IDEAS home Printed from https://ideas.repec.org/a/spr/jcomop/v43y2022i2d10.1007_s10878-021-00768-4.html
   My bibliography  Save this article

Discouraging pool block withholding attacks in Bitcoin

Author

Listed:
  • Zhihuai Chen

    (Chinese Academy of Sciences (CAS)
    University of Chinese Academy of Sciences)

  • Bo Li

    (The Hong Kong Polytechnic University)

  • Xiaohan Shan

    (Tsinghua University)

  • Xiaoming Sun

    (Chinese Academy of Sciences (CAS)
    University of Chinese Academy of Sciences)

  • Jialin Zhang

    (Chinese Academy of Sciences (CAS)
    University of Chinese Academy of Sciences)

Abstract

The existence of mining pools in Bitcoin enables the miners to gain more stable reward. However, it is proved that the pools are vulnerable for security attacks. A strategic pool manager has strong incentive to launch pool block withholding attack by sending some of her miners to infiltrate the other pools. The infiltrating miners try to find (partial) proof-of-work solutions but discard the solution that can actually create blocks. As it is hard to recognize malicious miners,these miners still get reward in the infiltrated pools. In this work, we revisit the game-theoretic model for pool block withholding attacks and propose a revised approach to reallocate the reward to the miners. Instead of proportionally allocating the reward to all miners, a pool manager deducts a fraction from the reward to award the miner who actually mined the block. Accordingly, we prove that, under our scheme, for any number of mining pools, no-pool-attacks is always a Nash equilibrium. Moreover, with only two minority mining pools, no-pool-attacks is the unique Nash equilibrium

Suggested Citation

  • Zhihuai Chen & Bo Li & Xiaohan Shan & Xiaoming Sun & Jialin Zhang, 2022. "Discouraging pool block withholding attacks in Bitcoin," Journal of Combinatorial Optimization, Springer, vol. 43(2), pages 444-459, March.
  • Handle: RePEc:spr:jcomop:v:43:y:2022:i:2:d:10.1007_s10878-021-00768-4
    DOI: 10.1007/s10878-021-00768-4
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10878-021-00768-4
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10878-021-00768-4?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Cheng Yukun & Xu Zhiqi & Yao Shuangliang, 2021. "The Evolutionary Equilibrium of Block Withholding Attack," Journal of Systems Science and Information, De Gruyter, vol. 9(3), pages 266-279, June.
    2. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    3. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    4. Ahmad Firdaus & Mohd Faizal Ab Razak & Ali Feizollah & Ibrahim Abaker Targio Hashem & Mohamad Hazim & Nor Badrul Anuar, 2019. "The rise of “blockchain”: bibliometric analysis of blockchain study," Scientometrics, Springer;Akadémiai Kiadó, vol. 120(3), pages 1289-1331, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jcomop:v:43:y:2022:i:2:d:10.1007_s10878-021-00768-4. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.