Mind the Mining

In this paper we revisit the mining strategies in Proof of Work based cryptocurrencies and propose two strategies, which we call smart and smarter mining, that in many cases strictly dominate honest mining. In contrast to other known attacks, such as selfish mining, which induce zero-sum games among the miners, the strategies proposed in this paper increase miners' profit by reducing their variable costs (i.e., electricity). Moreover, the proposed strategies are viable for much smaller miners than previously known attacks and, surprisingly, an attack launched by one miner can be profitable for all other miners as well. While saving electricity is very encouraging for the environment, it may affect the coin's security. The smart and smarter mining strategies expose the coin to under 50% attacks, and this vulnerability might only grow when new miners join the coin in response to the increased profit margins induced by these strategies.

[1]  D. Ricardo On the Principles of Political Economy and Taxation , 1891 .

[2]  Adam Smith,et al.  An Inquiry into the Nature and Causes of the Wealth of Nations: A Selected Edition , 2008 .

[3]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[4]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[5]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[6]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[7]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[8]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[9]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[10]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[11]  S. Matthew Weinberg,et al.  On the Instability of Bitcoin Without the Block Reward , 2016, CCS.

[12]  Aggelos Kiayias,et al.  Blockchain Mining Games , 2016, EC.

[13]  Tim Roughgarden,et al.  Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.

[14]  Joseph Bonneau,et al.  Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.

[15]  Jonathan Katz,et al.  Incentivizing Blockchain Forks via Whale Transactions , 2017, Financial Cryptography Workshops.

[16]  Ittay Eyal,et al.  The Gap Game , 2018, CCS.

[17]  B. V. Houdt,et al.  On the Power-of-d-choices with Least Loaded Server Selection , 2018, SIGMETRICS.

[18]  Eitan Altman,et al.  Mining competition in a multi-cryptocurrency ecosystem at the network edge: a congestion game approach , 2019, PERV.

[19]  Idit Keidar,et al.  Game of Coins , 2018, 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS).