What is Meant by Permissionless Blockchains?

The term permissionless has established itself within the context of blockchain and distributed ledger research to characterize protocols and systems that exhibit similar properties to Bitcoin. However, the notion of what is meant by permissionlessness is often vague or left implicit within the various literature, rendering it imprecise and hard to compare. We hereby shed light onto this topic by revising research that either incorporates or defines the term permissionless and systematically expose the properties and characteristics that its utilization intends to capture. Based on this review, we highlight current shortcomings and blind spots within the available definitions. In particular, the ability to freely perform transactions between users is often not adequately incorporated and different actor roles are left unspecified. Furthermore, the topics of privacy and governance appear to be largely overlooked.

[1]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[2]  Hannes Hartenstein,et al.  Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin , 2019, Financial Cryptography.

[3]  Hubert Ritzdorf,et al.  TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing , 2018, NDSS.

[4]  Jeremy Clark,et al.  SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain , 2019, Financial Cryptography Workshops.

[5]  Jason Teutsch,et al.  SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.

[6]  George Danezis,et al.  Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers , 2018, NDSS.

[7]  Srdjan Capkun,et al.  Snappy: Fast On-chain Payments with Practical Collaterals , 2020, NDSS.

[8]  Emin Gün Sirer,et al.  Selfish Mining Re-Examined , 2020, Financial Cryptography.

[9]  Ari Juels,et al.  Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges , 2019, ArXiv.

[10]  Yuliang Zheng,et al.  Security of the Blockchain against Long Delay Attack , 2018, IACR Cryptol. ePrint Arch..

[11]  Ueli Maurer,et al.  Bitcoin as a Transaction Ledger: A Composable Treatment , 2017, CRYPTO.

[12]  Stefan Dziembowski,et al.  Multi-party Virtual State Channels , 2019, EUROCRYPT.

[13]  Peng Gao,et al.  HyperService: Interoperability and Programmability Across Heterogeneous Blockchains , 2019, CCS.

[14]  Sreeram Kannan,et al.  Prism: Deconstructing the Blockchain to Approach Physical Limits , 2019, CCS.

[15]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[16]  Daniel Slamanig,et al.  Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based , 2019, NDSS.

[17]  Christopher Carr,et al.  Security Properties of Light Clients on the Ethereum Blockchain , 2020, IEEE Access.

[18]  Massimo Bartoletti,et al.  BitML: A Calculus for Bitcoin Smart Contracts , 2018, IACR Cryptol. ePrint Arch..

[19]  Elaine Shi,et al.  The Sleepy Model of Consensus , 2017, ASIACRYPT.

[20]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[21]  Bernhard Haslhofer,et al.  A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares , 2019, ArXiv.

[22]  Bart Preneel,et al.  Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[23]  Ghassan O. Karame,et al.  BITE: Bitcoin Lightweight Client Privacy using Trusted Execution , 2018, IACR Cryptol. ePrint Arch..

[24]  Min Suk Kang,et al.  A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[25]  Petar Tsankov,et al.  Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.

[26]  Srinivas Devadas,et al.  Transparency Logs via Append-Only Authenticated Dictionaries , 2019, IACR Cryptol. ePrint Arch..

[27]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[28]  Rami Khalil,et al.  Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..

[29]  Pawel Szalachowski,et al.  StrongChain: Transparent and Collaborative Proof-of-Work Consensus , 2019, USENIX Security Symposium.

[30]  Fan Zhang,et al.  Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware , 2017, IACR Cryptol. ePrint Arch..

[31]  Vincent Gramoli,et al.  The Attack of the Clones against Proof-of-Authority , 2019, NDSS.

[32]  Giulio Malavolta,et al.  SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks , 2017, NDSS.

[33]  Benjamin Livshits,et al.  Broken Metre: Attacking Resource Metering in EVM , 2019, NDSS.

[34]  Aggelos Kiayias,et al.  Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era , 2020, EUROCRYPT.

[35]  Mariana Raykova,et al.  RapidChain: A Fast Blockchain Protocol via Full Sharding , 2018, IACR Cryptol. ePrint Arch..

[36]  Edgar R. Weippl,et al.  Merged Mining: Curse or Cure? , 2017, DPM/CBT@ESORICS.

[37]  Alexei Zamyatin,et al.  XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[38]  Edgar R. Weippl,et al.  Agreement with Satoshi - On the Formalization of Nakamoto Consensus , 2018, IACR Cryptol. ePrint Arch..

[39]  Bernardo Magri,et al.  Redactable Blockchain in the Permissionless Setting , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[40]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[41]  Tong Cao,et al.  Exploring the Monero Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..

[42]  Dan Boneh,et al.  Zether: Towards Privacy in a Smart Contract World , 2020, IACR Cryptol. ePrint Arch..

[43]  Sukrit Kalra,et al.  ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.

[44]  Pedro Moreno-Sanchez,et al.  Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks , 2019, IACR Cryptol. ePrint Arch..

[45]  Ittay Eyal,et al.  The Gap Game , 2018, SYSTOR.

[46]  Elaine Shi,et al.  Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..

[47]  Nickolai Zeldovich,et al.  Vault: Fast Bootstrapping for the Algorand Cryptocurrency , 2019, NDSS.

[48]  Pedro Moreno-Sanchez,et al.  SoK: Layer-Two Blockchain Protocols , 2020, Financial Cryptography.

[49]  Shen Noether,et al.  Ring SIgnature Confidential Transactions for Monero , 2015, IACR Cryptol. ePrint Arch..

[50]  Ten-Hwang Lai,et al.  OPERA: Open Remote Attestation for Intel's Secure Enclaves , 2019, CCS.

[51]  Marko Vukolic,et al.  The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.

[52]  Jan Camenisch,et al.  Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain , 2017, CCS.

[53]  Abhi Shelat,et al.  Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.

[54]  Giulio Malavolta,et al.  Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.

[55]  Abhi Shelat,et al.  A Better Method to Analyze Blockchain Consistency , 2018, CCS.

[56]  Edgar R. Weippl,et al.  Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..

[57]  Srinivas Devadas,et al.  Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[58]  Elaine Shi,et al.  The Honey Badger of BFT Protocols , 2016, CCS.

[59]  Kari Kostiainen,et al.  PRCash: Fast, Private and Regulated Transactions for Digital Currencies , 2019, Financial Cryptography.

[60]  Alex Norta,et al.  Designing a Smart-Contract Application Layer for Transacting Decentralized Autonomous Organizations , 2016, ICACDS.

[61]  Philipp Jovanovic,et al.  OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[62]  Prateek Saxena,et al.  OHIE: Blockchain Scaling Made Simple , 2018, 2020 IEEE Symposium on Security and Privacy (SP).

[63]  Ari Juels,et al.  Order-Fairness for Byzantine Consensus , 2020, IACR Cryptol. ePrint Arch..

[64]  Sourav Das,et al.  YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes , 2019, NDSS.

[65]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[66]  Srdjan Capkun,et al.  ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution , 2019, IACR Cryptol. ePrint Arch..

[67]  Stake Shift in Major Cryptocurrencies: An Empirical Study , 2020, Financial Cryptography.

[68]  Fan Zhang,et al.  REM: Resource-Efficient Mining for Blockchains , 2017, IACR Cryptol. ePrint Arch..

[69]  David Cerezo Sánchez Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..

[70]  Emin Gün Sirer,et al.  Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.

[71]  Carmela Troncoso,et al.  Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments , 2017, Proc. Priv. Enhancing Technol..

[72]  Wessel Reijers,et al.  Now the Code Runs Itself: On-Chain and Off-Chain Governance of Blockchain Technologies , 2018, Topoi.