Abstract
The Bitcoin mining protocol has been intensively studied and widely adopted by many other cryptocurrencies. However, it has been shown that this protocol is not incentive compatible, because the selfish mining strategy enables a miner to gain unfair rewards. Existing defenses either demand fundamental changes to block validity rules or have little effect against a resourceful attacker. This paper proposes a backward-compatible defense mechanism which outperforms the previous best defense. Our fork-resolving policy neglects blocks that are not published in time and appreciates blocks that incorporate links to competing blocks of their predecessors. Consequently, a block that is kept secret until a competing block is published contributes to neither or both branches, hence it confers no advantage in winning the block race. Additionally, we discuss the dilemma between partition recovery time and selfish mining resistance, and how to balance them in our defense.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bitcoin core version 0.10.1 released. https://bitcoin.org/en/release/v0.10.1
Bitcoin stats - data propagation. http://bitcoinstats.com/network/propagation/
Block timestamp. https://en.bitcoin.it/wiki/Block_timestamp
Ethereum white paper: Modified Ghost implementation. https://github.com/ethereum/wiki/wiki/White-Paper#modified-ghost-implementation
Bitcoin improvement proposals (2016). https://github.com/bitcoin/bips/blob/master/README.mediawiki
Bahack, L.: Theoretical Bitcoin attacks with less than half of the computational power (draft). arXiv preprint arxiv:1312.7013 (2013)
Btchris, Bytecoin: Mtgox, RHorning: Mining cartel attack (2010). https://bitcointalk.org/index.php?topic=2227
Corallo, M.: Bitcoin relay network. http://bitcoinrelaynetwork.org/
culubas: Timejacking & bitcoin (2011). http://culubas.blogspot.be/2011/05/timejacking-bitcoin_802.html
Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Berlin (2014). doi:10.1007/978-3-662-45472-5_28
Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46803-6_10
Heilman, E.: One weird trick to stop selfish miners: Fresh Bitcoins, a solution for the honest miner. Cryptology ePrint Archive, Report 2014/007 (2014). https://eprint.iacr.org/2014/007
Mazieres, D.: The stellar consensus protocol: A federated model for internet-level consensus. Stellar Development Foundation (2015)
Miller, A., Litton, J., Pachulski, A., Gupta, N., Levin, D., Spring, N., Bhattacharjee, B.: Discovering bitcoins public topology and influential nodes (2015)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http://www.bitcoin.org/bitcoin.pdf
Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and cryptocurrency technologies. Princeton University Press (2016)
Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: IEEE European Symposium on Security and Privacy (EuroS&P), pp. 305–320. IEEE (2016)
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in Bitcoin. Financial Cryptography and Data Security (2016)
Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive Compatibility of Bitcoin Mining Pool Reward Functions. In: Financial Cryptography and Data Security (2016)
Schwartz, D., Youngs, N., Britto, A.: The Ripple protocol consensus algorithm. Ripple Labs White Paper (2014)
Shultz, B.L.: Certification of witness: Mitigating blockchain fork attacks (2015). http://bshultz.com/paper/Shultz_Thesis.pdf
Solat, S., Potop-Butucaru, M.: Zeroblock: Preventing selfish mining in bitcoin. arXiv preprint arXiv:1605.02435 (2016)
Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in Bitcoin. Financial Cryptography and Data Security (2015)
Acknowledgements
This work was supported in part by the Research Council KU Leuven: C16/15/058. In addition, this work was supported by the imec High Impact initiative Distributed Trust project on Blockchain and Smart contracts. The authors would like to thank Yonatan Sompolinsky for pointing out several potential attacks on an earlier version of the protocol. We would also like to thank Kaiyu Shao, Güneş Acar, Alan Szepieniec, Danny De Cock, Michael Herrmann and the anonymous reviewers for their valuable comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhang, R., Preneel, B. (2017). Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin. In: Handschuh, H. (eds) Topics in Cryptology – CT-RSA 2017. CT-RSA 2017. Lecture Notes in Computer Science(), vol 10159. Springer, Cham. https://doi.org/10.1007/978-3-319-52153-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-52153-4_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52152-7
Online ISBN: 978-3-319-52153-4
eBook Packages: Computer ScienceComputer Science (R0)