4.7 Article

Is semi-selfish mining available without being detected?

期刊

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
卷 37, 期 12, 页码 10576-10597

出版社

WILEY
DOI: 10.1002/int.22656

关键词

forking rate detection; hidden Markov decision process; selfish mining

资金

  1. National Natural Science Foundation of China [62072273, 61962009, 62162008]
  2. Major Scientific and Technological Special Project of Guizhou Province [20183001]
  3. Foundation of Guizhou Province Key Laboratory of Public Big Data [2019BDKFJJ009]
  4. Talent Project of Guizhou Big Data Academy
  5. Guizhou Province Key Laboratory of Public Big Data [[2018]01]

向作者/读者索取更多资源

The paper focuses on the validity of semi-selfish mining attacks while considering the probability of being detected. It is found that although small pools have an advantage in additional rewards, the probability of successfully implementing these attacks is low.
Selfish mining attacks get a high prize due to the additional rewards unproportionate to their mining power (mining pools have particular advantages). Generally, this category of attacks stresses decreasing the threshold to maximize the rewards toward the view of attackers. Semi-selfish mining falls into the family of selfish mining attacks, where the threshold value is approximately 15%. However, it gets little attention to implement these attacks in practical. In this paper, we focus on the validity of semi-selfish mining attacks considering the probability of being detected. More specifically, we discuss mining strategies through backward deduction. That is to say that the attacking states derived from the observable states, which with normal forking rate, just as without semi-selfish mining attacks, toward the view of the honest miners. Rewards distribution is further investigated concerning these strategies. The simulation results indicate that it does not necessarily bring rewards advantage over large pools. Instead, the small pools have an advantage over the additional rewards. However, the probability for small pools to successfully implement these strategies is pretty low. That is, it is impossible for the pools, although profitable for them, to sponsor semi-selfish mining attacks without being detected.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据