Security of Client Consensus

Abstract

Overview

The Blockchain Is Ordered, Timestamped Messages

The Blockchain Is Unordered, Valid, Non-conflicting Messages

Repercussions of Client Consensus

Silent Fork

Consensus Ambiguity

Differentiation of SPV and Validity

Stronger SPV

Trust-based Light Client Security Model

Upgrading Software

Attacks Against Partial SPV Clients that use Client Consensus

CPU/network Exhaustion Attack

Parallel Construction Attack

Parallel Construction Spray Attack

Conclusion

References

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store