A New Theoretical Framework of Pyramid Markov Processes for Blockchain Selfish Mining

In this paper, we provide a new theoretical framework of pyramid Markov processes to solve some open and fundamental problems of blockchain selfish mining. To this end, we first describe a more general blockchain selfish mining with both a two-block leading competitive criterion and a new economic incentive, and establish a pyramid Markov process to express the dynamic behavior of the selfish mining from both consensus protocol and economic incentive. Then we show that the pyramid Markov process is stable and so is the blockchain, and its stationary probability vector is matrix-geometric with an explicitly representable rate matrix. Furthermore, we use the stationary probability vector to be able to analyze the waste of computational resource due to generating a lot of orphan (or stale) blocks. Nextly, we set up a pyramid Markov reward process to investigate the long-run average profits of the honest and dishonest mining pools, respectively. Specifically, we show that the long-run average profits are multivariate linear such that we can measure the improvement of mining efficiency of the dishonest mining pool comparing to the honest mining pool. As a by-product, we build three approximative Markov processes when the system states are described as the block-number difference of two forked block branches. Also, by using their special cases with non network latency, we can further provide some useful interpretation for both the Markov chain (Figure 1) and the revenue analysis ((1) to (3)) of the seminal work by Eyal and Sirer (2014). Finally, we use some numerical examples to verify the correctness and computability of our theoretical results. We hope that the methodology and results developed in this paper shed light on the blockchain selfish mining such that a series of promising research can be produced potentially.

[1]  Cyril Grunspan,et al.  Bitcoin Selfish Mining and Dyck Words , 2019, ArXiv.

[2]  Lear Bahack,et al.  Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..

[3]  Peter G. Taylor,et al.  Calculating the equilibrium distribution in level dependent quasi-birth-and-death processes , 1995 .

[4]  Andre Cronje,et al.  Fantom: A scalable framework for asynchronous distributed systems , 2018, ArXiv.

[5]  Michal Szczepanik,et al.  Analysis of Blockchain Selfish Mining Attacks , 2019, ISAT.

[6]  Cyril Grunspan,et al.  On Profitability of Trailing Mining , 2018, ArXiv.

[7]  Lisa Morhaim Blockchain and cryptocurrencies technologies and network structures: applications, implications and beyond , 2019 .

[8]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[9]  Holger Paul Keeler,et al.  Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.

[10]  Elaine Shi,et al.  Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.

[11]  Moustapha Ba,et al.  The Markov Chain Resulting from the States of the Bitcoin , 2018 .

[12]  John Tromp,et al.  Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work , 2015, Financial Cryptography Workshops.

[13]  Chen Feng,et al.  Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[14]  Bin Xiao,et al.  Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System , 2019, CCS.

[15]  Aggelos Kiayias,et al.  Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era , 2020, EUROCRYPT.

[16]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[17]  Qianhong Wu,et al.  An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network , 2019, Comput. Secur..

[18]  Modelling the dynamics of the bitcoin blockchain , 2016 .

[19]  Seungjoo Kim,et al.  Pooled Mining Makes Selfish Mining Tricky , 2018, IACR Cryptol. ePrint Arch..

[20]  Seungjoo Kim,et al.  Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment , 2019, IACR Cryptol. ePrint Arch..

[21]  Cyril Grunspan,et al.  On profitability of selfish mining , 2018, ArXiv.

[22]  Maria Gradinariu Potop-Butucaru,et al.  ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.

[23]  Aggelos Kiayias,et al.  Proofs of Work for Blockchain Protocols , 2017, IACR Cryptol. ePrint Arch..

[24]  Yoad Lewenberg,et al.  SPECTRE: A Fast and Scalable Cryptocurrency Protocol , 2016, IACR Cryptol. ePrint Arch..

[25]  S. Matthew Weinberg,et al.  On the Instability of Bitcoin Without the Block Reward , 2016, CCS.

[26]  Deke Guo,et al.  Selfholding: A combined attack model using selfish mining with block withholding attack , 2019, Comput. Secur..

[27]  Aggelos Kiayias,et al.  Proof-of-Work Sidechains , 2019, IACR Cryptol. ePrint Arch..

[28]  Jason Teutsch,et al.  SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.

[29]  Gilles Hilary,et al.  Distributed Ledgers and Operations: What Operations Management Researchers Should Know About Blockchain Technology , 2018 .

[30]  Pierre-Olivier Goffard,et al.  On the profitability of selfish blockchain mining under consideration of ruin , 2020, ArXiv.

[31]  Younghee Park,et al.  Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners , 2019, ACNS.

[32]  Bart Preneel,et al.  Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.

[33]  Ren Zhang Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[34]  Quan-Lin Li,et al.  Double-End Queues with Non-Poisson Inputs and Their Effective Algorithms , 2020, 2001.00946.

[35]  Volodymyr Babich,et al.  OM Forum - Distributed Ledgers and Operations: What Operations Management Researchers Should Know About Blockchain Technology , 2020, Manuf. Serv. Oper. Manag..

[36]  Rachid Guerraoui,et al.  On the Unfairness of Blockchain , 2018, NETYS.

[37]  Aviv Zohar,et al.  Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.

[38]  Gavin Andresen,et al.  An Analysis of Attacks on Blockchain Consensus , 2016, ArXiv.

[39]  Jinwook Lee,et al.  The Chain of Antichains - Box Protocol: the Dual-Blockchain and a Stablecoin , 2018, ArXiv.

[40]  Célio Vinicius N. de Albuquerque,et al.  On the detection of selfish mining and stalker attacks in blockchain networks , 2020, Ann. des Télécommunications.

[41]  Xing Wang,et al.  A Deep Dive Into Blockchain Selfish Mining , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[42]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[43]  Michael Davidson,et al.  On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms , 2020, IACR Cryptol. ePrint Arch..

[44]  Ansgar Fehnker,et al.  A Distributed Blockchain Model of Selfish Mining , 2019, FM Workshops.

[45]  Marko Vukolic,et al.  Blockchain Consensus Protocols in the Wild , 2017, DISC.

[46]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[47]  Daniel Kraft,et al.  Difficulty control for blockchain-based consensus systems , 2016, Peer-to-Peer Netw. Appl..

[48]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[49]  Arvind Narayanan,et al.  Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .

[50]  William J. Knottenbelt,et al.  Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool , 2019, IACR Cryptol. ePrint Arch..

[51]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[52]  Edgar R. Weippl,et al.  Echoes of the Past: Recovering Blockchain Metrics From Merged Mining , 2019, IACR Cryptol. ePrint Arch..

[53]  Donghoon Chang,et al.  Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain , 2019, IACR Cryptol. ePrint Arch..

[54]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[55]  Cyril Grunspan,et al.  On profitability of stubborn mining , 2018, ArXiv.

[56]  Marco Alberto Javarone,et al.  Modeling a Double-Spending Detection System for the Bitcoin Network , 2018, ArXiv.

[57]  Jinwook Lee,et al.  Chain of Antichains: An Efficient and Secure Distributed Ledger , 2018 .

[58]  Maria Gradinariu Potop-Butucaru,et al.  ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin , 2016 .

[59]  Brian Neil Levine,et al.  Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft) , 2017, ArXiv.

[60]  Paulo Veríssimo,et al.  Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure , 2019, ArXiv.

[61]  Aggelos Kiayias,et al.  Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.

[62]  Joseph K. Liu,et al.  Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful , 2019, ArXiv.

[63]  L Bright,et al.  Equilibrium Distributions for Level-Dependent Quasi-Birth-and-Death Processes , 1996 .

[64]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[65]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[66]  Aggelos Kiayias,et al.  Securing Proof-of-Work Ledgers via Checkpointing , 2021, 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[67]  Marcel F. Neuts,et al.  Matrix-geometric solutions in stochastic models - an algorithmic approach , 1982 .

[68]  K. Wüst Security of Blockchain Technologies , 2016 .

[69]  O. Dunkelman On Trees, Chains and Fast Transactions in the Blockchain , 2017 .

[70]  Quan-Lin Li Constructive Computation in Stochastic Models with Applications: The RG-Factorizations , 2010 .

[71]  Ning Zhang,et al.  A Survey of Distributed Consensus Protocols for Blockchain Networks , 2019, IEEE Communications Surveys & Tutorials.

[72]  Neha Gupta Security and Privacy Issues on Blockchain Technology , 2019, Journal of Xidian University.

[73]  Yoad Lewenberg,et al.  Inclusive Block Chain Protocols , 2015, Financial Cryptography.

[74]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[75]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[76]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[77]  Weijia Jia,et al.  On the Strategy and Behavior of Bitcoin Mining with N-attackers , 2018, IACR Cryptol. ePrint Arch..

[78]  Zibin Zheng,et al.  A Survey of State-of-the-Art on Blockchains , 2020, ACM Comput. Surv..

[79]  Hamzeh Khazaei,et al.  Performance Evaluation of Blockchain Systems: A Systematic Survey , 2020, IEEE Access.

[80]  Aggelos Kiayias,et al.  Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..

[81]  Tongge Xu,et al.  An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack , 2020, IEEE Access.

[82]  Jonathan Katz,et al.  Competing (Semi-)Selfish Miners in Bitcoin , 2019, AFT.

[83]  The Fallacy of Selfish Mining in Bitcoin: A Mathematical Critique , 2017 .

[84]  Quan-Lin Li,et al.  Markov processes in blockchain systems , 2019, ArXiv.

[85]  Aziz Mohaisen,et al.  Overview of Attack Surfaces in Blockchain , 2019, Blockchain for Distributed Systems Security.

[86]  George Danezis,et al.  SoK: Consensus in the Age of Blockchains , 2017, AFT.

[87]  Jason Teutsch,et al.  Smart Contracts Make Bitcoin Mining Pools Vulnerable , 2017, Financial Cryptography Workshops.

[88]  Long Tran-Thanh,et al.  On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners , 2018, ArXiv.

[89]  Martijn Bastiaan,et al.  Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .

[90]  A. Stephen Morse,et al.  Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[91]  Alf Zugenmaier,et al.  The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[92]  Xinying Yu,et al.  A Security Detection Model for Selfish Mining Attack , 2019, BlockSys.

[93]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[94]  Thomas Thurner,et al.  Supply chain finance and blockchain technology – the case of reverse securitisation , 2018, foresight.

[95]  Brian H. Fralix,et al.  A further study of some Markovian Bitcoin models from Göbel et al. , 2020, Stochastic Models.

[96]  Aziz Mohaisen,et al.  Countering Selfish Mining in Blockchains , 2018, 2019 International Conference on Computing, Networking and Communications (ICNC).

[97]  The Fallacy of the Selfish Miner in Bitcoin: An Economic Critique , 2017 .

[98]  Kyungbaek Kim,et al.  A Survey about Consensus Algorithms Used in Blockchain , 2018, J. Inf. Process. Syst..

[99]  Quan-Lin Li,et al.  Blockchain Queue Theory , 2018, CSoNet.

[100]  Fehmi Jaafar,et al.  Validating BGP Update Using Blockchain-Based Infrastructure , 2020 .

[101]  Long Tran-Thanh,et al.  An Empirical Evaluation of Selfish Mining and Strategic Mining in Proof-of-Work Blockchain with Multiple Miners , 2019, PRIMA.