Novel bribery mining attacks in the bitcoin system and the bribery miner's dilemma

05/12/2023
by   Junjie Hu, et al.
0

Mining attacks allow adversaries to obtain a disproportionate share of the mining reward by deviating from the honest mining strategy in the Bitcoin system. Among them, the most well-known are selfish mining (SM), block withholding (BWH), fork after withholding (FAW) and bribery mining. In this paper, we propose two novel mining attacks: bribery semi-selfish mining (BSSM) and bribery stubborn mining (BSM). Both of them can increase the relative extra reward of the adversary and will make the target bribery miners suffer from the bribery miner dilemma. All targets earn less under the Nash equilibrium. For each target, their local optimal strategy is to accept the bribes. However, they will suffer losses, comparing with denying the bribes. Furthermore, for all targets, their global optimal strategy is to deny the bribes. Quantitative analysis and simulation have been verified our theoretical analysis. We propose practical measures to mitigate more advanced mining attack strategies based on bribery mining, and provide new ideas for addressing bribery mining attacks in the future. However, how to completely and effectively prevent these attacks is still needed on further research.

READ FULL TEXT

page 13

page 18

page 19

page 20

research
08/16/2020

Discouraging Pool Block Withholding Attacks in Bitcoins

The arisen of Bitcoin has led to much enthusiasm for blockchain research...
research
06/06/2023

Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG

Bitcoin-NG is an extensible blockchain protocol based on the same trust ...
research
02/11/2019

Mind the Mining

In this paper we revisit the mining strategies in proof of work based cr...
research
02/06/2018

On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners

Eyal and Sirer's selfish mining strategy has demonstrated that Bitcoin s...
research
03/14/2021

Selfish Mining Attacks Exacerbated by Elastic Hash Supply

Several attacks have been proposed against Proof-of-Work blockchains, wh...
research
08/28/2019

An Eye for an Eye: Economics of Retaliation in Mining Pools

Currently, miners typically join mining pools to solve cryptographic puz...
research
01/28/2021

The Tight Bound for Pure Price of Anarchy in an Extended Miner's Dilemma Game

Pool block withholding attack is performed among mining pools in digital...

Please sign up or login with your details

Forgot password? Click here to reset