Ideally I'd like to think about it carefully, read the paper a few times, and run some simulations before commenting, but I'll likely be tied up at the IETF all week and people are already panicking and pushing for hasty changes in response to this which may be ill-advised, so I'm going to offer some preliminary comments here.
Please do run your simulations. When you do, make sure that you faithfully simulate a network with latency. The word latency exists in their paper exactly one time, as a casual aside in the solution section, which should immediately set alarm bells ringing in all of our heads. In addition, they seem to suffer from the strange notion that work in bitcoin can be wasted. Despite the fancy pedigree of the email address in the page footer, I suspect that their paper has more to do with hubris, ignorance of physics and a serious lack of understanding of how bitcoin
really works.
Let me start with latency. As far as I can tell from the paper, their "simulation" (and here you should imagine me doing very sarcastic air quotes) involves a network where the evil miners have magically found a way to detect the competing block in the honest miner's memory, before it has begins to spread on the network.
Gamma seems to play some sort of role here, but the meaning of it seems to change from page to page. Or at the very least between pages 8 and 11. Can anyone give me a good justification for abusing this poor variable in this way?
The charts are very illuminating. In figure 2, each of the simulation points is
exactly on the calculated line. This is a dead giveaway. The only way that can happen is if their model is fully deterministic except for mining function. Amusingly, in a universe without latency in any form, which is the only universe where this model is meaningful, their solution is unnecessary, and actually counterproductive (since it causes the problem they aim to solve).
The real gold of this paper comes on page 13. On page 13 they handwave over the latency issue by pointing out that an attacker
could insert itself between every other node on the network. Let me just sum up a few years of discussion on this topic:
We Know. If an attacker is able to isolate a single node, they can fuck with that node. If an attacker is able to isolate every node (lol), they can fuck with every node.
Note to researchers: If anyone can control the spread of information across the entire network, they don't need whatever crazy scheme you've cooked up; they can already do much worse things. In particular, if an attacker is capable of creating the conditions necessary for this garbage to work, they can just not forward
any blocks but their own, and they multiply whatever skimpy hashing power they have by infinity and they gain total control over all mining.
Of course, everyone instantly sees how silly that is, so they had to dress it up in pseudo-scientific gibberish so that people would click on their crappy website and check out the douchebag's glamour shot.
Sigh. Is there even any point in addressing point two now? Work is not cumulative. Publishing a block does not make the rest of the network "start over".