On the Security of the Dandelion Protocol

In this paper, we review the peer-to-peer blockchain transaction protocol, Dandelion, and develop an oracle-based model for its network and security. We formalize a series of security and functional criteria, such as unforgeability, non-repudiation, and immutability, into security experiments. In ou...

Full description

Bibliographic Details
Main Authors: Brian Goncalves, Atefeh Mashatan
Format: Article
Language:English
Published: MDPI AG 2022-03-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/10/7/1054
Description
Summary:In this paper, we review the peer-to-peer blockchain transaction protocol, Dandelion, and develop an oracle-based model for its network and security. We formalize a series of security and functional criteria, such as unforgeability, non-repudiation, and immutability, into security experiments. In our model, we consider a quantum-capable adversary who seeks to undermine any of the security criteria while using oracles to simulate and interact with the Dandelion network. We then prove the security of Dandelion in our model with a series of (tight) security reductions as our main result. In addition, we prove that Dandelion is resistant to double-spending attacks.
ISSN:2227-7390