A Survey on Applications of Game Theory in Blockchain

In the past decades, the blockchain technology has attracted tremendous attention from both academia and industry. The popularity of blockchain networks was originated from a crypto-currency to serve as a decentralized and tamperproof transaction data ledger. Nowadays, blockchain as the key framework in the decentralized public data-ledger, has been applied to a wide range of scenarios far beyond crypto-currencies, such as Internet of Things (IoT), healthcare, and insurance. This survey aims to fill the gap between the large number of studies on blockchain network, where game theory emerges as an analytical tool, and the lack of a comprehensive survey on the game theoretical approaches applied in blockchain related issues. In this paper, we review game models proposed to address common issues in the blockchain network. The issues include security issues, e.g., selfish mining, majority attack and Denial of Service (DoS) attack, issues regard mining management, e.g., computational power allocation, reward allocation, and pool selection, as well as issues regarding blockchain economic and energy trading. Additionally, we discuss advantages and disadvantages of these selected game models and solutions. Finally, we highlight important challenges and future research directions of applying game theoretical approaches to incentive mechanism design, and the combination of blockchain with other technologies.

[1]  Stephanie Alexander,et al.  Augur: a decentralized oracle and prediction market platform , 2015 .

[2]  Tim Roughgarden,et al.  Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.

[3]  Andreas G. Veneris,et al.  Astraea: A Decentralized Blockchain Oracle , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[4]  Christophe Bisière,et al.  The Blockchain Folk Theorem , 2018, The Review of Financial Studies.

[5]  Aron Laszka,et al.  When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.

[6]  Joshua A. Kroll,et al.  The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .

[7]  Charles Kamhoua,et al.  Incentivizing Blockchain Miners to Avoid Dishonest Mining Strategies by a Reputation-Based Paradigm , 2018, Advances in Intelligent Systems and Computing.

[8]  Cathy Barrera,et al.  Blockchain Upgrade as a Coordination Game , 2018 .

[9]  S. Matthew Weinberg,et al.  On the Instability of Bitcoin Without the Block Reward , 2016, CCS.

[10]  F. Richard Yu,et al.  Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[11]  Tijani Chahed,et al.  A Stochastic Game Framework for Analyzing Computational Investment Strategies in Distributed Computing with Application to Blockchain Mining , 2018, ArXiv.

[12]  Aggelos Kiayias,et al.  Reward Sharing Schemes for Stake Pools , 2018, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).

[13]  Mubashir Husain Rehmani,et al.  Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[14]  Dong In Kim,et al.  Incentivizing Consensus Propagation in Proof-of-Stake Based Consortium Blockchain Networks , 2019, IEEE Wireless Communications Letters.

[15]  Sushmita Ruj,et al.  A Blockchain Framework for Insurance Processes , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[16]  J. Hofbauer,et al.  Evolutionary game dynamics , 2011 .

[17]  Nicolas Houy,et al.  It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency , 2014 .

[18]  Blaise Allaz,et al.  Cournot Competition, Forward Markets and Efficiency , 1993 .

[19]  Ariel Gabizon,et al.  Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.

[20]  David Mazières The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus , 2015 .

[21]  J. Goodman Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .

[22]  Jonathan Katz,et al.  Incentivizing Blockchain Forks via Whale Transactions , 2017, Financial Cryptography Workshops.

[23]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[24]  Zhu Han,et al.  When Mobile Blockchain Meets Edge Computing , 2017, IEEE Communications Magazine.

[25]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[26]  Nicolas Houy,et al.  The Bitcoin Mining Game , 2014, Ledger.

[27]  Murat Kantarcioglu,et al.  Blockchain: A Graph Primer , 2017, ArXiv.

[28]  Dusit Niyato,et al.  Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.

[29]  Christof Weinhardt,et al.  A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.

[30]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[31]  Konstantinos Psounis,et al.  Will cyber-insurance improve network security? A market analysis , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[32]  L. Cong,et al.  Blockchain Disruption and Smart Contracts , 2018, The Review of Financial Studies.

[33]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[34]  eon BottouAT Stochastic Gradient Learning in Neural Networks , 2022 .

[35]  Idit Keidar,et al.  Game of Coins , 2018, 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS).

[36]  Dusit Niyato,et al.  Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.

[37]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[38]  Joshua A. Kroll,et al.  Why buy when you can rent ? Bribery attacks on Bitcoin consensus , 2015 .

[39]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[40]  C. Cachin Yet Another Visit to Paxos , 2010 .

[41]  Youki Kadobayashi,et al.  CYBEX: the cybersecurity information exchange framework (x.1500) , 2010, CCRV.

[42]  Assaf Shomer On the Phase Space of Block-Hiding Strategies in Bitcoin-like networks , 2014, IACR Cryptol. ePrint Arch..

[43]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[44]  From Mining to Markets: The Evolution of Bitcoin Transaction Fees , 2017 .

[45]  Rida Laraki,et al.  The splitting game and applications , 2002, Int. J. Game Theory.

[46]  Ittay Eyal,et al.  The Gap Game , 2018, SYSTOR.

[47]  P. Lions,et al.  Mean field games , 2007 .

[48]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[49]  P. Rizun A Transaction Fee Market Exists Without a Block Size Limit , 2016 .

[50]  Yan Zhang,et al.  Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.

[51]  Abhi Shelat,et al.  Socially Optimal Mining Pools , 2017, WINE.

[52]  Sarah Underwood,et al.  Blockchain beyond bitcoin , 2016, Commun. ACM.

[53]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[54]  Roger B. Myerson,et al.  Optimal Auction Design , 1981, Math. Oper. Res..

[55]  Changyu Dong,et al.  Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing , 2017, CCS.

[56]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[57]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[58]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[59]  Nicolas Courtois,et al.  On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies , 2014, ArXiv.

[60]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[61]  Neng Wang,et al.  Tokenomics: Dynamic Adoption and Valuation , 2020, The Review of Financial Studies.

[62]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[63]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[64]  Bhaskar Krishnamachari,et al.  Solving the Buyer and Seller’s Dilemma: A Dual-Deposit Escrow Smart Contract for Provably Cheat-Proof Delivery and Payment for a Digital Good without a Trusted Mediator , 2018, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[65]  Zhu Han,et al.  Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).

[66]  Fahad Saleh,et al.  Blockchain Without Waste: Proof-of-Stake , 2020, The Review of Financial Studies.

[67]  Chen Xin,et al.  Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus , 2017, 2017 36th Chinese Control Conference (CCC).

[68]  R Bellman,et al.  On the Theory of Dynamic Programming. , 1952, Proceedings of the National Academy of Sciences of the United States of America.

[69]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[70]  Svetlana Abramova,et al.  Mixing Coins of Different Quality: A Game-Theoretic Approach , 2017, Financial Cryptography Workshops.

[71]  Zhetao Li,et al.  Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[72]  Sarah Meiklejohn,et al.  Smart contracts for bribing miners , 2018, IACR Cryptol. ePrint Arch..

[73]  Danda B. Rawat,et al.  iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).

[74]  Hong Wan,et al.  Exchange of Renewable Energy among Prosumers using Blockchain with Dynamic Pricing , 2018, ArXiv.

[75]  Kartik Nayak,et al.  Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus , 2016, ArXiv.

[76]  Nicola Dimitri,et al.  Bitcoin Mining as a Contest , 2017, Ledger.

[77]  E. Altman Constrained Markov Decision Processes , 1999 .

[78]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[79]  Peng Ning,et al.  Zero-determinant Strategies for Multi-player Multi-action Iterated Games , 2016, IEEE Signal Processing Letters.

[80]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[81]  M. Bardi,et al.  Optimal Control and Viscosity Solutions of Hamilton-Jacobi-Bellman Equations , 1997 .

[82]  Eric Maskin,et al.  Markov Perfect Equilibrium: I. Observable Actions , 2001, J. Econ. Theory.

[83]  Vahab S. Mirrokni,et al.  Maximizing Nonmonotone Submodular Functions under Matroid or Knapsack Constraints , 2009, SIAM J. Discret. Math..

[84]  Sarah Meiklejohn,et al.  Betting on Blockchain Consensus with Fantomette , 2018, ArXiv.

[85]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[86]  L. Shapley,et al.  Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.

[87]  Elaine Shi,et al.  FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..

[88]  Bart Preneel,et al.  On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol , 2017, CoNEXT.

[89]  Andrea Buraschi,et al.  An Equilibrium Valuation of Bitcoin and Decentralized Network Assets , 2018 .

[90]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[91]  Lear Bahack,et al.  Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..

[92]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[93]  Danny Bradbury,et al.  The problem with Bitcoin , 2013 .

[94]  Drew Stone,et al.  Delayed Blockchain Protocols , 2018, ArXiv.

[95]  A. Park,et al.  Market Design with Blockchain Technology , 2016 .

[96]  Jeffrey S. Rosenschein,et al.  Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.

[97]  S. Brams,et al.  Nonmyopic Equilibria in 2×2 Games , 1981 .

[98]  Song-Kyoo Kim,et al.  The Trailer of Blockchain Governance Game , 2018, Comput. Ind. Eng..

[99]  Christian Cachin,et al.  Architecture of the Hyperledger Blockchain Fabric , 2016 .

[100]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[101]  Elaine Shi,et al.  Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.

[102]  Maria Gradinariu Potop-Butucaru,et al.  Bitcoin a Distributed Shared Register , 2017, SSS.

[103]  Josef Hofbauer,et al.  Stable games and their dynamics , 2009, J. Econ. Theory.

[104]  Aggelos Kiayias,et al.  Blockchain Mining Games , 2016, EC.

[105]  Carsten Rudolph,et al.  Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools , 2017, GameSec.

[106]  Rainer Böhme,et al.  Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees , 2014, Financial Cryptography Workshops.

[107]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[108]  Dusit Niyato,et al.  Optimal Auction for Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach , 2017, 2018 IEEE International Conference on Communications (ICC).

[109]  Xiaonan Wang,et al.  Energy Demand Side Management within micro-grid networks enhanced by blockchain , 2018, Applied Energy.

[110]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[111]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[112]  Jonathan Chiu,et al.  Incentive Compatibility on the Blockchain , 2018, Studies in Economic Design.

[113]  C. Jaag,et al.  The Bitcoin Mining Game: On the Optimality of Honesty in Proof-of-work Consensus Mechanism , 2017 .

[114]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[115]  Yoad Lewenberg,et al.  Inclusive Block Chain Protocols , 2015, Financial Cryptography.

[116]  Andrew J. Blumberg,et al.  Verifying computations without reexecuting them , 2015, Commun. ACM.

[117]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[118]  Liang Xiao,et al.  Game theoretic study on blockchain based secure edge networks , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).

[119]  Dusit Niyato,et al.  On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach , 2018, IEEE Transactions on Services Computing.

[120]  N. Houy The Economics of Bitcoin Transaction Fees , 2014 .

[121]  L. Cong,et al.  Decentralized Mining in Centralized Pools , 2019, The Review of Financial Studies.

[122]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[123]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[124]  Krishnendu Chatterjee,et al.  Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies , 2018, CONCUR.

[125]  Sanjay Jain,et al.  When Cryptocurrencies Mine Their Own Business , 2016, Financial Cryptography.

[126]  Emilio Tuosto,et al.  Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods , 2015, Programming Languages with Applications to Biology and Security.

[127]  Albert Levi,et al.  A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.

[128]  Zhu Han,et al.  Zero-Determinant Strategy for Resource Sharing in Wireless Cooperations , 2016, IEEE Transactions on Wireless Communications.

[129]  Jörgen W. Weibull,et al.  Evolutionary Game Theory , 1996 .