UM
Residential Collegefalse
Status已發表Published
On the strategy and behavior of bitcoin mining with N-attackers
Liu H.; Du R.; Ruan N.; Jia W.
2018-05-29
Conference Name13th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS)
Source PublicationASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Pages357-368
Conference DateJUN 04-08, 2018
Conference PlaceIncheon, SOUTH KOREA
Abstract

Selfish mining is a well-known mining attack strategy discovered by Eyal and Sirer in 2014. After that, the attackers' strategy has been further discussed by many other works, which analyze the strategy and behavior of a single attacker. The extension of the strategy research is greatly restricted by the assumption that there is only one attacker in the blockchain network, since, in many cases, a proof of work blockchain has multiple attackers. The attackers can be independent of others instead of sharing information and attacking the blockchain as a whole. In this paper, we will establish a new model to analyze the miners' behavior in a proof of work blockchain with multiple attackers. Based on our model, we extend the attackers' strategy by proposing a new strategy set publish-n. Meanwhile, we will also review other attacking strategies such as selfish mining and stubborn mining in our model to explore whether these strategies work or not when there are multiple attackers. The performances of different strategies are compared using relative stale block rate of the attackers. In a proof of work blockchain model with two attackers, strategy publish-n can beat selfish mining by up to 26.3%.

KeywordBitcoin Mining N-attackers Selfish Mining
DOI10.1145/3196494.3196512
URLView the original
Language英語English
WOS IDWOS:000516620100028
Scopus ID2-s2.0-85049199881
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionUniversity of Macau
AffiliationShanghai Jiao Tong University
Recommended Citation
GB/T 7714
Liu H.,Du R.,Ruan N.,et al. On the strategy and behavior of bitcoin mining with N-attackers[C], 2018, 357-368.
APA Liu H.., Du R.., Ruan N.., & Jia W. (2018). On the strategy and behavior of bitcoin mining with N-attackers. ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, 357-368.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Liu H.]'s Articles
[Du R.]'s Articles
[Ruan N.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Liu H.]'s Articles
[Du R.]'s Articles
[Ruan N.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Liu H.]'s Articles
[Du R.]'s Articles
[Ruan N.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.