Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis

02/01/2023
by   Haoran Zhu, et al.
0

GHOST, like the longest-chain protocol, is a chain selection protocol and its capability in resisting selfish mining attack has been validated in imperfect blockchains of Bitcoin and its variants (Bitcoin-like). This paper explores an analytical-model-based method to investigate the impact of stubborn mining attack in imperfect GHOST Bitcoin-like blockchains. We first quantify chain dynamics based on Markov chain and then derive the formulas of miner revenue and system throughput. We also propose a new metric, "Hazard Index", which can be used to compare attack severity and also assist attacker in determining whether it is profitable to conduct an attack. The experiment results show that 1) An attacker with more than 30 extremely downgrade system throughput by launching stubborn mining attack. 2) A rational attacker should not launch stubborn mining attack if it has less than 25 mining attack under GHOST. Our work provides insight into stubborn mining attack and is helpful in designing countermeasures.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/14/2023

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network

Stubborn mining attack greatly downgrades Bitcoin throughput and also be...
research
05/16/2018

On profitability of selfish mining

We review the so called selfish mining strategy in the Bitcoin network a...
research
08/22/2022

Optimal Bootstrapping of PoW Blockchains

Proof of Work (PoW) blockchains are susceptible to adversarial majority ...
research
03/14/2021

Selfish Mining Attacks Exacerbated by Elastic Hash Supply

Several attacks have been proposed against Proof-of-Work blockchains, wh...
research
12/02/2022

Bitcoin Security-Latency Under Network Delay

We improve security-latency bounds of Nakamoto consensus by analyzing th...
research
08/02/2018

On profitability of stubborn mining

We compute and compare profitabilities of stubborn mining strategies tha...
research
09/11/2020

Defending Against Malicious Reorgs in Tezos Proof-of-Stake

Blockchains are intended to be immutable, so an attacker who is able to ...

Please sign up or login with your details

Forgot password? Click here to reset