Lab Project: Selfish mining

نویسنده

  • Ayelet Sapirshtein
چکیده

Mining is the process of adding blocks of transaction to the Bitcoin’s block chain. The block chain serves to confirm transactions in the network. Nodes use the block chain to verify the legality of transactions. Each block contains a proof of work to be considered valid. This proof of work is verified by other nodes in the network. Mining is designed to be difficult so that the frequency of blocks found would be low and constant. Therefore if block creation rate decreases, the difficulty of block creation descends and vice versa. For this reason we are interested in the percentage of blocks we build in the network, instead of the quantity of blocks. The primary purpose of mining is to reach security in the Bitcoin network. Mining is also used to introduce Bitcoins into the system: When a miner discovers a block, the discoverer is paid for any transaction fees and newly created coins. A selfish mining attack is a strategy in which a mining pool selectively publishes or withholds blocks, instead of publishing blocks to the network immediately when found. In this strategy the attackers may sacrifice their own revenue but also often publish many blocks all at once and thus are forcing the rest of the network to discard blocks and lose revenue. This does reduce the attackers revenue in the short term, but it reduces everyone else’s revenue even more. Therefore it increases the percentage of blocks the attackers build in the network, that means increasing the attackers rewards. The attack strategy is as follows: The attacker keeps its own private chain, which is separate from the public chain that the rest of the network works on. At the beginning, the private chain and the public chain start out the same. The attacker always mines on the private chain and keeps any blocks that he finds private. If the public chain is longer than the private chain the attackers adopts the public chain and starts a new private chain that starts out the same as the public chain. In other cases, the attackers publish a portion of their private chain, In order to force the rest of the network to discard blocks, and accept the private chain blocks. This strategy is described extensively in the paper ”Majority is not Enough: Bitcoin Mining is Vulnerable”. In this project we introduce a new strategy that improves the selfish mining strategy for the selfish attackers. We describe an MDP that models the scenario of honest miners that act according to the protocol and attackers who keep their own private chain, as in the original paper, and choose to take action that will yield them the most gains. The optimal strategy for the attackers depends on their computing power in the network and their ability to convince honest miners to mine on their blocks chain instead of the honest chain when they see the same length chains. Therefore we compute the best deterministic selfish mining strategy for different parameters of the network, and for each parameter we get the optimal strategy for them by solving the MDP problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners

Eyal and Sirer’s selfish mining strategy has demonstrated that Bitcoin system is not secure even if 50% of total mining power is held by altruistic miners [2]. Since then, researchers have been investigating either to improve the efficiency of selfish mining, or how to defend against it, typically in a single selfish miner setting. Yet there is no research on a selfish mining strategies concurr...

متن کامل

Broadcasting Intermediate Blocks as a Defense Mechanism against Selfish Mining in Bitcoin

Although adopted by many cryptocurrencies, the Bitcoin mining protocol is not incentive-compatible, as the selfish mining strategy enables a miner to gain unfair mining rewards. Existing defenses either demand fundamental changes to block validity rules or have little effect on an attacker with more than one third of the total mining power. This paper proposes an effective defense mechanism aga...

متن کامل

One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract)

A recent result in Bitcoin is the selfish mining strategy in which a selfish cartel withholds blocks they mine to gain an advantage. This strategy is both incentive-compatible and harmful to Bitcoin. In this paper we introduce a new defense against selfish mining that improves on the previous best result, we raise the threshold of mining power necessary to profitably selfishly mine from 25% to ...

متن کامل

Optimal Selfish Mining Strategies in Bitcoin

Bitcoin is a decentralized crypto-currency, and an accompanying protocol, created in 2008. Bitcoin nodes continuously generate and propagate blocks—collections of newly approved transactions that are added to Bitcoin’s ledger. Block creation requires nodes to invest computational resources, but also carries a reward in the form of bitcoins that are paid to the creator. While the protocol requir...

متن کامل

On the Strategy and Behavior of Bitcoin Mining with N-attackers

Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers’ strategy space has been extended by many works. These works only analyze the strategy and behavior of one single attacker. The extension of the strategy space is based on the assumption that there is only one attacker in the blockchain network. However, a proof of work blockcha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014