bitcoin selfish mining
play

Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some - PowerPoint PPT Presentation

Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some slides heavily inspired by Dr. Moore) s k c a t t a g n i d l o h h t i w k c o l b y r a r o p m e T n i o c t i B Bitcoin Selfish


  1. Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some slides heavily inspired by Dr. Moore)

  2. s k c a t t a g n i d l o h h t i w ‐ k c o l b y r a r o p m e T n i o c t i B Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce

  3. Blockchain

  4. Blockchain

  5. Blockchain

  6. Orphaned Blocks • But, what happens when two blocks are found around the same time? • https://blockchain.info/charts/n-orphaned-blocks

  7. 51% attack • Steal coins from existing addresses? • Suppress some transactions? • from the blockchain? • from the p2p network? • Change the block reward? • Destroy confidence in Bitcoin? • https://blockchain.info/pools

  8. 51% Attack IRL • CoiledCoin — killed by a 51% attack in Jan 2012. • Eligius Mining Pool refused any transactions • GHash.io — reached over 50% of Bitcoin mining power in 2014. Committed to never again.

  9. Key point With selfish mining, X% of mining power can gain more than X% of the power/revenue/etc if X ≥ 1/3.

  10. BYOBlockchain? Only then, announce chain to network.

  11. BYOBlockchain?

  12. Detecting Selfish Mining • Detect lots of orphaned blocks • Detect lots of abnormally close blocks timing

  13. But, can we do better? • Stubborn mining: refines selfish mining to earn more $$ • Refined selfish mining: refines exactly when to release the new chain

  14. Sources • Bitcoin and Cryptocurrency Technologies Ch. 5 • Eyal, Ittay, and Emin Gün Sirer. "Majority is not enough: Bitcoin mining is vulnerable." Financial Cryptography and Data Security. Springer, 2014. 436-454. • Sapirshtein, Ayelet, Yonatan Sompolinsky, and Aviv Zohar. "Optimal selfish mining strategies in Bitcoin.” Financial Cryptography and Data Security. Springer, 2016. • Nayak, Kartik, Srijan Kumar, Andrew Miller, and Elaine Shi. “Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.” IEEE Euro S&P. 2016.

Recommend


More recommend