Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some - - PowerPoint PPT Presentation

bitcoin selfish mining
SMART_READER_LITE
LIVE PREVIEW

Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some - - PowerPoint PPT Presentation

Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some slides heavily inspired by Dr. Moore) s k c a t t a g n i d l o h h t i w k c o l b y r a r o p m e T n i o c t i B Bitcoin Selfish


slide-1
SLIDE 1

Bitcoin Selfish Mining

Marie Vasek Secure Electric Commerce

(some slides heavily inspired by Dr. Moore)

slide-2
SLIDE 2

Marie Vasek Secure Electric Commerce

B i t c

  • i

n T e m p

  • r

a r y b l

  • c

k ‐ w i t h h

  • l

d i n g a t t a c k s

Bitcoin Selfish Mining

slide-3
SLIDE 3

Blockchain

slide-4
SLIDE 4

Blockchain

slide-5
SLIDE 5

Blockchain

slide-6
SLIDE 6

Orphaned Blocks

  • But, what happens when two blocks are found

around the same time?

  • https://blockchain.info/charts/n-orphaned-blocks
slide-7
SLIDE 7

51% attack

  • Steal coins from existing addresses?
  • Suppress some transactions?
  • from the blockchain?
  • from the p2p network?
  • Change the block reward?
  • Destroy confidence in Bitcoin?
  • https://blockchain.info/pools
slide-8
SLIDE 8

51% Attack IRL

  • CoiledCoin — killed by a 51% attack in Jan 2012.
  • Eligius Mining Pool refused any transactions
  • GHash.io — reached over 50% of Bitcoin mining

power in 2014. Committed to never again.

slide-9
SLIDE 9

Key point

With selfish mining, X% of mining power can gain more than X% of the power/revenue/etc if X ≥1/3.

slide-10
SLIDE 10

Only then, announce chain to network.

BYOBlockchain?

slide-11
SLIDE 11

BYOBlockchain?

slide-12
SLIDE 12

Detecting Selfish Mining

  • Detect lots of orphaned blocks
  • Detect lots of abnormally close blocks timing
slide-13
SLIDE 13

But, can we do better?

  • Stubborn mining: refines selfish mining to earn

more $$

  • Refined selfish mining: refines exactly when to

release the new chain

slide-14
SLIDE 14

Sources

  • Bitcoin and Cryptocurrency Technologies Ch. 5
  • Eyal, Ittay, and Emin Gün Sirer. "Majority is not enough:

Bitcoin mining is vulnerable." Financial Cryptography and Data Security. Springer, 2014. 436-454.

  • Sapirshtein, Ayelet, Yonatan Sompolinsky, and Aviv Zohar.

"Optimal selfish mining strategies in Bitcoin.” Financial Cryptography and Data Security. Springer, 2016.

  • Nayak, Kartik, Srijan Kumar, Andrew Miller, and Elaine Shi.

“Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.” IEEE Euro S&P. 2016.