On the Strategy and Behavior of Bitcoin Mining with N-attackers

نویسندگان

  • Hanqing Liu
  • Na Ruan
  • Rongtian Du
  • Weijia Jia
چکیده

Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers’ strategy space has been extended by many works. These works only analyze the strategy and behavior of one single attacker. The extension of the strategy space is based on the assumption that there is only one attacker in the blockchain network. However, a proof of work blockchain is likely to have several attackers. The attackers can be independent of other attackers instead of sharing information and attacking the blockchain as a whole. During this problem, we are the teamwho for the first time analyze theminers’ behavior in a proof of work blockchain with several attackers by establishing a newmodel. Based on our model, we extend the attackers’ strategy space by proposing a new strategy set publish-n. Meanwhile, we revisit other attacking strategies such as selfish mining and stubborn mining in our model to explore whether these strategies work or not when there are several attackers.We compare the performance of different strategies through relative stale block rate of the attackers. In a proof of work blockchain model with two attackers, strategy publish-n can beat selfish mining by up to 26.3%.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lab Project: Selfish mining

Mining is the process of adding blocks of transaction to the Bitcoin’s block chain. The block chain serves to confirm transactions in the network. Nodes use the block chain to verify the legality of transactions. Each block contains a proof of work to be considered valid. This proof of work is verified by other nodes in the network. Mining is designed to be difficult so that the frequency of bl...

متن کامل

Rejecting the arguments of the sanctity of bitcoin mining and proving its legitimacy by Reward Contract (Joaleh)

Bitcoin soon attracted the attention of experts and the general public around the world, including the Islamic community. Due to the novelty of the subject, although little research has been done to examine the legitimacy of bitcoin mining from the perspective of Muslim thinkers, this paper is responsible for examining two reasons in the research of contemporary Sunni thinkers. The two reasons ...

متن کامل

Optimal Selfish Mining Strategies in Bitcoin

Bitcoin is a decentralized crypto-currency, and an accompanying protocol, created in 2008. Bitcoin nodes continuously generate and propagate blocks—collections of newly approved transactions that are added to Bitcoin’s ledger. Block creation requires nodes to invest computational resources, but also carries a reward in the form of bitcoins that are paid to the creator. While the protocol requir...

متن کامل

Effects of Organizational Entrepreneurship Strategy in Companies Affiliated to the Organization for Development and Renewal of Mining and Mineral Industries of Iran

The present research, intending to study the effects of organizational entrepreneurship strategy, is applied in terms of purpose and survey type based on its method of data collection. After 36 companies from Iran Mining and Mineral Industries Development and Renovation Organization (IMIDRO) were reviewed, results showed that the elements of an organizational entrepreneurship strategy included ...

متن کامل

On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners

Eyal and Sirer’s selfish mining strategy has demonstrated that Bitcoin system is not secure even if 50% of total mining power is held by altruistic miners [2]. Since then, researchers have been investigating either to improve the efficiency of selfish mining, or how to defend against it, typically in a single selfish miner setting. Yet there is no research on a selfish mining strategies concurr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017