Cooperative Mining in Blockchain Networks With Zero-Determinant Strategies

In proof-of-work (PoW)-based blockchain networks, the miners contribute their distributed computation in solving a crypto-puzzle competition to win the reward. To secure stable profits, some miners organize mining pools and share the rewards from the pool in proportion to each miner’s contribution. However, some miners may exhibit malicious behaviors which cause a waste of distributed computation resource, even posing a threat on the efficiency of blockchain networks. In this paper, we propose a new game-theoretic framework to incentivize miners mining honestly and help to bring about a higher total welfare of blockchain networks. We first formulate the mining process as a noncooperative iterated game. We then propose a mechanism in terms of zero-determinant strategies (ZD strategies) to encourage the cooperative mining and improve the efficiency of mining in PoW-based blockchain networks. In addition, we theoretically analyze the maximum system welfare of the target pool through the method of optimization. Numerical illustrations are also presented to support our theoretical results.

[1]  Björn E. Ottersten,et al.  Pixel weighted average strategy for depth sensor data fusion , 2010, 2010 IEEE International Conference on Image Processing.

[2]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[3]  Zhu Han,et al.  Zero-Determinant Strategy for Resource Sharing in Wireless Cooperations , 2016, IEEE Transactions on Wireless Communications.

[4]  Mingyan Liu,et al.  Provision of Public Goods on Networks: On Existence, Uniqueness, and Centralities , 2016, IEEE Transactions on Network Science and Engineering.

[5]  Li Xiang,et al.  Game Dilemma Analysis and Optimization of PoW Consensus Algorithm , 2017 .

[6]  Martin A Nowak,et al.  Evolution of extortion in Iterated Prisoner’s Dilemma games , 2012, Proceedings of the National Academy of Sciences.

[7]  Arne Traulsen,et al.  Cooperation and control in multiplayer social dilemmas , 2014, Proceedings of the National Academy of Sciences.

[8]  Saad Mekhilef,et al.  A review on energy saving strategies in industrial sector , 2011 .

[9]  T. L. Vincent,et al.  Evolution and control system design. The evolutionary game , 2000 .

[10]  Jeffrey S. Rosenschein,et al.  Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.

[11]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[12]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[13]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[14]  George Kesidis,et al.  Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands , 2014, IEEE Journal on Selected Areas in Communications.

[15]  C. Adami,et al.  Evolutionary instability of zero-determinant strategies demonstrates that winning is not everything , 2012, Nature Communications.

[16]  Peng Ning,et al.  Zero-determinant Strategies for Multi-player Multi-action Iterated Games , 2016, IEEE Signal Processing Letters.

[17]  Yaoxue Zhang,et al.  Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments , 2015, IEEE Transactions on Cloud Computing.

[18]  Yongdae Kim,et al.  Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.

[19]  Alexander J. Stewart,et al.  From extortion to generosity, evolution in the Iterated Prisoner’s Dilemma , 2013, Proceedings of the National Academy of Sciences.

[20]  W. Press,et al.  Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent , 2012, Proceedings of the National Academy of Sciences.

[21]  Dong Hao,et al.  Zero-Determinant Strategies in Iterated Public Goods Game , 2014, Scientific Reports.

[22]  Zhu Han,et al.  Equilibrium analysis for zero-determinant strategy in resource management of wireless network , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[23]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[24]  Michael T. Goodrich Pipelined algorithms to detect cheating in long-term grid computations , 2008, Theor. Comput. Sci..

[25]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[26]  Chen Xin,et al.  Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus , 2017, 2017 36th Chinese Control Conference (CCC).

[27]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[28]  Nicolas Houy,et al.  The Bitcoin Mining Game , 2014, Ledger.

[29]  Dusit Niyato,et al.  Evolutionary Game for Mining Pool Selection in Blockchain Networks , 2017, IEEE Wireless Communications Letters.