Incentive analysis: Nakamoto PoW
Mining in Game theory
Blockchain Mining Games
Aggelos Kiayias et al. FC'16
Models Bitcoin mining as a game, where nodes decide on which blocks to extend and whether to release a mined block.
For small players controlling less than 1/3 of the resources, following Bitcoin’s protocol specification is a Nash equilibrium.
Assumption: All honest miners can communicate with 0 latency, and the adversary cannot perform form any network level attacks (such as rushing).
The Bitcoin Mining Game: On the Optimality of Honesty in Proof-of-work Consensus Mechanism (August 2017)
Juan Beccuti, Christian Jaag (Swiss Economics Working Paper 0060)
Consider a game in which Bitcoin miners compete for a reward of each solved puzzle in a sequence of them.
model it as a sequential game with imperfect information, in which miners have to choose whether or not to report their success.
Show that the game has a multiplicity of equilibria and we analyze the parameter constellations for each of them.
In particular, the minimum requirement to find it optimal not to report is decreasing with the number of miners who are not reporting, and increasing the heterogeneity among players reduces the likelihood that they choose not to report
Oceanic Games: Centralization Risks and Incentives in Blockchain Mining
Nikos Leonardos, Stefanos Leonardos, and Georgios Piliouras
Best paper at MARBLE'19
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim (KAIST)
S&P'19 Video, Site
Fact and Fiction: Challenging the honest majority assumption of permissionless blockchains
Monash University, CSIRO-Data61
Show rational participants to launch 51% attacks in two cases.
1. Attacking another blockchain w/ compatible mining algorithms
2. Renting mining power from cloud mining services.
Formally model profit-driven malicious behaviours as a series of actions through a Markov Decision Process.
Result: for most mainstream PoW-based blockchains, ,51% attacks are feasible and profitable
Investigate the recent 51% attack on Ethereum Classic (Jan. 2019)
Discouragement
BDoS: Blockchain Denial of Service
Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal and Ari Juels
CCS'20
Medium, Twitter
RPD framework
But Why Does it Work? A Rational Protocol Design Treatment of Bitcoin
Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas
EuroCrypto'18 Slide
Based on RPD framework by Juan Garay et al.
Selfish mining
Majority is not Enough: Bitcoin Mining is Vulnerable (2013)
Ittay Eyal and Emin G¨un Sirer (Cornell University)
FC'14
Rational miners will prefer to join the selfish miners, and the colluding group will increase in size until it becomes a majority.
Optimal Selfish Mining Strategies in Bitcoin
Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar (The Hebrew University of Jerusalem)
FC'15
From Stubborn Mining paper,
Concurrent to and independent of our work, Sapirshtein et al. also observe that selfish mining is suboptimal. They define a broad strategy space and use a combination of analytic bounds and numeric solvers to compute approximately-optimal strategies from this space. Their strategy space is a generalization of our stubborn mining strategies; however, they do not consider how to compose mining attacks with eclipse attack
Fault tolerance in uncoordinated majority model: ~0.2321
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak, Srijan Kumar, Andrew Miller (University of Maryland) and Elaine Shi
S&P'16
GitHub
Selfish Mining Re-Examined
Kevin Alarcón Negy (Cornell University), Peter R. Rizun (Bitcoin Unlimited), Emin Gün Sirer (Cornell University)
FC'20
Intermittent selfish mining: Against difficulty adjustment
Show its profittability per time unit
Not fits into optimal strategy
FruitChains: A Fair Blockchain (May. 2017)
Rafael Pass, Elaine Shi (Cornell Tech / Cornell Uni)
Slide
In our model where the adversary can control the delivery of messages, the bitcoin protocol is not incentive compatible even for players controlling less than a 1/3 of the computational resources—there is a selfish mining attack which enables an attacker to gain 1/2 of the block rewards
BPASE18 Overview Slide
Ethereum
The Impact of Uncle Rewards on Selfish Mining in Ethereum
Fabian Ritz, Alf Zugenmaier
EuroS&PW'18
Selfish Mining in Ethereum
Cyril Grunspan, Ricardo Pérez-Marco
ICDCS'19
Bribing
Smart Contracts for Bribing Miners
Patrick McCorry, et al.
Present three smart contracts that allow a briber to fairly exchange bribes to miners who pursue a mining strategy benefiting the briber
Related: How Unrealistic is Bribing Frequently Rotated Validators? @Medium by NEAR
Selling private keys to attackers
Incentivizing Blockchain Forks via Whale Transactions
Kevin Liao (Arizona State University), Jonathan Katz
Whale transactions: offer exceptionally high fees to pay in-band bribes to miners in order to incentivize forks leading to a potential ledger history revision attack
FC'17
Why buy when you can rent? Bribery attacks on Bitcoin-style consensus
Joseph Bonneau (Stanford University)
BitcoinW'16
Bribing for censorship on transactions
See in Censorship
Rewards
On the Instability of Bitcoin Without the Block Reward
Miles Carlsten (Princeton)
Slide
A model for Bitcoin’s security and the declining block subsidy
Hasu, James Prestwich, Brandon Curtis, October 2019
An Axiomatic Approach to Block Rewards
Xi Chen, Christos Papadimitriou, Tim Roughgarden (Columbia University)
SBC'20
Mining pool
Analysis of Bitcoin Pooled Mining Reward Systems (Dec. 2011)
Meni Rosenfeld
Overview of reward distribution
Pool hopping, Sabotage, Lie in wait and their workarounds
Optimal pool abuse strategy (Feb. 2011)
Raulo
Pool Hopping Attack
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) (Dec. 2013)
Lear Bahack
Difficulty Raising Attack, Block Discarding Attack
On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency (Dec. 2014)
Nicolas T. Courtois, Lear Bahack
Overview of miner's attack and Block Withholding Attack
The Miner’s Dilemma
Ittay Eyal
Define and analyze a game where pools use some of their participants to infiltrate other pools and perform such an attack.
With any number of pools, no-pool-attacks is not a Nash equilibrium.
With two pools, or any number of identical pools, there exists an equilibrium that constitutes a tragedy of the commons where the pools attack one another and all earn less than they would have if none had attacked.
For two pools, the decision whether or not to attack is the miner’s dilemma, an instance of the iterative prisoner’s dilemma.
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin (Aug. 2017)
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, Yongdae Kim
Fork Afer Withholding (FAW) Attacks
#Economics