Skip to main content

Analysis on the Block Reward of Fork After Withholding (FAW)

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11058))

Abstract

The irreversible trend in clustering of mining power raises severe concerns on stability and security of PoW based on cryptocurrency. It has been shown that, in some case, reward of a mining pool can be significantly increased by deviating honest mining strategy. As a result, many attacking strategies are proposed to maximize pools’ reward. Very recently, Kwon et. al. proposed Fork After Withholding (FAW) attack by combining selfish mining and Block Withholding (BWH) attack, which, as they stated, has a better reward than BWH. However, it is not always the case after our further investigation. In this paper, we firstly give a detailed comparation between the BWH and FAW attack, and show the implications behind them. We also consider honest mining to make the analysis of the block reward more clear. We demonstrate the imperfection of FAW in relative reward, reward after the fork and the fork state. Our main finding for FAW attack includes that the reward of victim pool increases faster compared to BWH attack, and for some cases, the attack should adopt honest mining strategy to maximize its reward, therefore, we present an improved FAW strategy, and propose a protocol for the pool’s manager to resist FAW’s attacker. Finally, we discuss the underlying flaws of FAW attack as well as countermeasures to alleviate it.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Block explorer. http://qukuai.com. Accessed 21 Dec 2017

  2. Litecoin: The cryptocurrency for payments based on blockchain technology. https://litecoin.org/. Accessed 13 Dec 2017

  3. Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. ACM (2016)

    Google Scholar 

  4. Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30

    Chapter  Google Scholar 

  5. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016). https://doi.org/10.1109/COMST.2016.2535718

    Article  Google Scholar 

  6. Gavin, W.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1–32 (2014)

    Google Scholar 

  7. Eyal, I.: The miner’s dilemma. In: IEEE Symposium on Security and Privacy, pp. 89–103. IEEE (2015)

    Google Scholar 

  8. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018). https://doi.org/10.1145/3212998

    Article  MATH  Google Scholar 

  9. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy, pp. 104–121. IEEE (2015)

    Google Scholar 

  10. Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: IEEE Computer Security Foundations Symposium, pp. 397–411. IEEE (2015)

    Google Scholar 

  11. Madeira, A.: What is bitcoin selfish mining? https://www.cryptocompare.com/coins/guides/what-is-bitcoin-selfish-mining/. Accessed 12 Jan 2018

  12. Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12, 1967–1978 (2017). https://doi.org/10.1109/TIFS.2016.2623588

    Article  Google Scholar 

  13. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  14. Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)

  15. Kwon, Y., Kim, D., Son, Y., Vasserman, E., Kim, Y.: Be selfish and avoid dilemmas: Fork After Withholding (FAW) attacks on bitcoin. In: ACMSIGSAC Conference on Computer and Communications Security, pp. 195–209. ACM (2017)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under grant No. 61572294, No. 61602287, Key Program of National Natural Science of China under grant No. 61632020, Natural Science Foundation of Shandong Province under grant No. ZR2017MF021, the Primary Research & Development Plan of Shandong Province (No. 2018GGX101037), and the Fundamental Research Funds of Shandong University under grant No. 2017JC019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ke, J., Jiang, H., Song, X., Zhao, S., Wang, H., Xu, Q. (2018). Analysis on the Block Reward of Fork After Withholding (FAW). In: Au, M., et al. Network and System Security. NSS 2018. Lecture Notes in Computer Science(), vol 11058. Springer, Cham. https://doi.org/10.1007/978-3-030-02744-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02744-5_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02743-8

  • Online ISBN: 978-3-030-02744-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics