Block withholding game among bitcoin mining pools

Abstract Although mining pools smooth out Bitcoin rewards and make it more predictable for an individual miner, they concentrate power to the pool’s operator. There are multiple huge mining pools, and each of them may possess up to 30% of the total computation power of the Bitcoin network (the same applies to some other altcoins). Putting such enormous computation power in the hands of pool operators provides the necessary incentive for them to misuse their power over the network. One way to misuse this power is to launch a block withholding attack against other mining pools. Indeed, this ability starts a block withholding game among the pool operators. Some researchers have analyzed such a game. However, their analyses were limited because they considered simple scenarios, e.g., a single-shot game between only two mining pools. In this paper, we first demonstrate that the block withholding game is a stochastic game with finitely many states and actions. Then, we use a reinforcement learning method to analyze this game. Our simulation results show that in the recent four years, by launching a block withholding attack some pools had the potential to reach to the majority (51%) of the total computation power of the network with much lower initial computation power (even with less than 25% of the total computation power of the network).

[1]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[2]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[3]  Manuela Veloso,et al.  Scalable Learning in Stochastic Games , 2002 .

[4]  Dean P. Foster,et al.  Regret in the On-Line Decision Problem , 1999 .

[5]  S. Hart,et al.  A simple adaptive procedure leading to correlated equilibrium , 2000 .

[6]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[7]  Yoav Shoham,et al.  New Criteria and a New Algorithm for Learning in Multi-Agent Systems , 2004, NIPS.

[8]  Michael Bedford Taylor,et al.  Bitcoin and the age of Bespoke Silicon , 2013, 2013 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).

[9]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[10]  Manuela M. Veloso,et al.  Multiagent learning using a variable learning rate , 2002, Artif. Intell..

[11]  Kouichi Sakurai,et al.  Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools , 2016, ISC.

[12]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[13]  Yishay Mansour,et al.  Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.

[14]  Tim Roughgarden,et al.  Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.

[15]  Aron Laszka,et al.  When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.

[16]  Jun Zhang,et al.  A Nonoutsourceable Puzzle Under GHOST Rule , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[17]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[18]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[19]  D. Fudenberg,et al.  Consistency and Cautious Fictitious Play , 1995 .

[20]  Elaine Shi,et al.  Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.

[21]  Manuela Veloso,et al.  An Analysis of Stochastic Game Theory for Multiagent Reinforcement Learning , 2000 .

[22]  E. Kalai,et al.  Rational Learning Leads to Nash Equilibrium , 1993 .

[23]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[24]  L. Shapley SOME TOPICS IN TWO-PERSON GAMES , 1963 .

[25]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.