Abstract
We revisit pool block withholding (PBW) attack in this work, while taking miners’ rationality into consideration. It has been shown that a malicious mining pool in Bitcoin may attack other pools by sending some dummy miners who do not reveal true solutions but obtain reward portions from attacked pools. This result assumes that the infiltrating miners are always loyal and behave as the malicious pool desires; but why? In this work, we study rational infiltrating miners who behave by maximizing their own utilities. We characterize the infiltrating miners’ optimal strategies for two kinds of betraying behaviors depending on whether they return to the original pool or not. Our characterizations show that the infiltrating miners’ optimal strategy is simple and binary: they either betray or stay loyal all together, which depends on the total amount of them sent out by the malicious pool. Accordingly, we further compute the pool’s optimal attacking strategy given the miners’ strategic behaviors. Our experiments also show that by launching PBW attacks, the benefit to a pool is actually incremental.
This work is supported by The Hong Kong Polytechnic University (Grant No. P0034420).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alkalay-Houlihan, C., Shah, N.: The pure price of anarchy of pool block withholding attacks in bitcoin mining. In: AAAI, pp. 1724–1731. AAAI Press (2019)
Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12(8), 1967–1978 (2017)
Bag, S., Sakurai, K.: Yet another note on block withholding attack on bitcoin mining pools. In: Bishop, M., Nascimento, A.C.A. (eds.) ISC 2016. LNCS, vol. 9866, pp. 167–180. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45871-7_11
Bonneau, J.: Why buy when you can rent? Bribery attacks on bitcoin-style consensus. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 19–26. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_2
Chen, J., Micali, S.: Algorand: a secure and efficient distributed ledger. Theor. Comput. Sci. 777, 155–183 (2019)
Chen, Z., Li, B., Shan, X., Sun, X., Zhang, J.: Discouraging pool block withholding attacks in bitcoins. CoRR abs/2008.06923 (2020)
Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR abs/1402.1718 (2014)
Eyal, I.: The miner’s dilemma. In: IEEE Symposium on Security and Privacy, pp. 89–103. IEEE Computer Society (2015)
Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28
Ke, J., Szalachowski, P., Zhou, J., Xu, Q., Yang, Z.: IBWH: an intermittent block withholding attack with optimal mining reward rate. In: Lin, Z., Papamanthou, C., Polychronakis, M. (eds.) ISC 2019. LNCS, vol. 11723, pp. 3–24. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30215-3_1
Li, W., Cao, M., Wang, Y., Tang, C., Lin, F.: Mining pool game model and nash equilibrium analysis for pow-based blockchain networks. IEEE Access 8, 101049–101060 (2020)
Liao, K., Katz, J.: Incentivizing blockchain forks via whale transactions. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 264–279. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_17
Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: CSF, pp. 397–411. IEEE Computer Society (2015)
Mengelkamp, E., Nothei en, B., Beer, C., Dauer, D., Weinhardt, C.: A blockchain-based smart grid: towards sustainable local energy markets. Comput. Sci. Res. Dev. 33(1-2), 207–214 (2018)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Pinzón, C., Rocha, C.: Double-spend attack models with time advantage for bitcoin. In: CLEI Selected Papers. Electronic Notes in Theoretical Computer Science, vol. 329, pp. 79–103. Elsevier (2016)
Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. CoRR abs/1112.4980 (2011)
Rosenfeld, M.: Analysis of hashrate-based double spending. CoRR abs/1402.2009 (2014)
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30
Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 477–498. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_28
Schwartz, D., Youngs, N., Britto, A., et al.: The ripple protocol consensus algorithm. Ripple Labs Inc White Paper 5(8) (2014)
Wang, Q., Chen, Y.: The tight bound for pure price of anarchy in an extended miner’s dilemma game. In: AAMAS, pp. 1695–1697. ACM (2021)
Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1–32 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Appendix
A Appendix
In the Appendix, we present the full experiment results.
1.1 A.1 Experiments in the BR Model
In the simulations, we do experiments to investigate the strategic behavior of pool 1. It illustrates how many fraction of the mining power is used for infiltrating, and how many benefits are brought by infiltrating. In all of the examples (see Table 3), suppose there are 5 mining pools, and set the total mining power \(m=m_1+\cdots +m_5=1\). For different combinations of \(m_i\), we compute the optimal strategy \(\mathbf{x}^*\) of pool 1, and the corresponding optimal utility \(u_1^*\). If pool 1 does not attack (i.e., \(\mathbf{x}=\mathbf{0}\)), clearly the utility is \(u_1^{non}=\frac{m_1}{m}=m_1\). We use the ratio \(\frac{u_1^*}{u_1^{non}}\) to measure the benefits that attacking can bring.
Our experiment results show that, about 50% mining power of pool 1 is used for attacking in an optimal strategy, which will bring a less than 10% increase of utility.
1.2 A.2 Experiments in the BNR Model
In our experiments for the BNR model, arbitrarily fixing \(m_1,\ldots ,m_n,x_3,\ldots ,x_n\),
\(\alpha _3,\ldots ,\alpha _n\), we take \(x_2\) as a variable, and increase the value of \(x_2\). For each value of \(x_2\), we compute the best reaction \(\alpha _2\) of infiltrating miner 2. The experiments results show that such a threshold truly exists in every example, and thus support the conjecture. Moreover, on average, the threshold in the BNR model is at least 20% smaller than that in the BR model, which implies that the infiltrating miners in the BNR model are more likely to betray their original pool.
In Table 4, we fix \(m_1,\ldots ,m_5,x_3,\ldots ,x_5,\alpha _3,\ldots ,\alpha _5\), and let \(x_2\) be a variable increasing from 0.001 within a step length of 0.002. For each value of \(x_2\), we compute a corresponding best reaction \(\alpha _2^*\) of miner 2. A rough threshold t is given for each example: when \(x_2<t\), \(\alpha _2^*=x_2\); when \(x_2>t\), \(\alpha _2^*=0\). The threshold for these examples in the BR model is denoted by \(t^{BR}\). We conclude that, for every example, the threshold in the BNR model is much smaller than that in the BR model, which implies that the pool in BNR model is less likely to attack other pools.
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, N., Wang, C., Li, B. (2022). Pool Block Withholding Attack with Rational Miners. In: Chen, J., Li, M., Zhang, G. (eds) Frontiers of Algorithmics. IJTCS-FAW 2021. Lecture Notes in Computer Science(), vol 12874. Springer, Cham. https://doi.org/10.1007/978-3-030-97099-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-97099-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-97098-7
Online ISBN: 978-3-030-97099-4
eBook Packages: Computer ScienceComputer Science (R0)