Details of Research Outputs

TitleOn the strategy and behavior of bitcoin mining with N-attackers
Creator
Date Issued2018
Conference Name13th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2018
Source PublicationASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
ISBN978-1-4503-5576-6
Pages357-368
Conference DateJUN 04-08, 2018
Conference PlaceIncheon, South Korea
PublisherAssociation for Computing Machinery, Inc
Abstract

Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy has been further discussed by many other works, which analyze the strategy and behavior of a single attacker. The extension of the strategy research is greatly restricted by the assumption that there is only one attacker in the blockchain network, since, in many cases, a proof of work blockchain has multiple attackers. The attackers can be independent of others instead of sharing information and attacking the blockchain as a whole. In this paper, we will establish a new model to analyze the miners' behavior in a proof of work blockchain with multiple attackers. Based on our model, we extend the attackers' strategy by proposing a new strategy set publish-n. Meanwhile, we will also review other attacking strategies such as selfish mining and stubborn mining in our model to explore whether these strategies work or not when there are multiple attackers. The performances of different strategies are compared using relative stale block rate of the attackers. In a proof of work blockchain model with two attackers, strategy publish-n can beat selfish mining by up to 26.3%. © 2018 Association for Computing Machinery.

KeywordBitcoin Mining N-attackers Selfish mining
DOI10.1145/3196494.3196512
URLView source
Indexed ByCPCI-S
Language英语English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Theory & Methods
WOS IDWOS:000516620100028
Citation statistics
Cited Times:30[WOS]   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
Identifierhttp://repository.uic.edu.cn/handle/39GCC9TT/4487
CollectionResearch outside affiliated institution
Affiliation
Dept. of ECE, Shanghai Jiao Tong University, Shanghai, China
Recommended Citation
GB/T 7714
Liu, Hanqing,Ruan, Na,Du, Rongtianet al. On the strategy and behavior of bitcoin mining with N-attackers[C]: Association for Computing Machinery, Inc, 2018: 357-368.
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Liu, Hanqing]'s Articles
[Ruan, Na]'s Articles
[Du, Rongtian]'s Articles
Baidu academic
Similar articles in Baidu academic
[Liu, Hanqing]'s Articles
[Ruan, Na]'s Articles
[Du, Rongtian]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Liu, Hanqing]'s Articles
[Ruan, Na]'s Articles
[Du, Rongtian]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.