mining pools
play

Mining Pools Prof. Tom Austin San Jos State University Review: - PowerPoint PPT Presentation

Cryptocurrencies & Security on the Blockchain Mining Pools Prof. Tom Austin San Jos State University Review: Bitcoin mining Miners verify transactions Must find a proof-of-work. Reward: newly generated bitcoins, plus


  1. Cryptocurrencies & Security on the Blockchain Mining Pools Prof. Tom Austin San José State University

  2. Review: Bitcoin mining • Miners verify transactions – Must find a proof-of-work. – Reward: newly generated bitcoins, plus transaction fees. • One-CPU-one-vote • Key to Bitcoin's decentralization

  3. Bitcoin Mining Rig, 2009

  4. Bitcoin Hash Rate Over Time

  5. Bitcoin Mining Rig(s), today

  6. Application-Specific Integrated Circuit (ASIC) • Speed up mining • Expensive • Off-the-shelf hardware cannot compete – On the other hand, neither can botnets • Result: mining is less decentralized

  7. Mining Pools • Share rewards for steadier payout – Less BTC now > more BTC later • Operator collects fee for coordinating • A variety of mining pool schemes exist • Meni Rosenfeld, Analysis of Bitcoin Pooled Mining Reward Systems , 2011.

  8. Mining Pool "Shares" • Coordinator determines blocks. • Miners report "shares" to coordinator. – "Near misses" – Easier target (about 1000x easier) • So share of mining rewards are determined by a PoW.

  9. Pay-Per-Share (PPS) • Operator immediately pays for shares • Operator absorbs cost of paying shares • Higher transaction fees

  10. Proportional Reward (PROP) • Finding shares earns future rewards • Everyone gets paid when proof is found • Lower fees • Vulnerable to pool hopping attack

  11. Pool Hopping Attack A miner can: • Find a share early in the search for a new block. • Continue to benefit from the mining work of other miners in the pool. • Switch to a new pool. Rewards exceed the rewards of playing fairly.

  12. Pool Hopping Example (in-class)

  13. Other attacks • Sabotage (aka vigilante attack) – Miner submits shares, but throws away proofs – Miner benefits when pool wins – Pool does not benefit from miner's hashing power • Lie in wait attack. A miner in a pool: – Finds a valid block, but withholds it – Searches for a bunch of additional shares – Announces block after gathering extra shares

  14. Pay Per Last N Shares (PPLNS) • Same as PROP, except … • Rewards are only paid to the last N shares • Introduces time element • Dis-incentivizes pool hopping • Dominant approach today

  15. Bitcoin Centralization • ASICs reduce the number of miners • Mining pools concentrate mining power in hands of pool operators – Worse yet, large pools pay out rewards more frequently • RESULT: Bitcoin is becoming more centralized

  16. Why do we care?

  17. Problems with Centralized Mining • 51% attacks • Double-spending • Censorship – Feather-forking • Coercion – Law enforcement could arrest pool operators • Selfish-mining

  18. Bitcoin is Broken http://hackingdistributed.com/2013/11/04/bitcoin-is-broken/ Bitcoin is broken. And not just superficially so, but fundamentally, at the core protocol level. --Ittay Eyal and Emin Gün Sirer

  19. Majority is Not Enough • Eyal and Sirer, "Majority is not Enough: Bitcoin Mining is Vulnerable", FC 2014. • Conventional wisdom: – BTC works if majority of miners follow the protocol. – Wrong • Two-thirds must be honest – And that is the best theoretical case. • Practical solution suggested – Requires three-quarters of miners are honest.

  20. Selfish Mining Attack • Selfish miners find a block – They do not publish it • They begin searching for the next block • Other miners waste work building off of an orphan block • If another miner finds a proof, the selfish miners share their own block

  21. Selfish Mining Example (in-class)

  22. Propagation of Selfish-Mining Block • Network seeded with colluding nodes • When nodes receive a block: – Share the selfishly mined block instead. – With enough Sybils, selfish miners will probably win

  23. Propagation of Selfishly Mined Block (in-class)

  24. Defenses • Randomly choose between blockchains of equal weight – Defeats propagation of selfishly mined block – Eyal and Sirer's defense • P2Pool – Peer-to-peer mining pool – A mini-blockchain replaces the pool operator • Non-outsourceable puzzles

  25. Non-outsourceable Puzzles • Observation : pool members do not trust each other. • Solution : design proof so that the private key for the reward is required. • Mining proof is found before the coinbase address is specified. • For a good overview, see https://www.youtube.com/watch?v=zqo64quO 7og

  26. Are Non-outsourceable Puzzles a Good Idea? • Would break up benign pools – P2Pool • Might force investors to invest in larger server forms – Increasing centralization further

  27. Is selfish mining a real threat? • Craig Wright, The cancer that is the Selfish mining fallacy , Medium 2018. • Yotam Gafni, “The selfish mining fallacy” explained and debunked, Hackernoon 2018. – Debunks Wright's objections to selfish mining. • To date, no selfish mining attacks have been spotted.

  28. Eyal and Sirer Comment: There are four stages of acceptance to new ideas: 1. This is worthless nonsense. 2. This is an interesting, but perverse, point of view. 3. This is true, but quite unimportant. 4. I always said so.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend