Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9478)

Abstract

In ICISS 2014, Paul et al. identified several problems in the existing Proof-of-Work protocol for Bitcoin mining and proposed an alternative solution to generate blocks containing valid transactions. In their scheme, each miner generates a hash value locally and then the miners engage in a distributed computation of the minimum of the hashes to select the winner. The authors claimed that this will eliminate the advantage of the miners with more computational resources and therefore would be more democratic. However, in this paper we show that the new scheme is also subject to the same weakness in the sense that a miner with more computational resources can do some local computation in order to increase its winning probability. We also discuss possible remedies to this problem and their implications.

Keywords

Bitcoins Cryptocurrency Democratic mining Electronic cash system Miners Proof-of-work 

References

  1. 1.
    Bitcoin-Wiki. Bitcoin Wikipedia. https://en.bitcoin.it/wiki/Main_Page
  2. 2.
    Bitcoin-Wiki. Block hashing algorithm. https://en.bitcoin.it/wiki/Block_hashing_algorithm
  3. 3.
    Bitcoin-Wiki. Proof of Work Protocol. https://en.bitcoin.it/wiki/Proof_of_work
  4. 4.
    Bitcoin Magazine. Government bans Professor mining bitcoin supercomputer. http://bitcoinmagazine.com/13774/government-bans-professor-mining-bitcoin-supercomputer/
  5. 5.
  6. 6.
  7. 7.
    Blockchain. Transactions. https://en.bitcoin.it/wiki/Transaction
  8. 8.
    CoinDesk. Under the Microscope: Economic and Environmental Costs of Bitcoin Mining. http://www.coindesk.com/microscope-economic-environmental-costs-bitcoin-mining/
  9. 9.
    Eyal, Ittay and Sirer, Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. CoRR, abs/1311.0243 (2013)Google Scholar
  10. 10.
    Forbes. Brilliant But Evil: Gaming Company Fined \( \$1\) Million For Secretly Using Players’ Computers To Mine Bitcoin. http://www.forbes.com/sites/kashmirhill/2013/11/19/brilliant-but-evil-gaming-company-turned-players-computers-into-unwitting-bitcoin-mining-slaves/
  11. 11.
    Frequently Asked Questions. Transactions. https://bitcoin.org/en/faq#why-do-i-have-to-wait-10-minutes
  12. 12.
    Gizmodo. The World’s Most Powerful Computer Network Is Being Wasted on Bitcoin. http://gizmodo.com/the-worlds-most-powerful-computer-network-is-being-was-504503726
  13. 13.
    Kuhn, F., Locher, T., Schmid,S.: Distributed computation of the mode. In: Bazzi, R.A., Patt-Shamir, B. (eds.) Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, PODC 2008, Toronto, Canada, 18–21 August 2008, pp. 15–24. ACM (2008)Google Scholar
  14. 14.
    Learn Cryptography. 51% Attack. http://learncryptography.com/51-attack/
  15. 15.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. May 2009Google Scholar
  16. 16.
    Paul, G., Sarkar, P., Mukherjee, S.: Towards a more democratic mining in bitcoins. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 185–203. Springer, Heidelberg (2014) Google Scholar
  17. 17.
    Santoro, N.: Design and Analysis of Distributed Algorithms. Wiley Series on Parallel and Distributed Computing, pp. 71–76. Wiley-Interscience, Hoboken (2006) CrossRefGoogle Scholar
  18. 18.
    The Guardian. Student uses university computers to mine Dogecoin. http://www.theguardian.com/technology/2014/mar/04/dogecoin-bitcoin-imperial-college-student-mine
  19. 19.
    The Harvard Crimson. Harvard Research Computing Resources Misused for Dogecoin Mining Operation. http://www.thecrimson.com/article/2014/2/20/harvard-odyssey-dogecoin/
  20. 20.
    Wackerly, D.D., Mendenhall III, W., Scheaffer, R.L.: Mathematical Statistics with Applications. Duxbury Advanced Series, sixth edition (2002)Google Scholar
  21. 21.
    Wikipedia. Proof-of-stake – Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=Proof-of-stake&oldid=615023202

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Cryptology and Security Research Unit, R. C. Bose Centre for Cryptology and SecurityIndian Statistical InstituteKolkataIndia

Personalised recommendations