all InfoSec news
Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection. (arXiv:2305.16757v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Several blockchain consensus protocols proposed to use of Directed Acyclic
Graphs (DAGs) to solve the limited processing throughput of traditional
single-chain Proof-of-Work (PoW) blockchains. Many such protocols utilize a
random transaction selection (RTS) strategy (e.g., PHANTOM, GHOSTDAG, SPECTRE,
Inclusive, and Prism) to avoid transaction duplicates across parallel blocks in
DAG and thus maximize the network throughput. However, previous research has
not rigorously examined incentive-oriented greedy behaviors when transaction
selection deviates from the protocol. In this work, we first perform a …
attacks blockchain blockchains graphs pow protocols random single spectre strategy transaction work