Blockchain Scribes
Blockchain Scribes
2) Selfish Mining :
Do not reveal the block immediately.A selfish miner will maintain their own private chain, and pub-
licly reveal it opportunistically in order to obtain greater rewards that would normally be granted
based on their computing power to the mining pool.
3) Undercutting :
It is a mining strategy which involves producing new blocks not on the longest known chain, but
instead ’undercutting’ the longest chain by building a block, which collects less of the available
transactions fees, on a shorter chain. This behavior creates a direct incentive for another miner to
now build new blocks on the ’undercutting’ chain as there exist a higher sum of transactions fees
for them to collect.
1
2 Introduction
Storing bitcoins is all about storing and managing Bitcoin secret keys. Different approaches to key
management offer different trade-offs between availability, security and convenience. The simplest
key management method is to store them in a file on your own local device: your computer, phone, or
some other kind of gadget that you carry, own, or control. But this option is not great for availability
or security if you lose the device, if the device crashes and you have to wipe the disk, or if your file
gets corrupted, your keys are lost, and so are your coins. Similarly for security: if someone steals or
breaks into your device, or infects it with malware, she can copy your keys and then send all your
coins to herself. So what we do is store a little bit of information - a little bit of our money - in our
wallet and keep most of our money somewhere else.
Figure 1
2
5 Vanity Addresses
Some individuals or merchants like to have an address that starts with some humanly meaningful
text. For example, the gambling website Satoshi Bones has users send money to addresses containing
the string ”bones” in positions 2–6, such as 1bonesEeT-cABPjLzAb1VkFgySY6Zqu3sX. Addresses
are outputs of a hash function, which produces random-looking data, so how did the string ”bones”
get in there? If Satoshi Bones were simply making up these addresses, lacking the ability to invert
hash functions, they wouldn’t know the corresponding private keys and hence wouldn’t actually
control those addresses. Instead, they repeatedly generated private keys until they got lucky and
found one that hashed to this pattern. Such addresses are called vanity addresses, and there are
tools to generate them.
4. Cannot store on laptop or mobile which we use to connect to the internet as they may get lost
or may be hacked.
If we have only one public key private key pair, then all the money is accessible every time and thus
is prone to be stolen.
6.2 Proposals
6.2.1 Paper Wallet
We can print the key material to paper and then put that paper in a safe or other secure place.
Obviously, the security of this method is just as good or bad as the physical security of the paper
that we’re using. Both the public and private keys can be encoded in base-58 notation. Storing a
small amount of key material is sufficient to re-create a wallet.
3
6.2.2 Brain Wallet
The second method we can use is called a brain wallet. This method controls access to bitcoins
using nothing but a secret passphrase.The key trick behind a brain wallet is to have a predictable
algorithm for turning a passphrase into a public and a private key.We can then generate an entire
sequence of addresses and private keys from a passphrase, thus enabling a complete wallet.
However, an adversary can also obtain all private keys in a brain wallet if he can guess the passphrase.
So the adversary can try various passphrases and generate addresses using them, This is called the
Dictionary attack. Now if he finds any unspent transactions on the block chain at any of those
addresses, he can immediately transfer them to himself.
Furthermore, unlike the task of guessing your email password, which can be rate-limited by your
email server (called online guessing), with brain wallets, the attacker can download the list of ad-
dresses with unredeemed coins and try as many potential passphrases as he has the computational
capacity to check. Note that the attacker doesn’t need to know which addresses correspond to brain
wallets. This is called offline guessing or password cracking.
Generating Memorable Passphrases
One passphrase-generation procedure that gives about 80 bits of entropy is to pick a random se-
quence of six words from among the 10,000 most common English words (6 · log 2 (10000) is roughly
80). Many people find these easier to memorize than a random string of characters.
4
generation includes Hardware wallets. Modern Hardware wallet providers are Ledger Nano S, Trezor,
KeepKey, Mycelium (an Android app) etc. Still, it is required to generate address. Any compromise
on access to private key may lead to stealing of all your bitcoins! This gives the notion of splitting
the keys.
Good: Store shares separately, adversary must compromise several shares to get the key
Bad: To sign, need to bring shares together and reconstruct the key which may become vulnerable
at that point. For this, we have an option for avoiding this single point failure.
Multi-signatures
This lets you keep shares apart and approve transactions without reconstructing the key at any
point.Here, we collect money to script(Pay2Script). N keys are generated and coins can be redeemed
only if K out of N sign.