论文标题

MAD-HTLC:因为HTLC是疯狂的攻击

MAD-HTLC: Because HTLC is Crazy-Cheap to Attack

论文作者

Tsabary, Itay, Yechieli, Matan, Manuskin, Alex, Eyal, Ittay

论文摘要

智能合约和交易使用户可以在比特币和以太坊等加密货币区块链上实施精心设计的结构。这些结构中有许多,包括运营支付渠道和原子掉期,使用了一个名为Hashed Time锁定合同(HTLC)的构件。 在这项工作中,我们从HTLC A规范(HTLC-Spec)中提取,并提出了一种称为相互保证的降落障碍的实施,哈希散布了时间锁定合同(MAD-HTLC)。 MAD-HTLC采用了一种新颖的方法来利用现有的区块链操作员(称为矿工)作为设计的一部分。如果用户表现不佳,MAD-HTLC激励矿工没收她的所有资金。我们使用UC框架和游戏理论分析证明了MAD-HTLC的安全性。我们证明了MAD-HTLC的功效,并通过将比特币和以太坊的操作区块链实例化来分析其开销。 值得注意的是,由于优势相对较小,因此当前的矿工软件仅几乎没有付出优化收入。但是,随着需求的增长和其他收入组成部分的缩小,矿工更有动力地充分优化其基金摄入量。通过修补标准比特币客户端,我们证明了这种优化易于实施,这使矿工的自然执行者是MAD-HTLC的自然执行者。 最后,我们扩展了有关HTLC脆弱性贿赂攻击的先前结果。攻击者可以通过提供高交易费用来激励矿工更喜欢她的交易。我们证明,可以通过修补比特币客户端来轻松实施这一攻击,并使用游戏理论工具在存在理性矿工的情况下定性地收紧此类贿赂攻击的已知成本。我们确定了在比特币和以太坊主网络上发生的贿赂机会,其中几美元贿赂可能会产生数万美元的奖励(例如,超过$ 25K的$ 2)。

Smart Contracts and transactions allow users to implement elaborate constructions on cryptocurrency blockchains like Bitcoin and Ethereum. Many of these constructions, including operational payment channels and atomic swaps, use a building block called Hashed Time-Locked Contract (HTLC). In this work, we distill from HTLC a specification (HTLC-Spec), and present an implementation called Mutual-Assured-Destruction Hashed Time-Locked Contract (MAD-HTLC). MAD-HTLC employs a novel approach of utilizing the existing blockchain operators, called miners, as part of the design. If a user misbehaves, MAD-HTLC incentivizes the miners to confiscate all her funds. We prove MAD-HTLC's security using the UC framework and game-theoretic analysis. We demonstrate MAD-HTLC's efficacy and analyze its overhead by instantiating it on Bitcoin's and Ethereum's operational blockchains. Notably, current miner software makes only little effort to optimize revenue, since the advantage is relatively small. However, as the demand grows and other revenue components shrink, miners are more motivated to fully optimize their fund intake. By patching the standard Bitcoin client, we demonstrate such optimization is easy to implement, making the miners natural enforcers of MAD-HTLC. Finally, we extend previous results regarding HTLC vulnerability to bribery attacks. An attacker can incentivize miners to prefer her transactions by offering high transaction fees. We demonstrate this attack can be easily implemented by patching the Bitcoin client, and use game-theoretic tools to qualitatively tighten the known cost bound of such bribery attacks in presence of rational miners. We identify bribe opportunities occurring on the Bitcoin and Ethereum main networks where a few dollars bribe could yield tens of thousands of dollars in reward (e.g., \$2 for over \$25K).

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源