Analysing the Benefit of Selfish Mining with Multiple Players

Many current mainstream blockchain systems, including Bitcoin, adopt Proof-of-Work (PoW) as their consensus protocol. Such a system faces various cryptoeconomic attacks, such as selfish mining. Previous studies have shown that with over 25% of the overall mining power, a selfish miner can benefit by gaining a proportion of rewards higher than its mining power in Bitcoin. This threshold is still higher than any current mining pool, and hence, selfish mining is not considered likely in Bitcoin. Unfortunately, this threshold is only applicable for a single attacker scenario, whereas in a realistic setting, multiple mining pools with significant hash power could perform selfish mining simultaneously. In this paper, we address this research gap by analyzing selfish mining scenarios with multiple independent attackers. Through extensive simulation studies, we show that when the number of selfish miners increases, each of them requires less mining power to gain an advantage, but that the range of mining power such that each selfish miner benefits becomes narrower and thus less sustainable. Our work is the first to show that in practice, there are scenarios where it is enough to have 12% mining power to benefit from selfish mining but also that having more than 7 selfish miners which benefit simultaneously is highly unlikely. We also infer that it is always beneficial for selfish miners to collude and build a more powerful mining pool than to mine independently. Additionally, we propose a safe limit for the size of mining pools in Bitcoin to avoid multi-player attacks. Finally, we extend our studies to Ethereum which uses a different reward model based on uncle blocks.

[1]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[2]  Emin Gün Sirer,et al.  Decentralization in Bitcoin and Ethereum Networks , 2018, Financial Cryptography.

[3]  Chen Feng,et al.  Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[4]  Cyril Grunspan,et al.  On profitability of selfish mining , 2018, ArXiv.

[5]  Ari Juels,et al.  SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning , 2019, Proceedings 2021 Network and Distributed System Security Symposium.

[6]  Weijia Jia,et al.  On the Strategy and Behavior of Bitcoin Mining with N-attackers , 2018, IACR Cryptol. ePrint Arch..

[7]  Aggelos Kiayias,et al.  Blockchain Mining Games , 2016, EC.

[8]  Xing Wang,et al.  A Deep Dive Into Blockchain Selfish Mining , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[9]  Bart Preneel,et al.  Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.

[10]  Bettina Kemme,et al.  A Simulation-Based Analysis of Multiplayer Selfish Mining , 2020, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[11]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[12]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[13]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[14]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[15]  Cyril Grunspan,et al.  Selfish Mining and Dyck Words in Bitcoin and Ethereum Networks , 2019, Tokenomics.

[16]  Long Tran-Thanh,et al.  An Empirical Evaluation of Selfish Mining and Strategic Mining in Proof-of-Work Blockchain with Multiple Miners , 2019, PRIMA.

[17]  Soung Chang Liew,et al.  When blockchain meets AI: Optimal mining strategy achieved by machine learning , 2019, Int. J. Intell. Syst..

[18]  Cyril Grunspan,et al.  Satoshi Risk Tables , 2017, ArXiv.