-
Notifications
You must be signed in to change notification settings - Fork 385
Qualitative Security Model
Decentralization Model
In Social Network Principle it is shown that Bitcoin is a network of human relationships. This can be modeled as a directed graph where each vertex represents a merchant and each edge represents a trade for bitcoin. Edges indicate the direction of movement of coin and are quantified in the number of units traded. All owners are presumed to have been merchants at the time of coin receipt, including as miners (selling confirmations) and as recipients of charity (selling goodwill).
If a person is not personally accepting coin, or does not personally validate coin accepted, the person cannot reject invalid coin. The person is entrusting this task to a central authority. All people utilizing the same delegate are reduced to just one vertex that represents the delegate.
For any period of time, economic security is a function of the number of merchants and the similarity of amounts traded. The strongest economy would be all people in the world trading for the same number of units in the period, an ideal which can be called a "distributed" (or fully-decentralized) economy. The weakest would be one delegate accepting all units traded in the period, which would be a "centralized" economy.
More specifically, the system is most economically decentralized which has the greatest number of vertices (merchants) with the lowest coefficient of variation in the incoming edges (receipts). Defining a distribution function as the inverse of coefficient of variation we obtain:
economic-decentralization = distribution(receipts) * merchants
Similar to economic security, confirmation security can be modeled as an edgeless graph. Each miner is represented by one vertex on the graph. A grinder is not a miner as the grinder has no decision-making ability, only the miner is represented. The total hash power employed by a miner is the weight of the vertex.
For any period of time, confirmation security is a function of the number of miners and the similarity of hash power they directed. The strongest censorship resistance would be all people in the world mining at the same hash power in the period, an ideal which can be called "distributed" (or fully-decentralized) confirmation. The weakest would be one miner with 100% of hash power, which would be "centralized" confirmation.
More specifically, the system is most decentralized in confirmation which has the greatest number of vertices (miners) with the highest distribution in weights (hash power):
confirmation-decentralization = distribution(hash-power) * miners
Security Model
Decentralization alone is not security. Security is the product of activity, distribution of that activity, and the fraction of participating humanity.
security = activity * distribution * participation
Given that there is no limit to humanity, trade or computation, the level of security in each axis is unbounded. Security is also unbounded with perfect distribution (i.e. infinite decentralization). A minimum level of zero in each is achieved with either no participation or no activity. Economic and confirmation security can thus be defined as:
economic-security = receipts * distribution(receipts) * [merchants / humanity]
confirmation-security = hash-power * distribution(hash-power) * [miners / humanity]
Limits of the Model
These relations do not say anything about the absolute effectiveness represented by any value, or the relative effectiveness of any two values except that a greater value represents a greater effectiveness. This is not due to a deficiency in the model. The factors include people, specifically the effectiveness of their individual abilities to resist and their perception of value in the money. All who validate or mine offer some level of resistance, but there is no implied continuity. We refer to a "level" of security, not an "amount" of security.
As show in in Public Data Principle, anonymity is a tool that aids in defending one's ability to trade and/or mine. As such the level of decentralization can never be measured; the model is a conceptual aid. As shown in Balance of Power Fallacy, the security afforded by each of the two sub-models is complimentary and independent of the other. While people could decide to trade and/or mine independently in the future, the Cockroach Fallacy shows that they are not contributing to security until they do so. The model represents security as it exits in the period.
Users | Developers | License | Copyright © 2011-2024 libbitcoin developers
- Home
- manifesto
- libbitcoin.info
- Libbitcoin Institute
- Freenode (IRC)
- Mailing List
- Slack Channel
- Build Libbitcoin
- Comprehensive Overview
- Developer Documentation
- Tutorials (aaronjaramillo)
- Bitcoin Unraveled
-
Cryptoeconomics
- Foreword by Amir Taaki
- Value Proposition
- Axiom of Resistance
- Money Taxonomy
- Pure Bank
- Production and Consumption
- Labor and Leisure
- Custodial Risk Principle
- Dedicated Cost Principle
- Depreciation Principle
- Expression Principle
- Inflation Principle
- Other Means Principle
- Patent Resistance Principle
- Risk Sharing Principle
- Reservation Principle
- Scalability Principle
- Subjective Inflation Principle
- Consolidation Principle
- Fragmentation Principle
- Permissionless Principle
- Public Data Principle
- Social Network Principle
- State Banking Principle
- Substitution Principle
- Cryptodynamic Principles
- Censorship Resistance Property
- Consensus Property
- Stability Property
- Utility Threshold Property
- Zero Sum Property
- Threat Level Paradox
- Miner Business Model
- Qualitative Security Model
- Proximity Premium Flaw
- Variance Discount Flaw
- Centralization Risk
- Pooling Pressure Risk
- ASIC Monopoly Fallacy
- Auditability Fallacy
- Balance of Power Fallacy
- Blockchain Fallacy
- Byproduct Mining Fallacy
- Causation Fallacy
- Cockroach Fallacy
- Credit Expansion Fallacy
- Debt Loop Fallacy
- Decoupled Mining Fallacy
- Dumping Fallacy
- Empty Block Fallacy
- Energy Exhaustion Fallacy
- Energy Store Fallacy
- Energy Waste Fallacy
- Fee Recovery Fallacy
- Genetic Purity Fallacy
- Full Reserve Fallacy
- Halving Fallacy
- Hoarding Fallacy
- Hybrid Mining Fallacy
- Ideal Money Fallacy
- Impotent Mining Fallacy
- Inflation Fallacy
- Inflationary Quality Fallacy
- Jurisdictional Arbitrage Fallacy
- Lunar Fallacy
- Network Effect Fallacy
- Prisoner's Dilemma Fallacy
- Private Key Fallacy
- Proof of Cost Fallacy
- Proof of Memory Façade
- Proof of Stake Fallacy
- Proof of Work Fallacy
- Regression Fallacy
- Relay Fallacy
- Replay Protection Fallacy
- Reserve Currency Fallacy
- Risk Free Return Fallacy
- Scarcity Fallacy
- Selfish Mining Fallacy
- Side Fee Fallacy
- Split Credit Expansion Fallacy
- Stock to Flow Fallacy
- Thin Air Fallacy
- Time Preference Fallacy
- Unlendable Money Fallacy
- Fedcoin Objectives
- Hearn Error
- Collectible Tautology
- Price Estimation
- Savings Relation
- Speculative Consumption
- Spam Misnomer
- Efficiency Paradox
- Split Speculator Dilemma
- Bitcoin Labels
- Brand Arrogation
- Reserve Definition
- Maximalism Definition
- Shitcoin Definition
- Glossary
- Console Applications
- Development Libraries
- Maintainer Information
- Miscellaneous Articles