Skip to main content

Selfish Mining in Public Blockchains: A Quantitative Analysis

  • Conference paper
  • First Online:
Performance Evaluation Methodologies and Tools (VALUETOOLS 2023)

Abstract

Blockchains are digital ledgers of transactions that aim to be decentralized, secure, and tamper-proof. To achieve this goal, they rely on a consensus algorithm, with the most well-known being the proof-of-work (PoW) algorithm. In PoW, a group of specialized users known as miners invest a significant amount of energy to secure the blockchain ledger. Miners are incentivized to participate in the network through the potential rewards they can earn, which are based on the number of blocks they are able to consolidate and add to the chain. An important characteristic of the PoW algorithm is that miners’ rewards must be statistically proportional to the amount of computational power (and hence energy) invested in this process. In this work, we study the selfish miner attack by means of a stochastic model based on a quantitative process algebra. When a successful attack occurs, a miner or mining pool is able to receive more rewards than they should, at the expense of other miners. The model analysis allows us to derive the conditions under which the attack becomes convenient for the miners.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alzetta, G., Marin, A., Piazza, C., Rossi, S.: Lumping-based equivalences in Markovian automata: Algorithms and applications to product-form analyses. Inf. Comput. 260, 99–125 (2018)

    Article  MathSciNet  Google Scholar 

  2. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better-how to make bitcoin a better currency. In: Financial Cryptography and Data Security Conference, FC 2012, pp. 399–414. Springer (2012)

    Google Scholar 

  3. Buterin, V., et al.: Ethereum: a next-generation smart contract and decentralized application platform (2014)

    Google Scholar 

  4. Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154–167 (2016)

    Google Scholar 

  5. Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)

    Article  Google Scholar 

  6. Göbel, J., Keeler, H.P., Krzesinski, A.E., Taylor, P.G.: Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform. Eval. 104, 23–41 (2016)

    Article  Google Scholar 

  7. Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press (1996)

    Google Scholar 

  8. Kemeny, J.G., Snell, J.L.: Finite Markov Chains. Springer (1976)

    Google Scholar 

  9. Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., Rosenschein, J.S.: Bitcoin mining pools: a cooperative game theoretic analysis. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 919–927 (2015)

    Google Scholar 

  10. Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 706–719 (2015)

    Google Scholar 

  11. Marin, A., Rossi, S.: On the relations between lumpability and reversibility. In: MASCOTS, pp. 427–432. IEEE Computer Society (2014)

    Google Scholar 

  12. Marin, A., Rossi, S.: On the relations between Markov chain lumpability and reversibility. Acta Informatica 54(5), 447–485 (2017)

    Article  MathSciNet  Google Scholar 

  13. Motlagh, S.G., Mišić, J., Mišić, V.B.: The impact of selfish mining on bitcoin network performance. IEEE Trans. Netw. Sci. Eng. 8(1), 724–735 (2021)

    Article  Google Scholar 

  14. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review (2008)

    Google Scholar 

  15. Rossi, S., Malakhov, I., Marin, A.: Analysis of the confirmation time in proof-of-work blockchains. Futur. Gener. Comput. Syst. 147, 275–291 (2023)

    Article  Google Scholar 

  16. Smuseva, D., Malakhov, I., Marin, A., van Moorsel, A., Rossi, S.: Verifier’s dilemma in ethereum blockchain: A quantitative analysis. In: Quantitative Evaluation of Systems: 19th International Conference, QEST 2022, pp. 317–336. Springer (2022)

    Google Scholar 

  17. Wright, C.S.: The fallacy of the selfish miner in bitcoin: an economic critique. Available at SSRN: https://ssrn.com/abstract=3151923 (2018)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daria Smuseva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Smuseva, D., Marin, A., Rossi, S. (2024). Selfish Mining in Public Blockchains: A Quantitative Analysis. In: Kalyvianaki, E., Paolieri, M. (eds) Performance Evaluation Methodologies and Tools. VALUETOOLS 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 539. Springer, Cham. https://doi.org/10.1007/978-3-031-48885-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-48885-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-48884-9

  • Online ISBN: 978-3-031-48885-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics