A. Decentralization and Policymaking
C. Brief Evaluations per Layer
E. Fault Tolerance and Decentralization
Our main contribution is the systematization of the rather fragmented body of literature related to decentralization into a unified framework, under which the decentralization of any distributed ledger can be analyzed. Table 1 summarizes our methodology, i.e., the layers that comprise a ledger and the relevant resources and parties that guarantee its core properties. Removing single points of failure via a diverse distribution of resources across independent parties is critical in guaranteeing security, privacy, and stability and can also have legal implications (cf. Appendix A). Our work also opens various research threads.
First, even though we do not treat off-chain “Layer 2” protocols [95] as a distinct stratum, our methodology can be readily applied to a combination of Layer 1 (main chain) and Layer 2 protocols. For example, one could apply our layering methodology on a combination of Bitcoin and the Lightning Network [145] and assess the decentralization of the combined system as a payment network. Similarly, our methodology can assess blockchain-based “decentralized applications” (DApps), e.g., DeFi systems.[23] Investigating the decentralization of Layer 2 protools or DApps via our methodology is thus a promising research thread.
Second, exploring the relationship between decentralization and fault tolerance, as well as the settings where decentralization is beneficial and those where it is not, is another interesting topic of future research.[24]
Third, we offer a framework for analyzing blockchain decentralization, but not specific quantitative metrics. A compelling direction for future work is systematically identifying the right metrics for each layer to capture all relevant aspects of blockchain decentralization.[25] Building on this, a natural end-goal of all questions posed above is producing a quantitative blockchain decentralization index. Historically, it has been observed that increasing decentralization on one axis coincides with, or even results in, centralization on another [158]. Future work should further explore the dynamics between all layers, resolve possibly inescapable trade-offs, determine the importance (weight) that should be assigned to each layer and each metric, and efficiently combine them into an index.
Albert, R., Barab´asi, A.L.: Statistical mechanics of complex networks. Reviews of modern physics 74(1), 47 (2002)
Allen, D.W., Berg, C., Lane, A.M.: Trust and governance in collective blockchain treasuries. Available at SSRN (2021)
Alston, E.: Constitutions and blockchains: Competitive governance of fundamental rule sets. Case Western Reserve Journal of Law, Technology & the Internet 11(4) (2019)
Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: Routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy. pp. 375– IEEE Computer Society Press, San Jose, CA, USA (May 22–26, 2017). https://doi.org/10.1109/SP.2017.2
Araya, D.: The promise of bitcoin: An interview with andreas m. antonopoulos (2016), https://futurism.com/promise-bitcoin-interview-andreas-mantonopoulos
Arrow, K.J.: A difficulty in the concept of social welfare. Journal of political economy 58(4), 328–346 (1950)
Ateniese, G., Kiayias, A., Magri, B., Tselekounis, Y., Venturi, D.: Secure outsourcing of cryptographic circuits manufacturing. In: Baek, J., Susilo, W., Kim, J. (eds.) ProvSec 2018: 12th International Conference on Provable Security. Lecture Notes in Computer Science, vol. 11192, pp. 75–93. Springer, Heidelberg, Germany, Jeju, South Korea (Oct 25–28, 2018). https://doi.org/10.1007/978-3-030-01446-9_5
Atkinson, A.B., et al.: On the measurement of inequality. Journal of economic theory 2(3), 244–263 (1970)
Avan-Nomayo, O.: Bitcoin.org blocks access to bitcoin software download in the uk (2021), https://cointelegraph.com/news/bitcoin-org-blocksaccess-to-bitcoin-software-download-in-the-uk
Avarikioti, G., K¨appeli, L., Wang, Y., Wattenhofer, R.: Bitcoin security under temporary dishonest majority. In: Goldberg, I., Moore, T. (eds.) Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science, vol. 11598, pp. 466–483. Springer (2019). https://doi.org/10.1007/978-3-030-32101-7_28, https://doi.org/10.1007/978-3-030-32101-7_28
Azouvi, S., Maller, M., Meiklejohn, S.: Egalitarian society or benevolent dictatorship: The state of cryptocurrency governance. In: Zohar, A., Eyal, I., Teague, V., Clark, J., Bracciali, A., Pintore, F., Sala, M. (eds.) FC 2018 Workshops. Lecture Notes in Computer Science, vol. 10958, pp. 127–143. Springer, Heidelberg, Germany, Nieuwpoort, Cura¸cao (Mar 2, 2019). https://doi.org/10.1007/978-3-662-58820-8_10
Badertscher, C., Gazi, P., Kiayias, A., Russell, A., Zikas, V.: Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018: 25th Conference on Computer and Communications Security. pp. 913–930. ACM Press, Toronto, ON, Canada (Oct 15–19, 2018). https://doi.org/10.1145/3243734.3243848
Badertscher, C., Gaˇzi, P., Kiayias, A., Russell, A., Zikas, V.: Consensus redux: Distributed ledgers in the face of adversarial supremacy. Cryptology ePrint Archive, Report 2020/1021 (2020), https://eprint.iacr.org/2020/1021
Bao, Z., Wang, Q., Shi, W., Wang, L., Lei, H., Chen, B.: When blockchain meets sgx: An overview, challenges, and open issues. IEEE Access 8, 170404–170420 (2020)
Baran, P.: On distributed communications networks. IEEE transactions on Communications Systems 12(1), 1–9 (1964)
Bastiat, F.: Popular Fallacies regarding General Interests; being a translation of the “Sophismes ´economiques”... With notes by GR Porter [the translator]. John Murray (1846)
17. Beck, R., M¨uller-Bloch, C., King, J.L.: Governance in the blockchain economy: A framework and research agenda. Journal of the Association for Information Systems 19(10), 1 (2018)
18. Bendiksen, C.S., Gibbons, S., Lim, E.: The bitcoin mining network-trends , composition , marginal creation cost , electricity consumption & sources (2018), https://api.semanticscholar.org/CorpusID:149451309
19. Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memoryhard functions for password hashing and other applications. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P). pp. 292–302. IEEE (2016)
20. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Ahn, G.J., Yung, M., Li, N. (eds.) ACM CCS 2014: 21st Conference on Computer and Communications Security. pp. 15–29. ACM Press, Scottsdale, AZ, USA (Nov 3–7, 2014). [https://doi.org/10.1145/ 2660267.2660379](https://doi.org/10.1145/ 2660267.2660379 )
21. Bitwise Asset Management: Analysis of real bitcoin trade volume (2019), [https://www.sec.gov/comments/sr-nysearca-2019-01/srnysearca201901- 5164833-183434.pdf](https://www.sec.gov/comments/sr-nysearca-2019-01/srnysearca201901- 5164833-183434.pdf )
22. Bod´o, B., Brekke, J.K., Hoepman, J.H.: Decentralisation: a multidisciplinary perspective. Internet Policy Review 10(2), 1–21 (2021)
23. Bod´o, B., Giannopoulou, A.: The logics of technology decentralization–the case of distributed ledger technologies. Blockchain and web 3 (2019)
24. Boneh, D., Bonneau, J., B¨unz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology – CRYPTO 2018, Part I. Lecture Notes in Computer Science, vol. 10991, pp. 757–788. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug 19–23, 2018). https://doi.org/10.1007/978-3-319-96884-1_25
25. Bonneau, J., Heninger, N. (eds.): FC 2020: 24th International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 12059. Springer, Heidelberg, Germany, Kota Kinabalu, Malaysia (Feb 10–14, 2020)
26. Bonneau, J., Meckler, I., Rao, V., Shapiro, E.: Coda: Decentralized cryptocurrency at scale. Cryptology ePrint Archive, Report 2020/352 (2020), https://eprint.iacr.org/2020/352
27. Brewer, E.: Cap twelve years later: How the” rules” have changed. Computer 45(2), 23–29 (2012)
28. Br¨unjes, L., Kiayias, A., Koutsoupias, E., Stouka, A.: Reward sharing schemes for stake pools. In: IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020. pp. 256–275. IEEE (2020). https://doi.org/10.1109/EuroSP48549.2020.00024, https://doi.org/10.1109/EuroSP48549.2020.00024
29. BTI Verified: 2020 market data integrity report (2020), <https://web.archive. org/web/20211009155412/> https://btiverified.com/crypto-market-datareport-2020/
30. B¨unz, B., Kiffer, L., Luu, L., Zamani, M.: FlyClient: Super-light clients for cryptocurrencies. In: IEEE S&P 2020 [91], pp. 928–946. [https://doi.org/10.1109/ SP40000.2020.00049](https://doi.org/10.1109/ SP40000.2020.00049 )
31. Buterin, V.: On stake (2014), https://blog.ethereum.org/2014/07/05/stake
32. Buterin, V.: Hard fork completed (2016), <https://blog.ethereum.org/2016/07/ 20/hard-fork-completed/>
33. Buterin, V.: Two-slot proposer/builder separation (2021), https://ethresear.ch/t/two-slot-proposer-builder-separation/10980
34. Cambridge Centre for Alternative Finance: Cambridge bitcoin electricity consumption index (cbeci): Bitcoin mining map (2022), https://ccaf.io/cbeci/mining_map
35. Cao, T., Yu, J., Decouchant, J., Luo, X., Ver´ıssimo, P.: Exploring the monero peer-to-peer network. In: Bonneau and Heninger [25], pp. 578–594. https://doi.org/10.1007/978-3-030-51280-4_31
36. Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.): ACM CCS 2019: 26th Conference on Computer and Communications Security. ACM Press (Nov 11–15, 2019)
37. cdetrio: Ropsten revival (2017), https://github.com/ethereum/ropsten/blob/master/revival.md
38. Cevallos, A., Stewart, A.: A verifiably secure and proportional committee election rule. In: Baldimtsi, F., Roughgarden, T. (eds.) AFT ’21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26 - 28, 2021. pp. 29–42. ACM (2021). https://doi.org/10.1145/3479722.3480988, https://doi.org/10.1145/3479722.3480988
39. Chatzigiannis, P., Baldimtsi, F., Chalkias, K.: Sok: Blockchain light clients. In: International Conference on Financial Cryptography and Data Security. pp. 615– 641. Springer (2022)
40. Chen, J., Gorbunov, S., Micali, S., Vlachos, G.: ALGORAND AGREEMENT: Super fast and partition resilient byzantine agreement. Cryptology ePrint Archive, Report 2018/377 (2018), https://eprint.iacr.org/2018/377
41. Chen, T., Li, Z., Zhu, Y., Chen, J., Luo, X., Lui, J.C.S., Lin, X., Zhang, X.: Understanding ethereum via graph analysis. ACM Transactions on Internet Technology (TOIT) 20(2), 1–32 (2020)
42. Cheng, L., Zhu, F., Liu, H., Miao, C.: On decentralization of bitcoin: An asset perspective (2021)
43. Cho, H.: Asic-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols. IEEE Access 6, 66210–66222 (2018)
44. Choi, J., Choi, W., Aiken, W., Kim, H., Huh, J.H., Kim, T., Kim, Y., Anderson, R.: Attack of the clones: Measuring the maintainability, originality and security of bitcoin’forks’ in the wild. arXiv preprint arXiv:2201.08678 (2022)
45. CoinYuppie: It’s time to formally face the centralization problem that infura brings (2022)
46. Commodity Futures Trading Commission: Cftc orders coinbase inc. to pay $6.5 million for false, misleading, or inaccurate reporting and wash trading (2021), https://www.cftc.gov/media/5796/enfcoinbaseorder031921/download
47. Cook, C.: Introducing the blockstream satellite base station (2021)
48. Core, B.: Cve-2018-17144 full disclosure (2018), <https://bitcoincore.org/en/ 2018/09/20/notice/>
49. Coretti, S., Kiayias, A., Moore, C., Russell, A.: The generalsˆa€™ scuttlebutt: Byzantine-resilient gossip protocols. IACR Cryptol. ePrint Arch. p. 541 (2022), https://eprint.iacr.org/2022/541
50. Daian, P., Pass, R., Shi, E.: Snow white: Robustly reconfigurable consensus and applications to provably secure proof of stake. In: Goldberg and Moore [84], pp. 23–41. https://doi.org/10.1007/978-3-030-32101-7_2
51. Daveas, S., Karantias, K., Kiayias, A., Zindros, D.: A gas-efficient superlight bitcoin client in solidity. Cryptology ePrint Archive, Report 2020/927 (2020), https://eprint.iacr.org/2020/927
52. David, B., Gazi, P., Kiayias, A., Russell, A.: Ouroboros praos: An adaptivelysecure, semi-synchronous proof-of-stake blockchain. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology – EUROCRYPT 2018, Part II. Lecture Notes in Computer Science, vol. 10821, pp. 66–98. Springer, Heidelberg, Germany, Tel Aviv, Israel (Apr 29 – May 3, 2018). <https://doi.org/10.1007/978-3-319- 78375-8_3>
53. Deb, S., Kannan, S., Tse, D.: Posat: Proof-of-work availability and unpredictability, without the work. In: Borisov, N., D´ıaz, C. (eds.) Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II. Lecture Notes in Computer Science, vol. 12675, pp. 104–128. Springer (2021). <https://doi.org/10.1007/978-3-662- 64331-0_6>, https://doi.org/10.1007/978-3-662-64331-0_6
54. Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013, Trento, Italy, September 9-11, 2013, Proceedings. pp. 1–10. IEEE (2013). <https://doi.org/10.1109/P2P.2013.6688704, https://doi.org/10.1109/P2P.2013. 6688704>
55. Delgado-Segura, S., Bakshi, S., P´erez-Sol`a, C., Litton, J., Pachulski, A., Miller, A., Bhattacharjee, B.: TxProbe: Discovering bitcoin’s network topology using orphan transactions. In: Goldberg and Moore [84], pp. 550–566. [https://doi.org/10. 1007/978-3-030-32101-7_32](https://doi.org/10. 1007/978-3-030-32101-7_32 )
56. Dfinity: Node provider machine hardware guide - internet computer wiki, [https://wiki.internetcomputer.org/wiki/Node_Provider_Machine_ Hardware_Guide](https://wiki.internetcomputer.org/wiki/Node_Provider_Machine_ Hardware_Guide )
57. Dickey, C.G., Grothoff, C.: Bootstrapping of peer-to-peer networks. In: 2008 International Symposium on Applications and the Internet. pp. 205–208. IEEE (2008)
58. Donet, J.A.D., P´erez-Sol`a, C., Herrera-Joancomart´ı, J.: The bitcoin P2P network. In: B¨ohme, R., Brenner, M., Moore, T., Smith, M. (eds.) Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science, vol. 8438, pp. 87–102. Springer (2014). <https://doi.org/10. 1007/978-3-662-44774-1_7>, https://doi.org/10.1007/978-3-662-44774-1_7
59. Dotan, M., Pignolet, Y.A., Schmid, S., Tochner, S., Zohar, A.: Survey on blockchain networking: Context, state-of-the-art, challenges. ACM Comput. Surv. 54(5) (may 2021). https://doi.org/10.1145/3453161, [https://doi.org/10. 1145/3453161](https://doi.org/10. 1145/3453161 )
60. Downs, A., et al.: An economic theory of democracy (1957)
61. Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: Fast internet-wide scanning and its security applications. In: King, S.T. (ed.) USENIX Security 2013: 22nd USENIX Security Symposium. pp. 605–620. USENIX Association, Washington, DC, USA (Aug 14–16, 2013)
62. Ekblaw, A., Barabas, C., Harvey-Buschel, J., Lippman, A.: Bitcoin and the myth of decentralization: Socio-technical proposals for restoring network integrity. In: 2016 IEEE 1st international workshops on foundations and applications of self* systems (FAS* W). pp. 18–23. IEEE (2016)
63. Erdos, P., R´enyi, A., et al.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci 5(1), 17–60 (1960)
64. Ethereum: Ethash (2022), [https://ethereum.org/en/developers/docs/ consensus-mechanisms/pow/mining-algorithms/ethash/](https://ethereum.org/en/developers/docs/ consensus-mechanisms/pow/mining-algorithms/ethash/ )
65. Ethereum: The merge (2022), https://ethereum.org/en/upgrades/merge
European Securities and Markets Authority: Initial coin offerings and crypto-assets. Innovation and Products ESMA50-157-1391 (2019), https://www.esma.europa.eu/sites/default/files/library/esma50-157-1391_crypto_advice.pdf
of the European Union, C.: Proposal for a regulation of the european parliament and of the council on markets in crypto-assets, and amending directive (eu) 2019/1937 (mica) (2022), https://data.consilium.europa.eu/doc/document/ST-13198-2022-INIT/en/pdf
Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018). https://doi.org/10.1145/3212998, https://doi.org/10.1145/3212998
Feld, S., Sch¨onfeld, M., Werner, M.: Analyzing the deployment of bitcoin’s P2P network under an as-level perspective. In: Shakshuki, E.M., Yasar, A. (eds.) Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies (ANT 2014), the 4th International Conference on Sustainable Energy Information Technology (SEIT-2014), Hasselt, Belgium, June 2- 5, 2014. Procedia Computer
Science, vol. 32, pp. 1121–1126. Elsevier (2014). https://doi.org/10.1016/j.procs.2014.05.542, https://doi.org/10.1016/j.procs.2014.05.542
Financial Stability Board: Crypto-asset markets. Potential channels for future financial stability implications 10 (2018), https://www.fsb.org/wp-content/uploads/P101018.pdf
Financial Stability Board: Decentralised financial technologies: Report on financial stability, regulatory and governance implications. June 6, 2019 (2019), https://www.fsb.org/wp-content/uploads/P060619.pdf
Franceschi-Bicchierai, L.: People can’t see some nfts on twitter, crypto wallets after opensea goes down (2022), https://www.vice.com/en/article/g5qjej/people-cant-see-some-nfts-in-crypto-wallets-after-opensea-goes-down
Franzoni, F., Abellan, I., Daza, V.: Leveraging bitcoin testnet for bidirectional botnet command and control systems. In: Bonneau and Heninger [25], pp. 3–19. https://doi.org/10.1007/978-3-030-51280-4_1
Franzoni, F., Salleras, X., Daza, V.: Atom: Active topology monitoring for the bitcoin peer-to-peer network. Peer-to-Peer Networking and Applications 15(1), 408–425 (2022)
Fuller, B., Khan, J.: Cve-2018-17145: Bitcoin inventory out-of-memory denial-of-service attack (2020), https://invdos.net/paper/CVE-201817145.pdf
Gao, Y., Shi, J., Wang, X., Tan, Q., Zhao, C., Yin, Z.: Topology measurement and analysis on ethereum P2P network. In: 2019 IEEE Symposium on Computers and Communications, ISCC 2019, Barcelona, Spain, June 29 - July 3, 2019. pp. 1–IEEE (2019). https://doi.org/10.1109/ISCC47284.2019.8969695, https://doi.org/10.1109/ISCC47284.2019.8969695
Garay, J.A., Kiayias, A.: SoK: A consensus taxonomy in the blockchain era. In: Jarecki [93], pp. 284–318. https://doi.org/10.1007/978-3-030-40186-3_13
Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: Analysis and applications. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology– EUROCRYPT 2015, Part II. Lecture Notes in Computer Science, vol. 9057, pp. 281–310. Springer, Heidelberg, Germany, Sofia, Bulgaria (Apr 26–30, 2015). https://doi.org/10.1007/978-3-662-46803-6_10
Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol with chains of variable difficulty. In: Katz and Shacham [102], pp. 291–323. https://doi.org/10.1007/978-3-319-63688-7_10
Garay, J.A., Kiayias, A., Panagiotakos, G.: Consensus from signatures of work. In: Jarecki [93], pp. 319–344. https://doi.org/10.1007/978-3-030-40186-3_14
Gaˇzi, P., Kiayias, A., Russell, A.: Stake-bleeding attacks on proof-of-stake blockchains. Cryptology ePrint Archive, Report 2018/248 (2018), https://eprint.iacr.org/2018/248
Gencer, A.E., Basu, S., Eyal, I., van Renesse, R., Sirer, E.G.: Decentralization in bitcoin and Ethereum networks. In: Meiklejohn, S., Sako, K. (eds.) FC 2018: 22nd International Conference on Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 10957, pp. 439–457. Springer, Heidelberg, Germany, Nieuwpoort, Cura¸cao (Feb 26 – Mar 2, 2018). https://doi.org/10.1007/978-3-662-58387-6_24
Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE Secur. Priv. 12(3), 54–60 (2014). https://doi.org/10.1109/MSP.2014.49, https://doi.org/10.1109/MSP.2014.49
Goldberg, I., Moore, T. (eds.): FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. Springer, Heidelberg, Germany, Frigate Bay, St. Kitts and Nevis (Feb 18– 22, 2019)
Goodkind, N.: World’s richest people now own 11% of global wealth, marking the biggest leap in recent history (2021), https://fortune.com/2021/12/07/worldsrichest-inequality-richer-during-pandemic/
Hajdarbegovic, N.: Bitcoin miners ditch ghash.io pool over fears of 51% attack (2014), https://www.coindesk.com/markets/2014/01/09/bitcoinminers-ditch-ghashio-pool-over-fears-of-51-attack/
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: Jung, J., Holz, T. (eds.) USENIX Security 2015: 24th USENIX Security Symposium. pp. 129–144. USENIX Association, Washington, DC, USA (Aug 12–14, 2015)
Heimbach, L., Kiffer, L., Torres, C.F., Wattenhofer, R.: Ethereum’s proposerbuilder separation: Promises and realities. arXiv preprint arXiv:2305.19037 (2023)
Hern, A.: $300m in cryptocurrency accidentally lost forever due to bug (2017), https://www.theguardian.com/technology/2017/nov/08/cryptocurrency300m-dollars-stolen-bug-ether
Hinman, W.: Digital asset transactions: When howey met gary (plastic) (2018), https://www.sec.gov/news/speech/speech-hinman-061418
2020 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, San Francisco, CA, USA (May 18–21, 2020)
IO, EOS: Eos. io technical white paper v2. EOS, Tech. Rep (2018)
Jarecki, S. (ed.): Topics in Cryptology – CT-RSA 2020, Lecture Notes in Computer Science, vol. 12006. Springer, Heidelberg, Germany, San Francisco, CA, USA (Feb 24–28, 2020)
Johnson, N.L.: Diversity in decentralized systems: Enabling self-organizing solutions. In: Decentralization II Conference, UCLA. vol. 4. Citeseer (1999)
Jourenko, M., Kurazumi, K., Larangeira, M., Tanaka, K.: SoK: A taxonomy for layer-2 scalability related protocols for cryptocurrencies. Cryptology ePrint Archive, Report 2019/352 (2019), https://eprint.iacr.org/2019/352
Kanjalkar, S., Kuo, J., Li, Y., Miller, A.: Short paper: I can’t believe it’s not stake! Resource exhaustion attacks on PoS. In: Goldberg and Moore [84], pp. 62–69. https://doi.org/10.1007/978-3-030-32101-7_4
Kappos, G., Yousaf, H., Maller, M., Meiklejohn, S.: An empirical analysis of anonymity in zcash. In: Enck, W., Felt, A.P. (eds.) USENIX Security 2018: 27th USENIX Security Symposium. pp. 463–477. USENIX Association, Baltimore, MD, USA (Aug 15–17, 2018)
Karakostas, D., Karayannidis, N., Kiayias, A.: Efficient state management in distributed ledgers. Cryptology ePrint Archive, Report 2021/183 (2021), https://eprint.iacr.org/2021/183
Karakostas, D., Kiayias, A., Nasikas, C., Zindros, D.: Cryptocurrency egalitarianism: A quantitative approach. In: Danos, V., Herlihy, M., Potop-Butucaru, M., Prat, J., Piergiovanni, S.T. (eds.) International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2019, May 6-7, 2019, Paris, France. OASIcs, vol. 71, pp. 7:1–7:21. Schloss Dagstuhl - Leibniz-Zentrum f¨ur Informatik (2019). https://doi.org/10.4230/OASIcs.Tokenomics.2019.7, https://doi.org/10.4230/OASIcs.Tokenomics.2019.7
Karantias, K.: Sok: A taxonomy of cryptocurrency wallets. Cryptology ePrint Archive (2020)
Kattis, A., Bonneau, J.: Proof of necessary work: Succinct state verification with fairness guarantees. Cryptology ePrint Archive, Report 2020/190 (2020), https: //eprint.iacr.org/2020/190
Katz, J., Shacham, H. (eds.): Advances in Cryptology – CRYPTO 2017, Part I, Lecture Notes in Computer Science, vol. 10401. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug 20–24, 2017)
Kerber, T., Kiayias, A., Kohlweiss, M.: Mining for privacy: How to bootstrap a snarky blockchain. In: Borisov, N., D´ıaz, C. (eds.) Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part I. Lecture Notes in Computer Science, vol. 12674, pp. 497–514. Springer (2021). https://doi.org/10.1007/978-3-662-64322-8_24, https://doi.org/10.1007/978-3-662-64322-8_24
Kiayias, A., Lazos, P.: Sok: Blockchain governance. CoRR abs/2201.07188 (2022), https://arxiv.org/abs/2201.07188
Kiayias, A., Miller, A., Zindros, D.: Non-interactive proofs of proof-of-work. Cryptology ePrint Archive, Report 2017/963 (2017), https://eprint.iacr.org/2017/963
Kiayias, A., Polydouri, A., Zindros, D.: The velvet path to superlight blockchain clients. Cryptology ePrint Archive, Report 2020/1122 (2020), https://eprint.iacr.org/2020/1122
Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Katz and Shacham [102], pp. 357–388. https://doi.org/10.1007/978-3-319-63688-7_12
Kiayias, A., Stouka, A.: Coalition-safe equilibria with virtual payoffs. In: Baldimtsi, F., Roughgarden, T. (eds.) AFT ’21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26 - 28, 2021. pp. 71–85. ACM (2021). https://doi.org/10.1145/3479722.3480795, https://doi.org/10.1145/3479722.3480795
Kohler, S., Pizzol, M.: Life cycle assessment of bitcoin mining. Environmental science & technology 53(23), 13598–13606 (2019)
Kohlweiss, M., Maller, M., Siim, J., Volkhov, M.: Snarky ceremonies. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology – ASIACRYPT 2021, Part III. Lecture Notes in Computer Science, vol. 13092, pp. 98–127. Springer, Heidelberg, Germany, Singapore (Dec 6–10, 2021). https://doi.org/10.1007/978-3-030-92078-4_4
Konstantinov, E.: The ethereum cloud vs. on-premises nodes conundrum (2019), https://chainstack.com/the-ethereum-cloud-vs-on-premisesnodes-conundrum SoK: A Stratified Approach to Blockchain Decentralization 29
Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Annual symposium on theoretical aspects of computer science. pp. 404–413. Springer (1999)
Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of WEIS. vol. 2013. Washington, DC (2013)
Kwon, J., Buchman, E.: Cosmos whitepaper. A Netw. Distrib. Ledgers 27 (2019)
Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4(3), 382–401 (1982)
Leiba, O.: Unveiling bigspender: Double (and multiple) spend vulnerability in major bitcoin wallets (2020), https://zengo.com/bigspender-double-spendvulnerability-in-bitcoin-wallets/
Li, C., Palanisamy, B.: Comparison of decentralization in dpos and pow blockchains. CoRR abs/2002.02082 (2020), https://arxiv.org/abs/2002.02082
Li, W., Andreina, S., Bohli, J.M., Karame, G.: Securing proof-of-stake blockchain protocols. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp. 297–315. Springer (2017)
Lin, Q., Li, C., Zhao, X., Chen, X.: Measuring decentralization in bitcoin and ethereum using multiple metrics and granularities. In: 2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW). pp. 80–87. IEEE (2021)
Loe, A.F., Quaglia, E.A.: You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques. In: Cavallaro et al. [36], pp. 2231– 2247. https://doi.org/10.1145/3319535.3345649
Magaki, I., Khazraee, M., Gutierrez, L.V., Taylor, M.B.: Asic clouds: Specializing the datacenter. ACM SIGARCH Computer Architecture News 44(3), 178–190 (2016)
Mariem, S.B., Casas, P., Romiti, M., Donnet, B., St¨utz, R., Haslhofer, B.: All that glitters is not bitcoin–unveiling the centralized nature of the btc (ip) network. In: NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium. pp. 1–9. IEEE (2020)
Marlinspike, M.: My first impressions of web3. Moxie Marlinspike’s Website (2022), https://moxie.org/2022/01/07/web3-first-impressions.html
Matt, C., Nielsen, J.B., Thomsen, S.E.: Formalizing delayed adaptive corruptions and the security of flooding networks. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part II. Lecture Notes in Computer Science, vol. 13508, pp. 400–430. Springer (2022). https://doi.org/10.1007/978-3-031-15979-4_14, https://doi.org/10.1007/978-3-031-15979-4_14
Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: International Workshop on Peer-to-Peer Systems. pp. 53–65. Springer (2002)
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. Commun. ACM 59(4), 86–93 (2016). https://doi.org/10.1145/2896384, https://doi.org/10.1145/2896384
Milewski, K.: Cftc, fincen, and sec warn of crypto aml enforcement (2019), https://www.natlawreview.com/article/cftc-fincen-and-sec-warncrypto-aml-enforcement Monero: Network upgrade and release 0.15 (2019), https://www.getmonero.org/2019/10/01/announcement-release-0-15.html
Moore, T., Christin, N.: Beware the middleman: Empirical analysis of bitcoinexchange risk. In: Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers 17. pp. 25–33. Springer (2013)
Motamed, A.P., Bahrak, B.: Quantitative analysis of cryptocurrencies transaction graph. Applied Network Science 4(1), 1–21 (2019)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)
Naumenko, G., Maxwell, G., Wuille, P., Fedorova, A., Beschastnikh, I.: Erlay: Efficient transaction relay for bitcoin. In: Cavallaro et al. [36], pp. 817–831. https://doi.org/10.1145/3319535.3354237
Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). pp. 358–367. IEEE (2016)
Neudecker, T., Hartenstein, H.: Network layer aspects of permissionless blockchains. IEEE Communications Surveys & Tutorials 21(1), 838–857 (2018)
Newman, M.E.: The structure and function of complex networks. SIAM review 45(2), 167–256 (2003)
Nikolaenko, V., Ragsdale, S., Bonneau, J., Boneh, D.: Powers-of-tau to the people: Decentralizing setup ceremonies. Cryptology ePrint Archive (2022)
Nomics: Nomics’ crypto trust index - q1 2021, north america (2021), https://nomics.com/blog/essays/q1-crypto-trust-index
O’Leary, R.R.: The race is on to replace ethereum’s most centralized layer (2018), https://www.coindesk.com/markets/2018/12/05/the-race-ison-to-replace-ethereums-most-centralized-layer/
Pass, R., Seeman, L., shelat, a.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.S., Nielsen, J.B. (eds.) Advances in Cryptology – EUROCRYPT 2017, Part II. Lecture Notes in Computer Science, vol. 10211, pp. 643–673. Springer, Heidelberg, Germany, Paris, France (Apr 30 – May 4, 2017). https://doi.org/10.1007/978-3-319-56614-6_22
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27(2), 228–234 (1980)
Peck, M.: The crazy security behind the birth of zcash, the inside story (2016), https://spectrum.ieee.org/the-crazy-security-behind-thebirth-of-zcash
Pelt, R.v., Jansen, S., Baars, D., Overbeek, S.: Defining blockchain governance: a framework for analysis and comparison. Information Systems Management 38(1), 21–41 (2021)
Peters, K.: A history of bitcoin hard forks (2021), https://www.investopedia.com/tech/history-bitcoin-hard-forks/
Platis, M., Sanderford, B.: Nakamoto coefficient (2021), https://crosstower.com/resources/education/nakamoto-coefficient
Poon, J., Dryja, T.: The bitcoin lightning network: Scalable off-chain instant payments (2016)
Reed, D.D., Luiselli, J.K.: Temporal Discounting, pp. 1474–1474. Springer US, Boston, MA (2011). https://doi.org/10.1007/978-0-387-79061-9_3162, https://doi.org/10.1007/978-0-387-79061-9_3162
Reibel, P., Yousaf, H., Meiklejohn, S.: Short paper: An exploration of code diversity in the cryptocurrency landscape. In: Goldberg and Moore [84], pp. 73–83. https://doi.org/10.1007/978-3-030-32101-7_5
Reiff, N.: All about the bitcoin cash hard fork (2022), https://www.investopedia.com/news/all-about-bitcoin-cash-hard-fork/
Ren, L., Devadas, S.: Bandwidth hard functions for ASIC resistance. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017: 15th Theory of Cryptography Conference, Part I. Lecture Notes in Computer Science, vol. 10677, pp. 466–492. Springer, Heidelberg, Germany, Baltimore, MD, USA (Nov 12–15, 2017). https://doi.org/10.1007/978-3-319-70500-2_16
R´enyi, A., et al.: On measures of entropy and information. In: Proceedings of the fourth Berkeley symposium on mathematical statistics and probability. vol. 1. Berkeley, California, USA (1961)
Rhoades, S.A.: The herfindahl-hirschman index. Fed. Res. Bull. 79, 188 (1993)
Romiti, M., Judmayer, A., Zamyatin, A., Haslhofer, B.: A deep dive into bitcoin mining pools: An empirical analysis of mining shares. CoRR abs/1905.05999 (2019), http://arxiv.org/abs/1905.05999
Ron, D., Shamir, A.: Quantitative analysis of the full Bitcoin transaction graph. In: Sadeghi, A.R. (ed.) FC 2013: 17th International Conference on Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 7859, pp. 6–24. Springer, Heidelberg, Germany, Okinawa, Japan (Apr 1–5, 2013). https://doi.org/10.1007/978-3-642-39884-1_2
Rosenthal, D.: Gini coefficients of cryptocurrencies (2018), https://blog.dshr.org/2018/10/gini-coefficients-of-cryptocurrencies.html
Roubini, N.: The big blockchain lie (2018), https://www.project-syndicate.org/commentary/blockchain-big-lie-by-nouriel-roubini-2018-10
Sai, A.R., Buckley, J., Fitzgerald, B., Gear, A.L.: Taxonomy of centralization in public blockchain systems: A systematic literature review. Inf. Process. Manag. 58(4), 102584 (2021). https://doi.org/10.1016/j.ipm.2021.102584, https://doi.org/10.1016/j.ipm.2021.102584
Sai, A.R., Buckley, J., Gear, A.L.: Characterizing wealth inequality in cryptocurrencies. Frontiers Blockchain 4, 730122 (2021). https://doi.org/10.3389/fbloc.2021.730122, https://doi.org/10.3389/fbloc.2021.730122
Schneider, N.: Decentralization: an incomplete ambition. Journal of cultural economy 12(4), 265–285 (2019)
Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5(1), 3–55 (2001)
Stoll, C., Klaaßen, L., Gallersd¨orfer, U.: The carbon footprint of bitcoin. Joule 3(7), 1647–1661 (2019)
Sun, W., Jin, H., Jin, F., Kong, L., Peng, Y., Dai, Z.: Spatial analysis of global bitcoin mining. Scientific Reports 12(1), 10694 (2022)
Tanenbaum, A.S., Wetherall, D.: Computer networks, 5th Edition. Pearson (2011), https://www.worldcat.org/oclc/698581231
Taylor, M.B.: The evolution of bitcoin hardware. Computer 50(9), 58–66 (2017)
Theil, H.: Economics and information theory. Tech. rep. (1967)
Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). pp. 458–467. IEEE (2017)
Tran, M., Choi, I., Moon, G.J., Vu, A.V., Kang, M.S.: A stealthier partitioning attack against bitcoin peer-to-peer network. In: IEEE S&P 2020 [91], pp. 894–909. https://doi.org/10.1109/SP40000.2020.00027
Tran, M., Shenoi, A., Kang, M.S.: On the routing-aware peering against networkeclipse attacks in bitcoin. In: Bailey, M., Greenstadt, R. (eds.) USENIX Security 2021: 30th USENIX Security Symposium. pp. 1253–1270. USENIX Association (Aug 11–13, 2021)
UNDP, U.: Decentralization: A sampling of definitions. Working Paper (1999)
US Securities and Exchange Commission and others: Report of investigation pursuant to section 21(a) of the securities exchange act of 1934: The dao (2017), https://www.sec.gov/litigation/investreport/34-81207.pdf
US Securities and Exchange Commission and others: Sec issues investigative report concluding dao tokens, a digital asset, were securities. July 25, 2017–131 (2017), https://www.sec.gov/news/press-release/2017-131
US Securities and Exchange Commission and others: Framework for ”investment contract” analysis of digital assets. US Securities and Exchange Commission 3 (2019)
Valdivia, L.J., Del-Valle-Soto, C., Rodriguez, J., Alcaraz, M.: Decentralization: The failed promise of cryptocurrencies. IT Professional 21(2), 33–40 (2019)
Ventures, O.: Blockchain development trends 2021 (2021), https://outlierventures.io/wp-content/uploads/2021/02/OV-Blockchain-DevQ1-2021-_v7.pdf
Victor, F., Ruppel, P., Kupper, A.: A taxonomy for distributed ledger analytics. Computer 54(02), 30–38 (2021)
Wang, C., Chu, X., Qin, Y.: Measurement and analysis of the bitcoin networks: A view from mining pools. In: 2020 6th International Conference on Big Data Computing and Communications (BIGCOM). pp. 180–188 (2020). https://doi.org/10.1109/BigCom51056.2020.00032
Wang, T., Zhao, C., Yang, Q., Zhang, S., Liew, S.C.: Ethna: Analyzing the underlying peer-to-peer network of ethereum blockchain. IEEE Transactions on Network Science and Engineering 8(3), 2131–2146 (2021)
Werner, S.M., Perez, D., Gudgeon, L., Klages-Mundt, A., Harz, D., Knottenbelt, W.J.: Sok: Decentralized finance (defi). CoRR abs/2101.08778 (2021), https://arxiv.org/abs/2101.08778
Williams, C.: Infura outage sparks debate over ethereum’s decentralization (2020), https://cryptobriefing.com/infura-outage-sparks-debateover-ethereums-decentralization/
World Bank: Gini index (world bank estimate) (2022), https://data.worldbank.org/indicator/SI.POV.GINI
W¨ust, K., Gervais, A.: Ethereum eclipse attacks. Tech. rep., ETH Zurich (2016)
Young, M.: Opensea’s team of 37 staff is currently handling 98% of combined nft volumes (2021), https://cointelegraph.com/news/opensea-s-teamof-37-staff-are-currently-handling-98-of-combined-nft-volumes
Zeng, L., Chen, Y., Chen, S., Zhang, X., Guo, Z., Xu, W., Moscibroda, T.: Characterizing ethereum’s mining power decentralization at a deeper level. In: 40th IEEE Conference on Computer Communications, INFOCOM 2021, Vancouver, BC, Canada, May 10-13, 2021. pp. 1–10. IEEE (2021). <https://doi.org/10. 1109/INFOCOM42981.2021.9488812>, <https://doi.org/10.1109/INFOCOM42981. 2021.9488812>
Zhang, B., Oliynykov, R., Balogun, H.: A treasury system for cryptocurrencies: Enabling better collaborative intelligence. In: ISOC Network and Distributed System Security Symposium – NDSS 2019. The Internet Society, San Diego, CA, USA (Feb 24-27, 2019)
Zhang, L., Ma, X., Liu, Y.: Sok: Blockchain decentralization. arXiv preprint arXiv:2205.04256 (2022)
Zhou, F., Song, N.: 2020 q2 cryptocurrency mining industry report (2020), https://medium.com/coinmonks/2020-q2-cryptocurrency-mining-industryreport-50a908773b17
Zhou, L., Xiong, X., Ernstberger, J., Chaliasos, S., Wang, Z., Wang, Y., Qin, K., Wattenhofer, R., Song, D., Gervais, A.: Sok: Decentralized finance (defi) attacks. In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023. pp. 2444–2461. IEEE (2023). https://doi.org/10.1109/SP46215.2023.10179435, https://doi.org/10.1109/SP46215.2023.101794
Zhou, Q.: Irregular-program-based hash algorithms. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON). pp. 125–128. IEEE (2019)
Authors:
(1) Christina Ovezik, University of Edinburgh (c.ovezik@ed.ac.uk);
(2) Dimitris Karakostas, University of Edinburgh (dkarakos@ed.ac.uk);
(3) Aggelos Kiayias, University of Edinburgh and IOG (akiayias@ed.ac.uk).
This paper is
[23] In such cases, smart contract development would naturally fall in the software layer.
[24] Appendix E expands on the relationship between fault tolerant systems and decentralization.
[25] Appendix D offers an overview of metrics that have been used so far in this setting.