An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding

Bitcoin was launched in 2009, becoming the world’s first ever decentralized digital currency. It uses a publicly distributed ledger called the blockchain to record the transaction history of the network. The Bitcoin network is structured as a decentralized peer-to-peer network, where there are no central or supernodes, and all peers are seen as equal. Nodes in the network do not have a complete view of the entire network and are only aware of the nodes that they are directly connected to. In order to propagate information across the network, Bitcoin implements a gossip-based flooding protocol. However, the current flooding protocol is inefficient and wasteful, producing a number of redundant and duplicated messages. In this paper, we present an alternative approach to the current flooding protocol implemented by Bitcoin. We propose a novel protocol that changes the current flooding protocol to a probabilistic flooding approach. Our approach allows nodes to maintain certain probabilities of sending information to their neighbours, based on previous message exchanges between the nodes. Our experimental evaluation shows a reduction in the number of duplicated messages received by each node in the network and the total number of messages exchanged in the network, whilst ensuring that the reliability and resilience of the system were not negatively affected.

[1]  Bruce M. Kapron,et al.  On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes , 2016, IACR Cryptol. ePrint Arch..

[2]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[3]  Laurent George,et al.  BTCmap: Mapping Bitcoin Peer-to-Peer Network Topology , 2018, 2018 IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).

[4]  William George,et al.  Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[5]  Hitesh Tewari,et al.  Alt-PoW: An Alternative Proof-of-Work Mechanism , 2019, 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON).

[6]  R. Manoharan,et al.  Security Enhancement In Bitcoin Protocol , 2018, 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[7]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[8]  Hassan Barjini,et al.  SmoothFlood: Decreasing redundant messages and increasing search quality of service in peer-to-peer networks , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).

[9]  Mo Adda,et al.  A Bitcoin Model for Evaluation of Clustering to Improve Propagation Delay in Bitcoin Network , 2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES).

[10]  Suman Ghimire,et al.  A Survey on Bitcoin Cryptocurrency and its Mining , 2018, 2018 26th International Conference on Systems Engineering (ICSEng).

[11]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[12]  Se Jin Park,et al.  Network Usage of Bitcoin Full Node , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[13]  Alfred Menezes,et al.  Elliptic Curve Cryptography , 2005, Encyclopedia of Cryptography and Security.

[14]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[15]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[16]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[17]  Pramod Viswanath,et al.  Anonymity Properties of the Bitcoin P2P Network , 2017, ArXiv.

[18]  Paulo Martins,et al.  TrustZone-backed bitcoin wallet , 2017, CS2@HiPEAC.

[19]  Jennifer Seberry,et al.  HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.

[20]  Andrew Miller,et al.  Discovering Bitcoin ’ s Public Topology and Influential Nodes , 2015 .

[21]  Luís E. T. Rodrigues,et al.  Adaptive information dissemination in the Bitcoin network , 2019, SAC.

[22]  Mo Adda,et al.  Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[23]  Lei Zhang,et al.  An Intelligent Strategy to Gain Profit for Bitcoin Mining Pools , 2017, 2017 10th International Symposium on Computational Intelligence and Design (ISCID).

[24]  Ghassan O. Karame,et al.  Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..

[25]  Mahdi H. Miraz,et al.  Atomic Cross-Chain Swaps: Development, Trajectory and Potential of Non-Monetary Digital Token Swap Facilities , 2019, SSRN Electronic Journal.

[26]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.