Block Double-Submission Attack: Block Withholding Can Be Self-Destructive

08/10/2022
by   Suhyeon Lee, et al.
0

Proof-of-Work (PoW) is a Sybil control mechanism adopted in blockchain-based cryptocurrencies. It prevents the attempt of malicious actors to manipulate distributed ledgers. Bitcoin has successfully suppressed double-spending by accepting the longest PoW chain. Nevertheless, PoW encountered several major security issues surrounding mining competition. One of them is a Block WithHolding (BWH) attack that can exploit a widespread and cooperative environment called a mining pool. This attack takes advantage of untrustworthy relationships between mining pools and participating agents. Moreover, detecting or responding to attacks is challenging due to the nature of mining pools. In this paper, however, we suggest that BWH attacks also have a comparable trust problem. Because a BWH attacker cannot have complete control over BWH agents, they can betray the belonging mining pool and seek further benefits by trading with victims. We prove that this betrayal is not only valid in all attack parameters but also provides double benefits; finally, it is the best strategy for BWH agents. Furthermore, our study implies that BWH attacks may encounter self-destruction of their own revenue, contrary to their intention.

READ FULL TEXT

page 9

page 12

research
10/25/2022

Leveraging the Verifier's Dilemma to Double Spend in Bitcoin

We describe and analyze perishing mining, a novel block-withholding mini...
research
12/05/2021

Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum

Bitcoin and Ethereum are the top two blockchain-based cryptocurrencies w...
research
06/14/2018

A Memo on the Proof-of-Stake Mechanism

We analyze the economic incentives generated by the proof-of-stake mecha...
research
02/25/2020

Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems

Proof-of-Work mining is intended to provide blockchains with robustness ...
research
09/11/2020

Defending Against Malicious Reorgs in Tezos Proof-of-Stake

Blockchains are intended to be immutable, so an attacker who is able to ...
research
08/28/2019

An Eye for an Eye: Economics of Retaliation in Mining Pools

Currently, miners typically join mining pools to solve cryptographic puz...
research
07/02/2020

Proofs of Useless Work – Positive and Negative Results for Wasteless Mining Systems

Many blockchain systems today, including Bitcoin, rely on Proof of Work ...

Please sign up or login with your details

Forgot password? Click here to reset