bitcoin selfish mining
play

Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some - PowerPoint PPT Presentation

Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some slides heavily inspired by Dr. Moore) s k c a t t a g n i d l o h h t i w k c o l b y r a r o p m e T n i o c t i B Bitcoin Selfish


  1. Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce (some slides heavily inspired by Dr. Moore)

  2. s k c a t t a g n i d l o h h t i w ‐ k c o l b y r a r o p m e T n i o c t i B Bitcoin Selfish Mining Marie Vasek Secure Electric Commerce

  3. Blockchain

  4. Blockchain

  5. Blockchain

  6. Orphaned Blocks • But, what happens when two blocks are found around the same time? • https://blockchain.info/charts/n-orphaned-blocks

  7. 51% attack • Steal coins from existing addresses? • Suppress some transactions? • from the blockchain? • from the p2p network? • Change the block reward? • Destroy confidence in Bitcoin? • https://blockchain.info/pools

  8. 51% Attack IRL • CoiledCoin — killed by a 51% attack in Jan 2012. • Eligius Mining Pool refused any transactions • GHash.io — reached over 50% of Bitcoin mining power in 2014. Committed to never again.

  9. Key point With selfish mining, X% of mining power can gain more than X% of the power/revenue/etc if X ≥ 1/3.

  10. BYOBlockchain? Only then, announce chain to network.

  11. BYOBlockchain?

  12. Detecting Selfish Mining • Detect lots of orphaned blocks • Detect lots of abnormally close blocks timing

  13. But, can we do better? • Stubborn mining: refines selfish mining to earn more $$ • Refined selfish mining: refines exactly when to release the new chain

  14. Sources • Bitcoin and Cryptocurrency Technologies Ch. 5 • Eyal, Ittay, and Emin Gün Sirer. "Majority is not enough: Bitcoin mining is vulnerable." Financial Cryptography and Data Security. Springer, 2014. 436-454. • Sapirshtein, Ayelet, Yonatan Sompolinsky, and Aviv Zohar. "Optimal selfish mining strategies in Bitcoin.” Financial Cryptography and Data Security. Springer, 2016. • Nayak, Kartik, Srijan Kumar, Andrew Miller, and Elaine Shi. “Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.” IEEE Euro S&P. 2016.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend