Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus

The Proof of Work (PoW) consensus algorithm guarantees the safety and dependability of Blockchain systems. Miners can achieve a consensus through the PoW algorithm during the mining process, that is mutual attacking. However, when the miners attack each other, all miners earn less. In this paper, we established a model that mining between two miners is an iterative game, and proposed a subclass of ZD strategy (a pining strategy) to alleviate miners' dilemma, a miner can control another miner's payoff and increase the social revenue through a pinning strategy. Numerical simulation results verify the effectiveness of the proposed strategy. In summary, this work leads to the better understanding and analysis of the PoW algorithm via the game theory, rendering it possible to design a more rational consensus algorithm in the future.

[1]  Dong Hao,et al.  Zero-determinant strategy: An underway revolution in game theory , 2014 .

[2]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[3]  Zhu Han,et al.  Zero-Determinant Strategy for Resource Sharing in Wireless Cooperations , 2016, IEEE Transactions on Wireless Communications.

[4]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[5]  Xiang Li,et al.  When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs , 2014, IEEE Transactions on Cybernetics.

[6]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[7]  Dong Hao,et al.  Zero-Determinant Strategies in Iterated Public Goods Game , 2014, Scientific Reports.

[8]  W. Press,et al.  Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent , 2012, Proceedings of the National Academy of Sciences.

[9]  Peng Ning,et al.  Zero-determinant Strategies for Multi-player Multi-action Iterated Games , 2016, IEEE Signal Processing Letters.

[10]  Yoad Lewenberg,et al.  Inclusive Block Chain Protocols , 2015, Financial Cryptography.

[11]  Huaguang Zhang,et al.  Near-Optimal Control for Nonzero-Sum Differential Games of Continuous-Time Nonlinear Systems Using Single-Network ADP , 2013, IEEE Transactions on Cybernetics.

[12]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[13]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[14]  Huaguang Zhang,et al.  Neural-Network-Based Constrained Optimal Control Scheme for Discrete-Time Switched Nonlinear System Using Dual Heuristic Programming , 2014, IEEE Transactions on Automation Science and Engineering.

[15]  George Kesidis,et al.  Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands , 2014, IEEE Journal on Selected Areas in Communications.

[16]  Martin A. Nowak,et al.  Evolutionary performance of zero-determinant strategies in multiplayer games , 2015, Journal of theoretical biology.

[17]  Zhu Han,et al.  Zero-determinant strategy in cheating management of wireless cooperation , 2014, 2014 IEEE Global Communications Conference.

[18]  Xin Zhang,et al.  Data-Driven Robust Approximate Optimal Tracking Control for Unknown General Nonlinear Systems Using Adaptive Dynamic Programming Method , 2011, IEEE Transactions on Neural Networks.