Title | On the strategy and behavior of bitcoin mining with N-attackers |
Creator | |
Date Issued | 2018 |
Conference Name | 13th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2018 |
Source Publication | ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
![]() |
ISBN | 978-1-4503-5576-6 |
Pages | 357-368 |
Conference Date | JUN 04-08, 2018 |
Conference Place | Incheon, South Korea |
Publisher | Association for Computing Machinery, Inc |
Abstract | Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy has been further discussed by many other works, which analyze the strategy and behavior of a single attacker. The extension of the strategy research is greatly restricted by the assumption that there is only one attacker in the blockchain network, since, in many cases, a proof of work blockchain has multiple attackers. The attackers can be independent of others instead of sharing information and attacking the blockchain as a whole. In this paper, we will establish a new model to analyze the miners' behavior in a proof of work blockchain with multiple attackers. Based on our model, we extend the attackers' strategy by proposing a new strategy set publish-n. Meanwhile, we will also review other attacking strategies such as selfish mining and stubborn mining in our model to explore whether these strategies work or not when there are multiple attackers. The performances of different strategies are compared using relative stale block rate of the attackers. In a proof of work blockchain model with two attackers, strategy publish-n can beat selfish mining by up to 26.3%. © 2018 Association for Computing Machinery. |
Keyword | Bitcoin Mining N-attackers Selfish mining |
DOI | 10.1145/3196494.3196512 |
URL | View source |
Indexed By | CPCI-S |
Language | 英语English |
WOS Research Area | Computer Science |
WOS Subject | Computer Science, Theory & Methods |
WOS ID | WOS:000516620100028 |
Citation statistics | |
Document Type | Conference paper |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/4487 |
Collection | Research outside affiliated institution |
Affiliation | Dept. of ECE, Shanghai Jiao Tong University, Shanghai, China |
Recommended Citation GB/T 7714 | Liu, Hanqing,Ruan, Na,Du, Rongtianet al. On the strategy and behavior of bitcoin mining with N-attackers[C]: Association for Computing Machinery, Inc, 2018: 357-368. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment