Profit lag and alternate network mining

For a mining strategy we define the notion of "profit lag" as the minimum time it takes to be profitable after that moment. We compute closed forms for the profit lag and the revenue ratio for the strategies "selfish mining" and "in-termittent selfish mining". This confirms some earlier numerical simulations and clarifies misunderstandings on profitability in the literature. We also study mining pairs of PoW cryptocurrencies, often coming from a fork, with the same mining algorithm. This represents a vector of attack that can be exploited using the "al-ternate network mining" strategy that we define. We compute closed forms for the profit lag and the revenue ratiofor this strategy that is more profitable than selfish mining and intermittent selfish mining. It is also harder to counter since it does not rely on a flaw in the difficulty adjustment formula that is the reason for profitability of the other strategies.

[1]  Chen Feng,et al.  Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[2]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[3]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[4]  Cyril Grunspan,et al.  Double spend races , 2017, International Journal of Theoretical and Applied Finance.

[5]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[6]  Lear Bahack,et al.  Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..

[7]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[8]  Alexander Spiegelman,et al.  Mind the Mining , 2019, EC.

[9]  Emin Gün Sirer,et al.  Selfish Mining Re-Examined , 2020, Financial Cryptography.

[10]  Max Kubát An Analysis of Bitcoin , 2014 .

[11]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[12]  Jimmy Song Programming Bitcoin: Learn How to Program Bitcoin from Scratch , 2020 .

[13]  Cyril Grunspan,et al.  On Profitability of Trailing Mining , 2018, ArXiv.

[14]  Cyril Grunspan,et al.  ON PROFITABILITY OF NAKAMOTO DOUBLE SPEND , 2019, Probability in the Engineering and Informational Sciences.

[15]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[16]  Chen Dong-hu Analysis of Bitcoin , 2014 .

[17]  Doron Zeilberger,et al.  A combinatorial-probabilistic analysis of bitcoin attacks* , 2018, Journal of Difference Equations and Applications.

[18]  Cyril Grunspan,et al.  On profitability of stubborn mining , 2018, ArXiv.

[19]  D. Vere-Jones Markov Chains , 1972, Nature.

[20]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[21]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[22]  Cyril Grunspan,et al.  On profitability of selfish mining , 2018, ArXiv.

[23]  S. Crossen The Mathematics of Bitcoin , 2015 .