Bitcoin Mining is Vulnerable Ittay Eyal and Emin G un Sirer - - PowerPoint PPT Presentation

bitcoin mining is vulnerable
SMART_READER_LITE
LIVE PREVIEW

Bitcoin Mining is Vulnerable Ittay Eyal and Emin G un Sirer - - PowerPoint PPT Presentation

Majority is not Enough: Bitcoin Mining is Vulnerable Ittay Eyal and Emin G un Sirer 2019.03.25 1 Ittay Eyal 2 Cryptocurrencies Popular algorithm: PoW 4 Proof-of-Work Mining They use blockcha kchain to run without a trusted third


slide-1
SLIDE 1

Majority is not Enough: Bitcoin Mining is Vulnerable

1

Ittay Eyal and Emin G¨un Sirer

2019.03.25

slide-2
SLIDE 2

Ittay Eyal

2

slide-3
SLIDE 3

Cryptocurrencies

slide-4
SLIDE 4

Popular algorithm: PoW

4

slide-5
SLIDE 5

Proof-of-Work Mining

 They use blockcha kchain to run without a trusted third party.  Miners generate blocks by spending their comp mputatio utationa nal power er.  If a miner generates a valid block, he earns re rewar ard d for t r the block.  This process is competi etiti tive ve.

12.5 5 BTC

Block

  • ckch

chain ain New Block

  • ck

(N (N-1) 1)-th th Block

N-th th Bloc

  • ck

k

(N+1)-th th Block

Miner ner

slide-6
SLIDE 6

Mining Difficulty

Ti Time Di Diffic iculty ulty

Inc ncrease! rease!

From “https://blockchain.info”

slide-7
SLIDE 7

Can we earn the extra reward through fork?

 The change of mining difficulty  Validators consider the expected relative revenue per one round (10 mins) as their payoff.

7

slide-8
SLIDE 8

Can we earn the extra reward through fork?

 The change of mining difficulty  Validators consider the expected relative revenue per one round (10 mins) as their payoff.

8

If a miner possesses 10% of the total computational power?

slide-9
SLIDE 9

Can we earn the extra reward through fork?

 The change of mining difficulty  Validators consider the expected relative revenue per one round (10 mins) as their payoff.

9

If a miner possesses 10% of the total computational power? He earns ns 10% of

  • f t

the tota tal l reward. ard.

slide-10
SLIDE 10

Poisson distribution

 The Poisson distribution expresses the probability of a given number of events occurring in a fixed interval of time or space if these events occur with a known constant rate and indepen ependently dently of the time since the last event.

10

Pr[𝑙 events in one interval]=𝑓−𝜇 𝜇𝑙 𝑙!

slide-11
SLIDE 11

Poisson distribution

 The Poisson distribution expresses the probability of a given number of events occurring in a fixed interval of time or space if these events occur with a known constant rate and indepen ependently dently of the time since the last event.

11

Pr[𝑙 events in one interval]=𝑓−𝜇 𝜇𝑙 𝑙!

In the he Bi Bitco coin in sy syst stem em, , one event nt means ns a ge generat ration ion of o

  • ne block

ck.

slide-12
SLIDE 12

The 51% Attack

12

slide-13
SLIDE 13

51% Attack

 Majority of hashing power has voted for transactions on longest chain.

– It is costly to increase voting power – Players are not motivated to cheat

 If any party controls majority of hashing power, they can:

– Undo the past – Deny mining rewards – Undermine the currency

slide-14
SLIDE 14

Goldfinger Attack

 In the James Bond movie….  The attacker’s goal is to destroy Bitcoin by executing the 51% attack.  Is a realistic attack?

slide-15
SLIDE 15

Selfish Mining

15

slide-16
SLIDE 16

Selfish Mining

Forks

– Due to the nonzero block propagation delay, nodes can have different views. – When a fork occurs, only one block becomes valid.

(N (N-1) 1)-th th Block (N+1)-th th Bl Block

N-th th Bloc

  • ck

k

(N+1)-th th Block

Fork

Which of two blocks should I choose as a main chain?

slide-17
SLIDE 17

Selfish Mining

 Generate intentional forks adaptively.

– An attacker finds a valid block and propagates the block when en anot

  • ther

her bloc

  • ck

k is found d by an honest est node.

Force the honest miners into wasting victims’ computations on the stale public branch.

slide-18
SLIDE 18

Strategy

18

slide-19
SLIDE 19

Strategy

19

slide-20
SLIDE 20

Strategy

20

slide-21
SLIDE 21

Strategy

21

slide-22
SLIDE 22

Strategy

22

slide-23
SLIDE 23

Analysis

 The states of the system represent the lead of the selfish pool; that is, the difference between the number of unpublished blocks in the pool’s private branch and the length of the public branch.

23

slide-24
SLIDE 24

State Probabilities

24

slide-25
SLIDE 25

Simulation

 𝛿: An attacker’s network capability  When an attacker possesses more than 33% computational power, the attacker can always earn extra rewards.

slide-26
SLIDE 26

Observation

26

slide-27
SLIDE 27

Observation

27

The e selfi lfish sh poo

  • ol

l wou

  • uld

ld there refor fore e increa rease se in size, e, unop

  • pposed

posed by any y mechan chanism ism, , tow

  • wards

ards a majo ajori rity ty.

slide-28
SLIDE 28

Countermeasure

 When a miner learns of competing branches of the same length, it should propagate all of them, and choose which one to mine on unif iform

  • rmly

ly at rand ndom.

28

𝛿=

1 2 , Threshold= 1 4

slide-29
SLIDE 29

Selfish Mining

slide-30
SLIDE 30

Selfish Mining

Im Impra practical! ctical!

slide-31
SLIDE 31

Concurrent paper

 Theoretical Bitcoin Attacks with less than Half of the Computational Power

31

slide-32
SLIDE 32

Impractical

 The value of γ cannot be 1 because when the intentional fork occurs, the honest miner who generated a block will select his block, not that of the selfish miner.  Honest miners can easily detect that their pool manager is a selfish mining attacker.

– If the manager does not propagate blocks immediately when honest miners generate blocks, the honest miners will know that their pool manager is an attacker. – The blockchain has an abnormal shape when a selfish miner exists.

slide-33
SLIDE 33

Optimal selfish mining

 Optimal selfish mining strategies in bitcoin  Stubborn mining: Generalizing selfish mining and combining with an eclipse attack …..

33

slide-34
SLIDE 34

Yu Yujin jin Kwon

  • n

dbwls872 wls8724@kaist 4@kaist.ac .ac.kr .kr