Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Majority is Not Required: A Rational Analysis of the Private Double-Spend Attack from a Sub-Majority Adversary (2312.07709v1)

Published 12 Dec 2023 in cs.GT and cs.DC

Abstract: We study the incentives behind double-spend attacks on Nakamoto-style Proof-of-Work cryptocurrencies. In these systems, miners are allowed to choose which transactions to reference with their block, and a common strategy for selecting transactions is to simply choose those with the highest fees. This can be problematic if these transactions originate from an adversary with substantial (but less than 50\%) computational power, as high-value transactions can present an incentive for a rational adversary to attempt a double-spend attack if they expect to profit. The most common mechanism for deterring double-spend attacks is for the recipients of large transactions to wait for additional block confirmations (i.e., to increase the attack cost). We argue that this defense mechanism is not satisfactory, as the security of the system is contingent on the actions of its users. Instead, we propose that defending against double-spend attacks should be the responsibility of the miners; specifically, miners should limit the amount of transaction value they include in a block (i.e., reduce the attack reward). To this end, we model cryptocurrency mining as a mean-field game in which we augment the standard mining reward function to simulate the presence of a rational, double-spending adversary. We design and implement an algorithm which characterizes the behavior of miners at equilibrium, and we show that miners who use the adversary-aware reward function accumulate more wealth than those who do not. We show that the optimal strategy for honest miners is to limit the amount of value transferred by each block such that the adversary's expected profit is 0. Additionally, we examine Bitcoin's resilience to double-spend attacks. Assuming a 6 block confirmation time, we find that an attacker with at least 25% of the network mining power can expect to profit from a double-spend attack.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (34)
  1. J. Bonneau, “Why buy when you can rent?” in International Conference on Financial Cryptography and Data Security.   Springer, 2016, pp. 19–26.
  2. D. Palmer, “Bad actors rent hashing power to hit bitcoin gold with new 51% attacks,” https://decrypt.co/41492/rented-hash-power-huge-problem-for-proof-of-work-etc-labs-ceo, 2020.
  3. F. Staff, “Etc labs ceo: Rented hash power is “huge” problem for proof of work,” https://decrypt.co/41492/rented-hash-power-huge-problem-for-proof-of-work-etc-labs-ceo, 2020.
  4. M. Huang, R. P. Malhamé, P. E. Caines et al., “Large population stochastic dynamic games: closed-loop mckean-vlasov systems and the nash certainty equivalence principle,” Communications in Information & Systems, vol. 6, no. 3, pp. 221–252, 2006.
  5. J.-M. Lasry, P.-L. Lions, J.-M. Lasry, and P.-L. Lions, “Mean field games,” Japan. J. Math, vol. 2, pp. 229–260, 2007.
  6. A. Kiayias, E. Koutsoupias, M. Kyropoulou, and Y. Tselekounis, “Blockchain mining games,” in Proceedings of the 2016 ACM Conference on Economics and Computation, 2016, pp. 365–382.
  7. C. Ewerhart, “Finite blockchain games,” Economics Letters, vol. 197, p. 109614, 2020.
  8. R. Singh, A. D. Dwivedi, G. Srivastava, A. Wiszniewska-Matyszkiel, and X. Cheng, “A game theoretic analysis of resource mining in blockchain,” Cluster Computing, vol. 23, no. 3, pp. 2035–2046, 2020.
  9. G. Yuan, “The framework of consensus equilibria for mining-pool games in blockchain ecosystems,” arXiv preprint arXiv:2003.05067, 2020.
  10. Z. Liu, N. C. Luong, W. Wang, D. Niyato, P. Wang, Y.-C. Liang, and D. I. Kim, “A survey on applications of game theory in blockchain,” arXiv preprint arXiv:1902.10865, 2019.
  11. G. Goren and A. Spiegelman, “Mind the mining,” in Proceedings of the 2019 ACM Conference on Economics and Computation, 2019, pp. 475–487.
  12. J. Sun, P. Tang, and Y. Zeng, “Games of miners,” in Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, 2020, pp. 1323–1331.
  13. T. Min and W. Cai, “A security case study for blockchain games,” in 2019 IEEE Games, Entertainment, Media Conference (GEM).   IEEE, 2019, pp. 1–8.
  14. E. Altman, D. Menasché, A. Reiffers-Masson, M. Datar, S. Dhamal, C. Touati, and R. El-Azouzi, “Blockchain competition between miners: a game theoretic perspective,” Frontiers in Blockchain, p. 26, 2020.
  15. Y. Wang, C. Tang, F. Lin, Z. Zheng, and Z. Chen, “Pool strategies selection in pow-based blockchain networks: Game-theoretic analysis,” IEEE Access, vol. 7, pp. 8427–8436, 2019.
  16. M. V. Ferreira and S. M. Weinberg, “Proof-of-stake mining games with perfect randomness,” in Proceedings of the 22nd ACM Conference on Economics and Computation, 2021, pp. 433–453.
  17. R. Lavi, O. Sattath, and A. Zohar, “Redesigning bitcoin’s fee market,” ACM Transactions on Economics and Computation, vol. 10, no. 1, pp. 1–31, 2022.
  18. A. C. chih Yao, “An incentive analysis of some bitcoin fee designs.”
  19. T. Roughgarden, “Transaction fee mechanism design,” ACM SIGecom Exchanges, vol. 19, no. 1, pp. 52–55, 2021.
  20. ——, “Transaction fee mechanism design for the ethereum blockchain: An economic analysis of eip-1559,” arXiv preprint arXiv:2012.00854, 2020.
  21. H. Chung and E. Shi, “Foundations of transaction fee mechanism design,” in Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA).   SIAM, 2023, pp. 3856–3899.
  22. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Business Review, p. 21260, 2008.
  23. M. Rosenfeld, “Analysis of hashrate-based double spending,” arXiv preprint arXiv:1402.2009, 2014.
  24. G. Bissias, B. N. Levine, A. P. Ozisik, and G. Andresen, “An analysis of attacks on blockchain consensus,” arXiv preprint arXiv:1610.07985, 2016.
  25. Y. Sompolinsky and A. Zohar, “Bitcoin’s security model revisited,” arXiv preprint arXiv:1605.09193, 2016.
  26. J. Jang and H.-N. Lee, “Profitable double-spending attacks,” Applied Sciences, vol. 10, no. 23, p. 8477, 2020.
  27. J. Garay, J. Katz, U. Maurer, B. Tackmann, and V. Zikas, “Rational protocol design: Cryptography against incentive-driven adversaries,” in 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.   IEEE, 2013, pp. 648–657.
  28. C. Badertscher, J. Garay, U. Maurer, D. Tschudi, and V. Zikas, “But why does it work? a rational protocol design treatment of bitcoin,” in Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29-May 3, 2018 Proceedings, Part II 37.   Springer, 2018, pp. 34–65.
  29. C. Badertscher, Y. Lu, and V. Zikas, “A rational protocol treatment of 51% attacks,” in Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III 41.   Springer, 2021, pp. 3–32.
  30. Z. Li, A. M. Reppen, and R. Sircar, “A mean field games model for cryptocurrency mining,” arXiv preprint arXiv:1912.01952, 2019.
  31. R. K. Mishra, D. Vasal, and S. Vishwanath, “Model-free reinforcement learning for non-stationary mean field games,” in 2020 59th IEEE Conference on Decision and Control (CDC).   IEEE, 2020, pp. 1032–1037.
  32. C. Bertucci, L. Bertucci, J.-M. Lasry, and P.-L. Lions, “Mean field game approach to bitcoin mining,” arXiv preprint arXiv:2004.08167, 2020.
  33. “Total transaction fees (btc),” accessed on April 19, 2023. [Online]. Available: https://www.blockchain.com/explorer/charts/transaction-fees
  34. “Estimated transaction value (btc),” accessed on April 19, 2023. [Online]. Available: https://www.blockchain.com/explorer/charts/estimated-transaction-volume
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Yanni Georghiades (5 papers)
  2. Rajesh Mishra (7 papers)
  3. Karl Kreder (4 papers)
  4. Sriram Vishwanath (133 papers)

Summary

We haven't generated a summary for this paper yet.