Catfish Effect Between Internal and External Attackers:Being Semi-honest is Helpful

06/19/2019
by   Hanqing Liu, et al.
0

The consensus protocol named proof of work (PoW) is widely applied by cryptocurrencies like Bitcoin. Although security of a PoW cryptocurrency is always the top priority, it is threatened by mining attacks like selfish mining. Researchers have proposed many mining attack models with one attacker, and optimized the attacker's strategy. During these mining attacks, an attacker pursues a higher relative revenue (RR) by wasting a large amount of computational power of the honest miners at the cost of a small amount of computational power of himself. In this paper, we propose a mining attack model with two phases: the original system and the multi-attacker system. It is the first model to provide both theoretical and quantitative analysis of mining attacks with two attackers. We explain how the original system turns into the multi-attacker system by introducing two attackers: the internal attacker and the external attacker. If both attackers take the attacking strategy selfish mining, the RR of the internal attacker in multi-attacker system will drop by up to 31.9 overestimate his RR by up to 44.6 competitions, auctions between attackers and overestimation of attackers' influence factor are three main causes of both attackers' dropping RR. We propose a mining strategy named Partial Initiative Release (PIR) which is a semi-honest mining strategy in multi-attacker system. In some specific situations, PIR allows the attacker to get more block reward by launching an attack in multi-attacker system.

READ FULL TEXT
research
07/27/2022

Partial Selfish Mining for More Profits

Mining attacks aim to gain an unfair share of extra rewards in the block...
research
06/14/2018

A Memo on the Proof-of-Stake Mechanism

We analyze the economic incentives generated by the proof-of-stake mecha...
research
04/02/2020

Automated Attacker Synthesis for Distributed Protocols

Distributed protocols should be robust to both benign malfunction (e.g. ...
research
04/08/2021

Secure (S)Hell: Introducing an SSH Deception Proxy Framework

Deceiving an attacker in the network security domain is a well establish...
research
09/17/2018

Resisting Selfish Mining Attacks in the Bicomp

Selfish mining, which is an attack on the integrity of the Bitcoin netwo...
research
12/20/2021

Blockchain Mining with Multiple Selfish Miners

This paper studies a fundamental problem regarding the security of block...
research
10/09/2021

Widen The Backdoor To Let More Attackers In

As collaborative learning and the outsourcing of data collection become ...

Please sign up or login with your details

Forgot password? Click here to reset