Selected Publications
- Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? Roozbeh Sarenche, Ren Zhang, Svetla Nikova, and Bart Preneel. IEEE TIFS. [eprint]
Grunspan and Pérez-Marco argued that a difficulty adjustment mechanism incorporating orphaned blocks would eliminate the profitability of selfish mining in terms of time-averaged revenue. However, we have demonstrated the nontrivial complexity of designing such a protocol.
- Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols. Shichen Wu, Puwen Wei*, Ren Zhang*, and Bowen Jiang. NDSS 2024. [eprint]
* corresponding authors
Contrary to popular belief, DAG-based protocols, like their chain-based predecessors, are not immune to the security-performance tradeoff.
- Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines. Yuncong Zhang, Shi-Feng Sun, Ren Zhang, and Dawu Gu. ASIACRYPT 2023. [eprint] [youtube] [bilibili]
Zero-knowledge virtual machines (ZKVMs) rely heavily on random-access memory, a component that has been understudied despite its influence on performance.
- When is Slower Block Propagation More Profitable for Large Miners? Zhichun Lu and Ren Zhang*. ESORICS 2023. [eprint]
* corresponding author
For years, Bitcoin miners put little efforts into adopting several widely-acclaimed block acceleration techniques, which, as some argued, would secure their revenues. Why?
- VOProof: Efficient zkSNARKs from Vector Oracle Compilers. Yuncong Zhang, Alan Szepieniec, Ren Zhang*, Shi-feng Sun*, Geng Wang, and Dawu Gu*. ACM CCS 2022. [eprint] [youtube] [bilibili]
* corresponding authors
We propose a novel workflow for designing and implementing zkSNARKs that conceals most algebraic and cryptographic operations inside the compiler, eliminating the need for designers to grasp these complex and error-prone procedures.
- Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate. Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, and Chen Feng. IEEE TDSC 2022. [arXiv]
Many Proof-of-Stake protocols utilize a committee to sign each block, enhancing its security. Could a similar approach be applied to Proof-of-Work protocols?
- Analysing and Improving Shard Allocation Protocols for Sharded Blockchains. Runchao Han, Jiangshan Yu, and Ren Zhang. ACM AFT 2022. [eprint]
Selected as “Paper of the Week” (Issue #68) by ZK Capital.
Maintaining a balanced distribution of nodes across shards is a challenging task. We explore the underlying reasons and present a viable solution.
- NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus. Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, and Bart Preneel. NDSS 2022. [eprint] [youtube, 23 min] [bilibili, 23 min]
NC-Max is implemented in Nervos CKB. [Nervos RFC]
Invited to present at IJTCS 2020. [bilibili, 55 min]
By decoupling transaction synchronization from confirmation, we can fully exhaust the network’s throughput and substantially reduce the transaction confirmation latency.
- Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services. Xiaobo Xiang, Ren Zhang, Hanxiang Wen, Xiaorui Gong, and Baoxu Liu. ACM CCS 2021. [Open Access]
Binder, Android’s primary mechanism for inter-process communication (IPC), employs a client-server model where applications act as clients and system services serve as servers. While most security measures focus on protecting against client-side attacks, the system remains vulnerable when an attacker assumes the role of a Binder server.
- Authenticated and Auditable Data Sharing via Smart Contract. Vincent Reniers, Yuan Gao, Ren Zhang, Paolo Viviani, Akash Madhusudan, Bert Lagaisse, Svetla Nikova, Dimitri Van Landuyt, Riccardo Lombardi, Bart Preneel, and Wouter Joosen. ACM SAC 2020. [pdf]
This task is extracted from a real-world application. One party needs to distribute an encryption key to multiple parties using a blockchain, knowing only their public keys. How can we ensure (1) that all parties receive the same key, and (2) that any discrepancies can be publicly proven without compromising the key’s secrecy?
- Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols’ Security. Ren Zhang and Bart Preneel. IEEE S&P 2019. [pdf] [code] [slides] [One-minute introduction] [2019 S&P talk, 18 min]
Invited to present at “Master Workshop: Layer I solutions” organized by Binary District in 2018. [youtube, 31 min]
Invited to present at Stanford Blockchain Conference 2019. [youtube, 24 min]
Invited to present at AFT 2019 as “outstanding paper of the year”.
Many PoW protocols claim superior security to Nakamoto Consensus. Do they deliver?
- On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol. Ren Zhang and Bart Preneel. CoNEXT 2017. [eprint] [code] [reddit discussion]
Invited to present at Breaking Bitcoin 2017. [youtube]
Invited to present at CESC 2017. [youtube]
BU was once the most popular Bitcoin scaling proposal among the miners. Is it as secure as its supporters claimed?
- Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin. Ren Zhang and Bart Preneel. CT-RSA 2017. [pdf] [code]
Presented by Max Fang at BPASE 2018. [youtube]
My first attempt to defend against selfish mining by encouraging miners to ignore late blocks.
Post-publication note: I would not recommend a faithful implementation of this design. Now that we understand PoW better, the design and analysis presented in this paper could benefit from further refinement.
- Censorship-Resistant and Privacy-Preserving Distributed Web Search. Michael Herrmann, Ren Zhang, Kai-Chun Ning, Claudia Diaz, and Bart Preneel. P2P 2014. [pdf]
Existing distributed web search engines (Faroo, Seeks, and Yacy) do not offer adequate protection against censorship and de-anonymization attacks. We identify the security properties and design new protocols to achieve them.
- Making Eclipse Attacks Computationally Infeasible in Large-Scale DHTs. Ren Zhang, Jianyu Zhang, Yu Chen, Nanhao Qin, Bingshuang Liu, and Yuan Zhang. IPCCC 2011. [pdf]
By requiring every user to complete a proof-of-work puzzle, the DHT network discourages attackers from monopolizing particular ID ranges, as this would necessitate significant computational resources.
Post-publication note: This mechanism no longer works. The widespread availability of ASIC mining equipment has rendered PoW an ineffective defense against Sybil attacks. An attacker can easily overwhelm honest nodes by deploying specialized hardware.