November 11 – 16 , 2018, Dagstuhl Seminar 18461

Blockchain Security at Scale


Rainer Böhme (Universität Innsbruck, AT)
Joseph Bonneau (New York University, US)
Ittay Eyal (Technion – Haifa, IL)

For support, please contact

Susanne Bach-Bernhard for administrative matters

Shida Kunz for scientific matters

Dagstuhl Reports

As part of the mandatory documentation, participants are asked to submit their talk abstracts, working group results, etc. for publication in our series Dagstuhl Reports via the Dagstuhl Reports Submission System.


List of Participants
Shared Documents
Dagstuhl Seminar Wiki
Dagstuhl Seminar Schedule [pdf]

(Use seminar number and access code to log in)


The security of blockchain-based systems has attracted great interest in the research community following the initial financial success of Bitcoin. Several security notions for blockchain-based systems have been proposed, varying in degree of formality and applicability to real-world systems. However, a major blind spot remains about the environment surrounding blockchain-based systems. This environment is typically assumed to be static (irresponsive to activities of the blockchain system). This is a sound starting point for security analysis while the stakes involved are small compared to the environment (i. e., the global economic and political system). However, if blockchain-based systems truly offer compelling advantages over legacy systems, they may eventually become the dominant form of organizing certain social choice problems. This „scale change“ challenges the assumption that the blockchain-based system remains below the threshold of relevance for the parts of its environment that are vital for its security. One instance where this may already occur is the influence of mining puzzles on hardware design and electricity prices.

The purpose of this Dagstuhl Seminar is to bring together researchers with expertise in various subfields of blockchain-based systems to jointly revisit security foundations. The primary goal is to incorporate explicit consideration of reciprocity effects between properties of cryptocurrency protocols and their environment.

The primary intended outcome of this seminar is proposing a new principle of protocol design, viewing security as a key scalability property to consider in addition to performance and efficiency. Second, the seminar will aim to converge on standard terminology for security notions that are robust to scale. Third, we will apply this new methodology to Bitcoin specifically as a test case, producing a sort-of „break glass in case of rampant runaway growth“ security plan.

Specific questions are:

  1. From micro-level to macro-level incentives: Bitcoin's ecosystem remains small relative to large multinational corporations. What happens to incentives when a cryptocurrency reaches a scale similar to large national economies?<
  2. Cryptographic agility: How does the ability to upgrade cryptographic algorithms might change in the future as cryptocurrency protocols become widely embedded in hardware and/or codified in the law?
  3. Reciprocity effects on hardware design: How will the hardware industry be affected by the increasing importance of superior hardware for mining, and possibly trusted execution environments (TEE) in the future?
  4. Mining economics at scale: How will mining economics change in the future, in particular, dynamics between miners at large-scale power consumption levels, with mass availability of cheap commodity mining hardware (including TEE-based), and with different incentives, e.g., in a high-valued fee-only revenue model.
  5. Reconsidering non-monetary incentives: Can cryptocurrencies be resilient to disruptive nation-level attacks that are not due to monetary incentives?
  6. Governance at scale: To date, cryptocurrencies largely rely on informal leadership from a small group of influential software developers. Can this be translated into a more democratic model? What does democratic control mean for a cryptocurrency when the demos is not clearly defined?

  Creative Commons BY 3.0 DE
  Rainer Böhme, Joseph Bonneau, and Ittay Eyal


  • Data Structures / Algorithms / Complexity
  • Modelling / Simulation
  • Security / Cryptology


  • Distributed consensus protocols
  • Authenticated data structures
  • Blockchain technology
  • Security foundations
  • Security economics

Book exhibition

Books from the participants of the current Seminar 

Book exhibition in the library, ground floor, during the seminar week.


In the series Dagstuhl Reports each Dagstuhl Seminar and Dagstuhl Perspectives Workshop is documented. The seminar organizers, in cooperation with the collector, prepare a report that includes contributions from the participants' talks together with a summary of the seminar.


Download overview leaflet (PDF).


Furthermore, a comprehensive peer-reviewed collection of research papers can be published in the series Dagstuhl Follow-Ups.

Dagstuhl's Impact

Please inform us when a publication was published as a result from your seminar. These publications are listed in the category Dagstuhl's Impact and are presented on a special shelf on the ground floor of the library.

NSF young researcher support