Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3243734.3243737acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

The Gap Game

Published: 15 October 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Blockchain-based cryptocurrencies secure a decentralized consensus protocol by incentives. The protocol participants, called miners, generate (mine) a series of blocks, each containing monetary transactions created by system users. As incentive for participation, miners receive newly minted currency and transaction fees paid by transaction creators. Blockchain bandwidth limits lead users to pay increasing fees in order to prioritize their transactions. However, most prior work focused on models where fees are negligible. In a notable exception, Carlsten et al. [17] postulated that if incentives come only from fees then a mining gap would form~--- miners would avoid mining when the available fees are insufficient. In this work, we analyze cryptocurrency security in realistic settings, taking into account all elements of expenses and rewards. To study when gaps form, we analyze the system as a game we call the gap game. We analyze the game with a combination of symbolic and numeric analysis tools in a wide range of scenarios. Our analysis confirms Carlsten et al.'s postulate; indeed, we show that gaps form well before fees are the only incentive, and analyze the implications on security. Perhaps surprisingly, we show that different miners choose different gap sizes to optimize their utility, even when their operating costs are identical. Alarmingly, we see that the system incentivizes large miner coalitions, reducing system decentralization. We describe the required conditions to avoid the incentive misalignment, providing guidelines for future cryptocurrency design.

    Supplementary Material

    MP4 File (p713-tsabary.mp4)

    References

    [1]
    Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. 2016. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus. arXiv preprint arXiv:1612.02916 (2016).
    [2]
    Joël Alwen, Jeremiah Blocki, and Krzysztof Pietrzak. 2018. Sustained space complexity. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 99--130.
    [3]
    Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On Bitcoin and red balloons. In ACM Conference on Electronic Commerce. Valencia, Spain, 56--73.
    [4]
    Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas. 2018. But why does it work? A rational protocol design treatment of bitcoin Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 34--65.
    [5]
    Bruno Biais, Christophe Bisiere, Matthieu Bouvard, and Catherine Casamatta. 2018. The blockchain folk theorem. ssrn id 3108601 (2018).
    [6]
    Will Binns. 2018. How do I calculate my transaction fee? (2018). https://support.earn.com/digital-currency/bitcoin-transactions-and-fees/how-do-i-calculate-my-transaction-fee
    [7]
    Bitcoin Cash community. 2018. Bitcoin Cash Site. https://www.bitcoincash.org/, retrieved May. 2018. (2018).
    [8]
    BitcoinWiki. 2018. Controlled supply. https://en.bitcoin.it/wiki/Controlled_supply, retrieved May. 2018. (2018).
    [9]
    Bitmain.com. 2018. Antminer S9i. https://shop.bitmain.com/product/detail?pid=00020180503144211733Dd3wi9Ez06A0, retrieved May. 2018. (2018).
    [10]
    Blockchain.info. 2018. Bitcoin Market Capitalization. http://blockchain.info/charts/market-cap, retrieved Feb. 2018. (2018).
    [11]
    Blockchain.info. 2018. Bitcoin Mining Pools. https://blockchain.info/pools, retrieved May. 2018. (2018).
    [12]
    Blockchain.info. 2018. Mempool Transaction Count. https://blockchain.info/charts/mempool-count, retrieved Feb. 2018. (2018).
    [13]
    Blockchain.info. 2018. Transaction Fees. https://blockchain.info/charts/transaction-fees, retrieved Feb. 2018. (2018).
    [14]
    Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. Research perspectives on Bitcoin and second-generation cryptocurrencies Symposium on Security and Privacy. IEEE, San Jose, CA, USA.
    [15]
    Ryan Browne. 2017. The cheapest and most expensive countries to mine bitcoin. (2017). https://www.cnbc.com/2018/02/15/the-cheapest-and-most-expensive-countries-to-mine-bitcoin.html
    [16]
    Vitalik Buterin. 2013. A Next Generation Smart Contract & Decentralized Application Platform. https://www.ethereum.org/ pdfs/EthereumWhitePaper.pdf/, retrieved Feb. 2015. (2013).
    [17]
    Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, and Arvind Narayanan. 2016. On the Instability of Bitcoin Without the Block Reward Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 154--167.
    [18]
    Coinmarketcap.com. 2018. Cryptocurrency Market Capitalizations. (2018). https://coinmarketcap.com/
    [19]
    Ellery Davies. 2015. Why is there a limited amount of bitcoin available? (2015). https://www.quora.com/Why-is-there-a-limited-amount-of-bitcoin-available
    [20]
    Wouter den Haan, Martin Ellison, Ethan Ilzetzki, Michael McMahon, and Ricardo Reis. 2017. Economists relaxed about Bitcoin: New CFM-CEPR expert survey on cryptocurrencies, the financial system, and economic policy. VoxEU. org Vol. 21 (2017).
    [21]
    Digiconomist.net. 2017. A Deep Dive in a Real-World Bitcoin Mine. (2017). https://digiconomist.net/deep-dive-real-world-bitcoin-mine
    [22]
    Digiconomist.net. 2018 a. Bitcoin Energy Consumption Index. (2018). https://digiconomist.net/bitcoin-energy-consumption
    [23]
    Digiconomist.net. 2018 b. Ethereum Energy Consumption Index. (2018). https://digiconomist.net/ethereum-energy-consumption
    [24]
    Cynthia Dwork and Moni Naor. 1993. Pricing via Processing or Combatting Junk Mail. Springer Berlin Heidelberg, Berlin, Heidelberg, 139--147.
    [25]
    Earn.com. 2018. Predicting Bitcoin Fees For Transactions. (2018). https://bitcoinfees.earn.com/
    [26]
    Etherscan.io. 2018. Ether Supply Growth. https://etherscan.io/chart/ethersupply, retrieved Feb. 2018. (2018).
    [27]
    Etherscan.io. 2018. Ether Transaction Fees. https://etherscan.io/chart/transactionfee, retrieved Feb. 2018. (2018).
    [28]
    Etherscan.io. 2018. Pending Transactions. https://etherscan.io/chart/pendingtx, retrieved Feb. 2018. (2018).
    [29]
    Ittay Eyal. 2015. The miner's dilemma. In Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 89--103.
    [30]
    Ittay Eyal. 2015. The Miner's Dilemma. In IEEE Symposium on Security and Privacy. 89--103.
    [31]
    Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert Van Renesse. 2016 a. Bitcoin-ng: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). USENIX Association, 45--59.
    [32]
    Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert Van Renesse. 2016 b. Bitcoin-NG: A Scalable Blockchain Protocol. In NSDI. 45--59.
    [33]
    Ittay Eyal and Emin Gün Sirer. 2014. Majority is not Enough: Bitcoin Mining is Vulnerable Financial Cryptography and Data Security.
    [34]
    Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 281--310.
    [35]
    Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 3--16.
    [36]
    Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 51--68.
    [37]
    Gur Huberman, Jacob D Leshno, and Ciamac C Moallemi. 2017. Monopoly without a monopolist: An economic analysis of the bitcoin payment system. ssrn id 3025604 (2017).
    [38]
    Intel. 2018. Sawtooth-core source code (validator). (2018). https://github.com/hyperledger/sawtooth-core/tree/0--7/validator/sawtooth_validator/consensus/poet1 {Online; accessed May-2018}.
    [39]
    Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure Information Networks. Springer, 258--272.
    [40]
    Ghassan Karame, Elli Androulaki, and Srdjan Capkun. 2012. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. IACR Cryptology ePrint Archive Vol. 2012, 248 (2012).
    [41]
    Sudhir Khatwani. 2018. Ethereum: Ether, Ether Gas, Gas Limit, Gas Price and Fees. (2018). https://coinsutra.com/ethereum-gas-limit-gas-price-fees/
    [42]
    Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol Annual International Cryptology Conference. Springer, 357--388.
    [43]
    Joshua A Kroll, Ian C Davey, and Edward W Felten. 2013. The Economics of Bitcoin Mining or, Bitcoin in the Presence of Adversaries Workshop on the Economics of Information Security.
    [44]
    Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim. 2017. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 195--209.
    [45]
    Ron Lavi, Or Sattath, and Aviv Zohar. 2017. Redesigning Bitcoin's fee market. arXiv preprint arXiv:1709.08881 (2017).
    [46]
    Litecoin Project. {n. d.}. Litecoin, open source P2P digital currency. https://litecoin.org, retrieved Nov. 2014. (. {n. d.}).
    [47]
    Samara Malkin. 2018. Cheapest Places Mining Bitcoin. (2018). https://cryptocurrencynews.com/daily-news/cryptocurrency-mining/cheapest-places-mining-bitcoin/
    [48]
    Andrew Miller, Elaine Shi, Ari Juels, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing Bitcoin Work for Data Preservation Proceedings of the IEEE Symposium on Security and Privacy. IEEE, San Jose, CA, USA. http://research.microsoft.com/apps/pubs/default.aspx?id=217984
    [49]
    Malte Möser and Rainer Böhme. 2015. Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 19--33.
    [50]
    Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, and Richard Brooks. 2016. A brief survey of cryptocurrency systems. In Privacy, Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 745--752.
    [51]
    Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http://www.bitcoin.org/bitcoin.pdf. (2008).
    [52]
    Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2015. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. IACR Cryptology ePrint Archive Vol. 2015 (2015), 796. http://eprint.iacr.org/2015/796
    [53]
    Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the Blockchain Protocol in Asynchronous Networks Advances in Cryptology -- EUROCRYPT 2017, Jean-Sébastien Coron and Jesper Buus Nielsen (Eds.). Springer International Publishing, Cham, 643--673.
    [54]
    Rafael Pass and Elaine Shi. 2016. Hybrid Consensus: Efficient Consensus in the Permissionless Model. Cryptology ePrint Archive, Report 2016/917. (2016). http://eprint.iacr.org/2016/917
    [55]
    Rafael Pass and Elaine Shi. 2017. Fruitchains: A fair blockchain. In Proceedings of the ACM Symposium on Principles of Distributed Computing. ACM, 315--324.
    [56]
    Rafael Pass and Elaine Shi. 2017. The sleepy model of consensus. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 380--409.
    [57]
    Nathan Reiff. 2017. What Happens to Bitcoin After All 21 Million are Mined? (2017). https://www.investopedia.com/news/what-happens-bitcoin-after-all-21-million-are-mined/
    [58]
    Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security.
    [59]
    Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from bitcoin Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 459--474.
    [60]
    Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden. 2016. Incentive compatibility of bitcoin mining pool reward functions International Conference on Financial Cryptography and Data Security. Springer, 477--498.
    [61]
    Bayu Adhi Tama, Bruno Joachim Kweka, Youngho Park, and Kyung-Hyune Rhee. 2017. A critical review of blockchain and its current applications Electrical Engineering and Computer Science (ICECOS), 2017 International Conference on. IEEE, 109--113.
    [62]
    Jordan Tuwiner. 2017. Bitcoin Mining Hardware. (2017). https://www.buybitcoinworldwide.com/mining/hardware/
    [63]
    Cindy Wang. 2017. A Visit to a Bitcoin Mining Farm in Sichuan, China Reveals Troubles Beyond Regulation. (2017). https://news.bitcoin.com/a-visit-to-a-bitcoin-mining-farm-in-sichuan-china-reveals-troubles-beyond-regulation/
    [64]
    wikipedia.com. {n. d.}. Electricity Pricing. https://en.wikipedia.org/wiki/Electricity_pricing, retrieved May. 2018. (. {n. d.}).
    [65]
    Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, and Robbert Van Renesse. 2017. REM: Resource-Efficient Mining for Blockchains. IACR Cryptology ePrint Archive Vol. 2017 (2017), 179.

    Cited By

    View all
    • (2024)Exploring Blockchain Technology through a Modular Lens: A SurveyACM Computing Surveys10.1145/365728856:9(1-39)Online publication date: 11-Apr-2024
    • (2023)FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tampsDistributed Ledger Technologies: Research and Practice10.1145/36163972:4(1-26)Online publication date: 14-Dec-2023
    • (2023)Black Swan in Blockchain: Micro Analysis of Natural ForkingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321944320:6(4443-4454)Online publication date: Nov-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
    October 2018
    2359 pages
    ISBN:9781450356930
    DOI:10.1145/3243734
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchains
    2. centralization
    3. cryptocurrency
    4. game theory
    5. mining gap

    Qualifiers

    • Research-article

    Funding Sources

    • The Israel cyber bureau
    • Technion Hiroshi Fujiwara cyber-security research center
    • Israel Science Foundation

    Conference

    CCS '18
    Sponsor:

    Acceptance Rates

    CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)36
    • Downloads (Last 6 weeks)3

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Exploring Blockchain Technology through a Modular Lens: A SurveyACM Computing Surveys10.1145/365728856:9(1-39)Online publication date: 11-Apr-2024
    • (2023)FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tampsDistributed Ledger Technologies: Research and Practice10.1145/36163972:4(1-26)Online publication date: 14-Dec-2023
    • (2023)Black Swan in Blockchain: Micro Analysis of Natural ForkingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321944320:6(4443-4454)Online publication date: Nov-2023
    • (2023)WeRLman: To Tackle Whale (Transactions), Go Deep (RL)2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179444(93-110)Online publication date: May-2023
    • (2023)SoK: Decentralized Finance (DeFi) Attacks2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179435(2444-2461)Online publication date: May-2023
    • (2023)Mitigating Undercutting Attacks: Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule2023 IEEE International Conference on Blockchain (Blockchain)10.1109/Blockchain60715.2023.00014(25-32)Online publication date: 17-Dec-2023
    • (2023)Incentives for Distributed LedgersEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1666-1(1-3)Online publication date: 28-Jul-2023
    • (2023)Dissecting Bitcoin and Ethereum Transactions: On the Lack of Transaction Contention and Prioritization Transparency in BlockchainsFinancial Cryptography and Data Security10.1007/978-3-031-47751-5_13(221-240)Online publication date: 1-Dec-2023
    • (2023)Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!Financial Cryptography and Data Security. FC 2022 International Workshops10.1007/978-3-031-32415-4_6(74-92)Online publication date: 22-Jul-2023
    • (2022)Redesigning Bitcoin’s Fee MarketACM Transactions on Economics and Computation10.1145/353079910:1(1-31)Online publication date: 18-May-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media