Nothing Special   »   [go: up one dir, main page]

Skip to main content

How Much Should I Double Spend My Bitcoin? Game Theory of Quantum Mining

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14908))

Included in the following conference series:

  • 72 Accesses

Abstract

Quantum computing as an inevitable technology can revolutionize many aspects of our society. One potential impact is on cryptocurrency such as Bitcoin, which relies on proof-of-work mining to secure the underlying blockchain protocol. Miners empowered by quantum computers will have superior computational power to win the competition. The quantum advantage jeopardizes the security and trustworthy of cryptocurrency and the transaction validation process by taking over a majority of the network’s computing power, known as a \(51\%\) attack. Fraudulent Bitcoin transactions in the form of double spending can happen, and the emerging quantum miner could enable double spending and benefit from it. How much double spending is optimal without causing too much “inflation”? What shall be the optimal strategy of the first quantum miner facing the competition from other quantum miners? What are the implications of having one or multiple quantum miners to the security of the Bitcoin network? We conduct a novel game theoretic and economic analysis to address these questions. Simulation illustrates that quantum miners would have to collude to gain from double spending in a quantum competitive environment. The distribution of cryptocurrency between quantum miners and classical miners and how cost-effective classical miners are can affect the profitability and the sustainability of double spending as well as the collusion of quantum miners. Intensified quantum competition will decrease the chance of collusion and eventually make the Bitcoin network secure again. The critical point of quantum popularity that will eliminate double spending is found.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Arute, F., Arya, K., Babbush, R., et al.: Quantum supremacy using a programmable superconducting processor. Nature 574, 505–510 (2019)

    Article  Google Scholar 

  2. Bailey, B., Sattath, O.: \(51\%\) attack via difficulty increase with a small quantum miner. arXiv:2403.08023 (2024)

  3. Bertucci, C., Bertucci, L., Lasry, J.M., Lions, P.L.: Mean field game approach to bitcoin mining. arXiv:2004.08167 (2020)

  4. Breiki, H.A.: Trust evolution game in blockchain. In: Proceedings of 2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates (2022)

    Google Scholar 

  5. Chiu, J., Koeppl, T.V.: The economics of cryptocurrency: bitcoin and beyond. Can. J. Econ. 55(4), 1762–1798 (2022)

    Article  Google Scholar 

  6. Chohan, U.W.: The double spending problem and cryptocurrencies. SSRN (2021)

    Google Scholar 

  7. Eisert, J., Wilkens, M., Lewenstein, M.: Quantum games and quantum strategies. Phys. Rev. Lett. 83(15), 3077–3080 (1999)

    Article  MathSciNet  Google Scholar 

  8. Holmes, S., Chen, L.: Assessment of quantum threat to bitcoin and derived cryptocurrencies. IACR Cryptology ePrint Archive 2021, 967 (2021)

    Google Scholar 

  9. Jang, J., Lee, H.N.: Profitable double-spending attacks. Appl. Sci. 10(23) (2020)

    Google Scholar 

  10. Kappert, N., Karger, E., Kureljusic, M.: Quantum computing - the impeding end for the blockchain? In: Proceedings of Pacific Asia Conference on Information Systems (PACIS), Dubai, UAE (2021)

    Google Scholar 

  11. Kiktenko, E.O., et al.: Quantum-secured blockchain. Quantum Sci. Technol. 3(3), 35004 (2018)

    Article  Google Scholar 

  12. Kim, D., Ryu, D., Webb, R.I.: Determination of equilibrium transaction fees in the Bitcoin network: a rank-order contest. Int. Rev. Financ. Anal. 86 (2023)

    Google Scholar 

  13. Kim, Y., et al.: Evidence for the utility of quantum computing before fault tolerance. Nature 618, 500–505 (2023)

    Article  Google Scholar 

  14. Li, Z., Liao, Q.: Toward socially optimal bitcoin mining. In: Proceedings of 5th IEEE International Conference on Information Science and Control Engineering (ICISCE), Zhengzhou, China (2018)

    Google Scholar 

  15. Li, Z., Liao, Q.: Is quantum computing the bitcoin terminator? In: Proceedings of the 30th Americas Conference on Information Systems (AMCIS), Salt Lake City, Utah, pp. 1–10 (2024)

    Google Scholar 

  16. Li, Z., Reppen, A.M., Sircar, R.: A mean field games model for cryptocurrency mining. Manag. Sci. 70(4) (2023)

    Google Scholar 

  17. Liu, Z., et al.: A survey on applications of game theory in blockchain. arXiv:1902.10865 (2019)

  18. Moore, W.O.: Demystifying bitcoin’s ownership landscape. Grayscale (2023)

    Google Scholar 

  19. Nguyen, C.T., Hoang, D.T., Nguyen, D.N., Niyato, D., Nguyen, H.T., Dutkiewicz, E.: Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access 7, 85727–85745 (2019)

    Article  Google Scholar 

  20. Nuzzi, L., Waters, K., Andrade, M.: Breaking BFT: quantifying the cost to attack Bitcoin and Ethereum. SSRN (2024)

    Google Scholar 

  21. Pinzón, C., Rocha, C.: Double-spend attack models with time advantage for bitcoin. Electron. Notes Theor. Comput. Sci. 329, 79–103 (2016)

    Article  Google Scholar 

  22. Pérez-Antón, R., Sánchez, J.I.L., Corbi, A.: The game theory in quantum computers: a review. Int. J. Interact. Multimed. Artif. Intell. (2023)

    Google Scholar 

  23. Stewart, I., Ilie, D., Zamyatin, A., Werner, S., Torshizi, M.F., Knottenbelt, W.J.: Committing to quantum resistance: a slow defence for bitcoin against a fast quantum computing attack. R. Soc. Open Sci. 5, 180410 (2018)

    Article  Google Scholar 

  24. Tas, E.N., Tse, D., Gai, F., Kannan, S., Maddah-Ali, M.A., Yu, F.: Bitcoin-enhanced proof-of-stake security: possibilities and impossibilities. In: Proceedings of 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA (2023)

    Google Scholar 

  25. Zaghloul, E., Li, T., Mutka, M.W., Ren, J.: Bitcoin and blockchain: security and privacy. IEEE Internet Things J. 7(10), 10288–10313 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Liao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Z., Liao, Q. (2025). How Much Should I Double Spend My Bitcoin? Game Theory of Quantum Mining. In: Sinha, A., Fu, J., Zhu, Q., Zhang, T. (eds) Decision and Game Theory for Security. GameSec 2024. Lecture Notes in Computer Science, vol 14908. Springer, Cham. https://doi.org/10.1007/978-3-031-74835-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-74835-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-74834-9

  • Online ISBN: 978-3-031-74835-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics