Abstract

The Nervos CKB (Common Knowledge Base) is a public permissionless blockchain designed for the Nervos ecosystem. The CKB consensus protocol is the key protocol of the Nervos CKB, which improves the limit of the consensus’s performance for Bitcoin. In this paper, we developed the formal model of the CKB consensus protocol using timed automata. Based on the model, we formally verified various important properties of the Nervos CKB to provide a sufficient trustworthiness assurance. Especially, the security of the Nervos CKB against the selfish mining attacks to the protocol was investigated.

Highlights

  • Blockchains are distributed digital ledgers for which there are numerous benefits such as decentralization, persistency, and anonymity

  • We propose the formal model of the Common Knowledge Base (CKB) consensus protocol using timed automata

  • The work in this paper is an extension of our previous studies [14,15], where we initially discussed the formal models of the CKB block synchronization protocol and consensus protocol, respectively, and the verification of some important properties of these two protocols

Read more

Summary

Introduction

Blockchains are distributed digital ledgers for which there are numerous benefits such as decentralization, persistency, and anonymity. The protocol aims to overcome the two drawbacks of Bitcoin consensus: the low transaction processing throughput and the vulnerability to selfish mining attacks. It limits the time of connecting the sender in the search of a lost transaction. The work in this paper is an extension of our previous studies [14,15], where we initially discussed the formal models of the CKB block synchronization protocol and consensus protocol, respectively, and the verification of some important properties of these two protocols. We further improved the formal models of the CKB consensus protocol and investigated its robustness against malicious attacks, especially selfish mining attacks.

The Nervos Network
CKB Consensus Protocol
Selfish Mining Attack
The Formal Model of the CKB Consensus Protocol
Two-Step Automaton
Full Node Automaton
Miner Automaton
Block-Propagation Mechanism
Verification of the CKB Consensus Protocol in UPPAAL
Consistency and Robustness Analysis with Attacks
Related Work
Findings
Conclusions and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.