scale: How will mining economics change in the future, in particular, dynamics between miners at large-scale power consumption levels, with mass availability of cheap commodity mining hardware (including TEE-based), and with different incentives, e.g., in a high-valued fee-only revenue model.
  5. Reconsidering non-monetary incentives: Can cryptocurrencies be resilient to disruptive nation-level attacks that are not due to monetary incentives?
  6. Governance at scale: To date, cryptocurrencies largely rely on informal leadership from a small group of influential software developers. Can this be translated into a more democratic model? What does democratic control mean for a cryptocurrency when the demos is not clearly defined?

License
  Creative Commons BY 3.0 DE
  Rainer Böhme, Joseph Bonneau, and Ittay Eyal

Classification

  • Data Structures / Algorithms / Complexity
  • Modelling / Simulation
  • Security / Cryptology

Keywords

  • Distributed consensus protocols
  • Authenticated data structures
  • Blockchain technology
  • Security foundations
  • Security economics

Buchausstellung

Bücher der Teilnehmer 

Buchausstellung im Erdgeschoss der Bibliothek

(nur in der Veranstaltungswoche).

Dokumentation

In der Reihe Dagstuhl Reports werden alle Dagstuhl-Seminare und Dagstuhl-Perspektiven-Workshops dokumentiert. Die Organisatoren stellen zusammen mit dem Collector des Seminars einen Bericht zusammen, der die Beiträge der Autoren zusammenfasst und um eine Zusammenfassung ergänzt.

 

Download Übersichtsflyer (PDF).

Publikationen

Es besteht weiterhin die Möglichkeit, eine umfassende Kollektion begutachteter Arbeiten in der Reihe Dagstuhl Follow-Ups zu publizieren.

Dagstuhl's Impact

Bitte informieren Sie uns, wenn eine Veröffentlichung ausgehend von
Ihrem Seminar entsteht. Derartige Veröffentlichungen werden von uns in der Rubrik Dagstuhl's Impact separat aufgelistet  und im Erdgeschoss der Bibliothek präsentiert.