Tuesday, January 1, 2019

Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains

arXiv:1812.10792

Date: 2018-12-27

Author(s): Daniel Fullmer, A. S. Morse

Link to Paper

Abstract

This paper presents a stochastic model for block arrival times based on the difficulty retargeting rule used in Bitcoin, as well as other proof-of-work blockchains. Unlike some previous work, this paper explicitly models the difficulty target as a random variable which is a function of the previous block arrival times and affecting the block times in the next retargeting period. An explicit marginal distribution is derived for the time between successive blocks (the blocktime), while allowing for randomly changing difficulty. This paper also aims to serve as an introduction to Bitcoin and proof-of-work blockchains for the controls community, focusing on the difficulty retargeting procedure used in Bitcoin.

References

[1] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” www.bitcoin.org, p. 9, 2008.

[2] D. Kraft, “Difficulty control for blockchain-based consensus systems,” Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397–413, 2016.

[3] R. Bowden, H. P. Keeler, A. E. Krzesinski, and P. G. Taylor, “Block arrivals in the Bitcoin blockchain,” arXiv:1801.07447, Jan. 2018.

[4] A. Cox, “Some Statistical Methods Connected with Series of Events,” Journal of the Royal Statistical Society. Series B (Methodological), vol. 17, no. 2, pp. 129–164, 1955.

[5] F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.

[6] C. Dwork and M. Naor, “Pricing via Processing or Combatting Junk Mail,” in Advances in Cryptology - CRYPTO’ 92, pp. 139–147, Berlin, Heidelberg: Springer Berlin Heidelberg, 1993.

[7] A. Back, “Hashcash - A Denial of Service Counter-Measure,” www.hashcash.org/papers/hashcash.pdf, no. August, pp. 1–10, 2002.

[8] N. I. o. S. and Technology, “Specifications for the Secure Hash Standard - FIPS PUB 180-2,” Computing, vol. 2, pp. 1–71, 2002.

[9] R. Gallager, Stochastic processes: theory for applications. 2013.

[10] N. L. Johnson, S. Kotz, and N. Balakrishnan, Continuous Univariate Distributions, Vol. 1, vol. 2. Wiley-Interscience, 2nd ed., 1994.


No comments:

Post a Comment