Abstract
Blockchains are digital ledgers of transactions that aim to be decentralized, secure, and tamper-proof. To achieve this goal, they rely on a consensus algorithm, with the most well-known being the proof-of-work (PoW) algorithm. In PoW, a group of specialized users known as miners invest a significant amount of energy to secure the blockchain ledger. Miners are incentivized to participate in the network through the potential rewards they can earn, which are based on the number of blocks they are able to consolidate and add to the chain. An important characteristic of the PoW algorithm is that miners’ rewards must be statistically proportional to the amount of computational power (and hence energy) invested in this process. In this work, we study the selfish miner attack by means of a stochastic model based on a quantitative process algebra. When a successful attack occurs, a miner or mining pool is able to receive more rewards than they should, at the expense of other miners. The model analysis allows us to derive the conditions under which the attack becomes convenient for the miners.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alzetta, G., Marin, A., Piazza, C., Rossi, S.: Lumping-based equivalences in Markovian automata: Algorithms and applications to product-form analyses. Inf. Comput. 260, 99–125 (2018)
Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better-how to make bitcoin a better currency. In: Financial Cryptography and Data Security Conference, FC 2012, pp. 399–414. Springer (2012)
Buterin, V., et al.: Ethereum: a next-generation smart contract and decentralized application platform (2014)
Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154–167 (2016)
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)
Göbel, J., Keeler, H.P., Krzesinski, A.E., Taylor, P.G.: Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform. Eval. 104, 23–41 (2016)
Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press (1996)
Kemeny, J.G., Snell, J.L.: Finite Markov Chains. Springer (1976)
Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., Rosenschein, J.S.: Bitcoin mining pools: a cooperative game theoretic analysis. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 919–927 (2015)
Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 706–719 (2015)
Marin, A., Rossi, S.: On the relations between lumpability and reversibility. In: MASCOTS, pp. 427–432. IEEE Computer Society (2014)
Marin, A., Rossi, S.: On the relations between Markov chain lumpability and reversibility. Acta Informatica 54(5), 447–485 (2017)
Motlagh, S.G., Mišić, J., Mišić, V.B.: The impact of selfish mining on bitcoin network performance. IEEE Trans. Netw. Sci. Eng. 8(1), 724–735 (2021)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review (2008)
Rossi, S., Malakhov, I., Marin, A.: Analysis of the confirmation time in proof-of-work blockchains. Futur. Gener. Comput. Syst. 147, 275–291 (2023)
Smuseva, D., Malakhov, I., Marin, A., van Moorsel, A., Rossi, S.: Verifier’s dilemma in ethereum blockchain: A quantitative analysis. In: Quantitative Evaluation of Systems: 19th International Conference, QEST 2022, pp. 317–336. Springer (2022)
Wright, C.S.: The fallacy of the selfish miner in bitcoin: an economic critique. Available at SSRN: https://ssrn.com/abstract=3151923 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Smuseva, D., Marin, A., Rossi, S. (2024). Selfish Mining in Public Blockchains: A Quantitative Analysis. In: Kalyvianaki, E., Paolieri, M. (eds) Performance Evaluation Methodologies and Tools. VALUETOOLS 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 539. Springer, Cham. https://doi.org/10.1007/978-3-031-48885-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-48885-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-48884-9
Online ISBN: 978-3-031-48885-6
eBook Packages: Computer ScienceComputer Science (R0)