Skip to main content

Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies

  • Conference paper
  • First Online:
Book cover Information Systems Security (ICISS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9478))

Included in the following conference series:

Abstract

In ICISS 2014, Paul et al. identified several problems in the existing Proof-of-Work protocol for Bitcoin mining and proposed an alternative solution to generate blocks containing valid transactions. In their scheme, each miner generates a hash value locally and then the miners engage in a distributed computation of the minimum of the hashes to select the winner. The authors claimed that this will eliminate the advantage of the miners with more computational resources and therefore would be more democratic. However, in this paper we show that the new scheme is also subject to the same weakness in the sense that a miner with more computational resources can do some local computation in order to increase its winning probability. We also discuss possible remedies to this problem and their implications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bitcoin-Wiki. Bitcoin Wikipedia. https://en.bitcoin.it/wiki/Main_Page

  2. Bitcoin-Wiki. Block hashing algorithm. https://en.bitcoin.it/wiki/Block_hashing_algorithm

  3. Bitcoin-Wiki. Proof of Work Protocol. https://en.bitcoin.it/wiki/Proof_of_work

  4. Bitcoin Magazine. Government bans Professor mining bitcoin supercomputer. http://bitcoinmagazine.com/13774/government-bans-professor-mining-bitcoin-supercomputer/

  5. Blockchain. Average Transaction Confirmation Time. http://blockchain.info/charts/avg-confirmation-time?timespan=2year&showDataPoints=false&daysAverageString=1&show_header=true&scale=0&address=

  6. Blockchain. Blocks. https://en.bitcoin.it/wiki/Block

  7. Blockchain. Transactions. https://en.bitcoin.it/wiki/Transaction

  8. CoinDesk. Under the Microscope: Economic and Environmental Costs of Bitcoin Mining. http://www.coindesk.com/microscope-economic-environmental-costs-bitcoin-mining/

  9. Eyal, Ittay and Sirer, Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. CoRR, abs/1311.0243 (2013)

    Google Scholar 

  10. Forbes. Brilliant But Evil: Gaming Company Fined \( \$1\) Million For Secretly Using Players’ Computers To Mine Bitcoin. http://www.forbes.com/sites/kashmirhill/2013/11/19/brilliant-but-evil-gaming-company-turned-players-computers-into-unwitting-bitcoin-mining-slaves/

  11. Frequently Asked Questions. Transactions. https://bitcoin.org/en/faq#why-do-i-have-to-wait-10-minutes

  12. Gizmodo. The World’s Most Powerful Computer Network Is Being Wasted on Bitcoin. http://gizmodo.com/the-worlds-most-powerful-computer-network-is-being-was-504503726

  13. Kuhn, F., Locher, T., Schmid,S.: Distributed computation of the mode. In: Bazzi, R.A., Patt-Shamir, B. (eds.) Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, PODC 2008, Toronto, Canada, 18–21 August 2008, pp. 15–24. ACM (2008)

    Google Scholar 

  14. Learn Cryptography. 51% Attack. http://learncryptography.com/51-attack/

  15. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. May 2009

    Google Scholar 

  16. Paul, G., Sarkar, P., Mukherjee, S.: Towards a more democratic mining in bitcoins. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 185–203. Springer, Heidelberg (2014)

    Google Scholar 

  17. Santoro, N.: Design and Analysis of Distributed Algorithms. Wiley Series on Parallel and Distributed Computing, pp. 71–76. Wiley-Interscience, Hoboken (2006)

    Book  Google Scholar 

  18. The Guardian. Student uses university computers to mine Dogecoin. http://www.theguardian.com/technology/2014/mar/04/dogecoin-bitcoin-imperial-college-student-mine

  19. The Harvard Crimson. Harvard Research Computing Resources Misused for Dogecoin Mining Operation. http://www.thecrimson.com/article/2014/2/20/harvard-odyssey-dogecoin/

  20. Wackerly, D.D., Mendenhall III, W., Scheaffer, R.L.: Mathematical Statistics with Applications. Duxbury Advanced Series, sixth edition (2002)

    Google Scholar 

  21. Wikipedia. Proof-of-stake – Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=Proof-of-stake&oldid=615023202

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Goutam Paul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Paul, G. (2015). Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26961-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26960-3

  • Online ISBN: 978-3-319-26961-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics