{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:45:25Z","timestamp":1765547125258,"version":"build-2065373602"},"reference-count":20,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T00:00:00Z","timestamp":1686873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62162039","61762060","20YF3GA016"],"award-info":[{"award-number":["62162039","61762060","20YF3GA016"]}]},{"name":"Foundation for the Key Research and Development Program of Gansu Province, China","award":["62162039","61762060","20YF3GA016"],"award-info":[{"award-number":["62162039","61762060","20YF3GA016"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>In the blockchain network, the communication delay between different nodes is a great threat to the distributed ledger consistency of each miner. Blockchain is the core technology of Bitcoin. At present, some research has proven the security of the PoW protocol when the number of delay rounds is small, but in complex asynchronous networks, the research is insufficient on the security of the PoW protocol when the number of delay rounds is large. This paper improves the proposed blockchain main chain record model under the PoW protocol and then proposes the TOD model, which makes the main chain record in the model more close to the actual situation and reduces the errors caused by the establishment of the model in the analysis process. By comparing the differences between the TOD model and the original model, it is verified that the improved model has a higher success rate of attack when the probability of mining the delayable block increases. Then, the long delay attack is improved on the balance attack in this paper, which makes the adversary control part of the computing power and improves the success rate of the adversary attack within a certain limit.<\/jats:p>","DOI":"10.3390\/cryptography7020032","type":"journal-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T02:02:20Z","timestamp":1686880940000},"page":"32","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Research on PoW Protocol Security under Optimized Long Delay Attack"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1611-9017","authenticated-orcid":false,"given":"Tao","family":"Feng","sequence":"first","affiliation":[{"name":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6602-7802","authenticated-orcid":false,"given":"Yufeng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Longo, R., Mascia, C., Meneghetti, A., Santilli, G., and Tognolini, G. (2022). Adaptable Cryptographic Primitives in Blockchains via Smart Contracts. Cryptography, 6.","DOI":"10.3390\/cryptography6030032"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Romano, D., and Schmid, G. (2021). Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology. Cryptography, 5.","DOI":"10.20944\/preprints202110.0259.v1"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez, V.G., Hern\u00e1ndez-\u00c1lvarez, L., and Encinas, L.H. (2020). Analysis of the Cryptographic Tools for Blockchain and Bitcoin. Mathematics, 8.","DOI":"10.3390\/math8010131"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Caldarola, F., d\u2019Atri, G., and Zanardo, E. (2022). Neural Fairness Blockchain Protocol Using an Elliptic Curves Lottery. Mathematics, 10.","DOI":"10.3390\/math10173040"},{"key":"ref_5","unstructured":"Heilman, E., Kendler, A., Zohar, A., and Goldberg, S. (2015, January 12\u201314). Eclipse Attacks on Bitcoin\u2019s Peer-to-Peer Network. Proceedings of the 24th USENIX Security Symposium, Washington, DC, USA."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Douceur, J.R. (2002, January 7\u20138). The Sybil Attack. Proceedings of the Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Yang, X., Chen, Y., and Chen, X. (2019, January 14\u201317). Effective Scheme against 51% attack on proof-of-Work Blockchain with History Weighted Information. Proceedings of the IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA.","DOI":"10.1109\/Blockchain.2019.00041"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"109435","DOI":"10.1016\/j.comnet.2022.109435","article-title":"SRRS: A blockchain fast propagation protocol based on non-Markovian process","volume":"219","author":"Wang","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Trom, J. (2015, January 26\u201330). Cuckoo cycle: A memory bound graph-theoretic proof-of-work. Proceedings of the International Conference on Financial Cryptography and Data Security, San Juan, Puerto Rico.","DOI":"10.1007\/978-3-662-48051-9_4"},{"key":"ref_10","unstructured":"Pass, R., Seeman, L., and Shelat, A. (May, January 30). Analysis of the blockchain protocol in asynchronous networks. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Gazi, P., Kiayias, A., and Russell, A. (2020, January 9\u201313). Tight consistency bounds for bitcoin. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/3372297.3423365"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dembo, A., Kannan, S., Tas, E.N., Tse, D., Viswanath, P., Wang, X., and Zeitouni, O. (2020, January 9\u201313). Everything is a race and Nakamoto always wins. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/3372297.3417290"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wei, P.W., Yuan, Q., and Zheng, Y.L. (2018, January 2\u20136). Security of the blockchain protocol against long delay attack. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia.","DOI":"10.1007\/978-3-030-03332-3_10"},{"key":"ref_14","first-page":"436","article-title":"Majority is not enough: Bitcoin mining is vulnerable","volume":"Volume 8437","author":"Eyal","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref_15","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., and Renesse, R.V. (2016, January 16\u201318). Bitcoin-NG: Ascalable blockchain protocol. Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, Santa Clara, CA, USA."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Sompolinsky, Y., and Zohar, A. (2015, January 26\u201330). Secure high-rate transaction processing in bitcoin. Proceedings of the International Conference on Financial Cryptography and Data Security, San Juan, Puerto Rico.","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., and Shi, E. (2016, January 21\u201324). Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. Proceedings of the IEEE European Symposium on Security & Privacy, Saarbruecken, Germany.","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref_18","unstructured":"Kiayas, A., and Panagiotakos, G. (2023, June 05). Speed-Security Tradeoffs in Blockchain Protocols. IACR ePrint Archive Report. Available online: https:\/\/eprint.iacr.org\/2015\/1019."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Garay, J., Kiayias, A., and Leonardos, N. (2017, January 20\u201324). The Bitcoin Backbone Protocol with Chains of Variable Difficulty. Proceedings of the International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"ref_20","unstructured":"Natoli, C., and Granmoli, V. (2016). The balance attack against proof-of-work blockchains: The R3 testbed as an example. In Computing Research Repository. arXiv."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/32\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:56:06Z","timestamp":1760126166000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,16]]},"references-count":20,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["cryptography7020032"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7020032","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2023,6,16]]}}}