Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2015.13guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The Miner's Dilemma

Published: 17 May 2015 Publication History

Abstract

An open distributed system can be secured by requiring participants to present proof of work and rewarding them for participation. The Bit coin digital currency introduced this mechanism, which is adopted by almost all contemporary digital currencies and related services. A natural process leads participants of such systems to form pools, where members aggregate their power and share the rewards. Experience with Bit coin shows that the largest pools are often open, allowing anyone to join. It has long been known that a member can sabotage an open pool by seemingly joining it but never sharing its proofs of work. The pool shares its revenue with the attacker, and so each of its participants earns less. We define and analyze a game where pools use some of their participants to infiltrate other pools and perform such an attack. With any number of pools, no-pool-attacks is not a Nash equilibrium. We study the special cases where either two pools or any number of identical pools play the game and the rest of the participants are uninvolved. In both of these cases there exists an equilibrium that constitutes a tragedy of the commons where the participating pools attack one another and earn less than they would have if none had attacked. For two pools, the decision whether or not to attack is the miner's dilemma, an instance of the iterative prisoner's dilemma. The game is played daily by the active Bit coin pools, which apparently choose not to attack. If this balance breaks, the revenue of open pools might diminish, making them unattractive to participants.

Cited By

View all
  • (2024)A Game Theoretical Analysis of Non-linear Blockchain SystemDistributed Ledger Technologies: Research and Practice10.1145/36071953:1(1-24)Online publication date: 18-Mar-2024
  • (2023)A Survey of Blockchain Consensus ProtocolsACM Computing Surveys10.1145/357984555:13s(1-35)Online publication date: 13-Jul-2023
  • (2023)How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting GovernanceProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623171(150-164)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '15: Proceedings of the 2015 IEEE Symposium on Security and Privacy
May 2015
923 pages
ISBN:9781467369497

Publisher

IEEE Computer Society

United States

Publication History

Published: 17 May 2015

Author Tags

  1. bitcoin
  2. cryptocurrency
  3. mining
  4. pools
  5. proof of work

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Game Theoretical Analysis of Non-linear Blockchain SystemDistributed Ledger Technologies: Research and Practice10.1145/36071953:1(1-24)Online publication date: 18-Mar-2024
  • (2023)A Survey of Blockchain Consensus ProtocolsACM Computing Surveys10.1145/357984555:13s(1-35)Online publication date: 13-Jul-2023
  • (2023)How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting GovernanceProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623171(150-164)Online publication date: 15-Nov-2023
  • (2023)Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the WildProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616677(326-340)Online publication date: 15-Nov-2023
  • (2022)BlockchainProceedings of the Winter Simulation Conference10.5555/3586210.3586233(283-297)Online publication date: 11-Dec-2022
  • (2022)Social Choice Around the Block: On the Computational Social Choice of BlockchainProceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems10.5555/3535850.3536111(1788-1793)Online publication date: 9-May-2022
  • (2022)Selection Strategy of Mining Pool under Various Different Payment MechanismsSecurity and Communication Networks10.1155/2022/82651402022Online publication date: 1-Jan-2022
  • (2022)How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A SurveyACM Computing Surveys10.1145/353960455:7(1-38)Online publication date: 15-Dec-2022
  • (2022)Evaluating Blockchain Protocols with Abusive ModelingProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3497757(109-122)Online publication date: 30-May-2022
  • (2022)Cyclic Arbitrage in Decentralized ExchangesCompanion Proceedings of the Web Conference 202210.1145/3487553.3524201(12-19)Online publication date: 25-Apr-2022
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media