3.8 Proceedings Paper

The Impact Analysis of Multiple Miners and Propagation Delay on Selfish Mining

出版社

IEEE COMPUTER SOC
DOI: 10.1109/COMPSAC51774.2021.00101

关键词

Blockchain; consensus protocol; selfish mining; propagation delay

资金

  1. National Key Research and Development Program of China [2020YFC1523203]
  2. Strategic Priority Research Program of the Chinese Academy of Sciences [XDA20080200]
  3. Blockchain Technology and Application Joint Laboratory, Guiyang Academy of Information Technology (Institute of Software Chinese Academy of Sciences Guiyang Branch)

向作者/读者索取更多资源

This study explores the impact of multiple miners and propagation delay on selfish mining in Bitcoin. A new selfish mining strategy is proposed to address these factors, and a simulation approach is designed to analyze its performance. Empirical findings show that blockchain systems with higher orphan rates are more vulnerable to selfish mining attacks.
Bitcoin has emerged as a popular decentralized cryptocurrency and attracted much attention from the public. Bitcoin embodies the Nakamoto consensus to reach an agreement about its blockchain ledger. However, the Nakamoto consensus can suffer from selfish mining attacks. Existing studies on selfish mining usually assume that the total mining power is divided into two parts (i.e., honest and selfish), and ignore propagation delay among miners. The assumptions cannot reflect real-world scenarios, in which multiple miners generate blocks at a fixed interval and propagate them with certain delay. Therefore, it is unknown how the practical factors, i.e., multiple miners and propagation delay, can affect selfish mining. In this paper, we explore the impact of multiple miners and propagation delay on selfish mining. First, we propose a new selfish mining strategy that can handle these factors. Second, we design a simulation approach to analyze the performance of the new selfish mining strategy. From our empirical study we observe many interesting findings that can be utilized in combating selfish mining. For example, the blockchain system with a higher orphan rate is more vulnerable to the selfish mining attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据