Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196512
|View full text |Cite
|
Sign up to set email alerts
|

On the Strategy and Behavior of Bitcoin Mining with N-attackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
22
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(23 citation statements)
references
References 7 publications
1
22
0
Order By: Relevance
“…A similar trend in the HM's mining reward with respect to the HM's mining power is also observed and shown in Figure 1(b). As shown by Liu et al [10], our observation has also revealed a similar underlying cause of the trend of HM/SM's mining reward. Generally, the higher the number of miners, the less mining power each of them has.…”
Section: Fixed Strategy Miningsupporting
confidence: 87%
See 1 more Smart Citation
“…A similar trend in the HM's mining reward with respect to the HM's mining power is also observed and shown in Figure 1(b). As shown by Liu et al [10], our observation has also revealed a similar underlying cause of the trend of HM/SM's mining reward. Generally, the higher the number of miners, the less mining power each of them has.…”
Section: Fixed Strategy Miningsupporting
confidence: 87%
“…In particular, most works so far studied SM or similar strategies in a setting with one malicious miner and one non-malicious miner [6,7,9,12,13,15]. To our knowledge, there is a small-scale study which was recently conducted in parallel [10]. Compared to their work, our findings are more robust due to a large number of malicious miners in the system and a fair treatment of the underlying network in our experiment.…”
Section: Related Workmentioning
confidence: 69%
“…Nayak et al 15 prove that stubborn attacks improve about 13.94% revenues compared with selfish mining attacks. Liu et al extend SM to N attackers and propose a new attacking model: publish‐n 16 . Finally, they compare its validity with selfish mining and stubborn attacks.…”
Section: Introductionmentioning
confidence: 99%
“…This centralization of power, runs counter to the spirit of decentralized cryptocurrencies. Large pools getting larger and small pools getting smaller will ultimately lead to an environment prone harmful attacks [21], [22], [25]. Our model also suggests how this "aggregation" effect can mitigated.…”
Section: B Our Contributionmentioning
confidence: 95%
“…In particular, a number of identified attacks directly concern centralization of mining power. These include double spending [1], [18]- [20], block withholding [8], [21], [22], selfish mining [7], [23] among others [4], [24], [25]. A number of desirable blockchain properties can be hampered due to incompatible mining incentives.…”
Section: A Related Workmentioning
confidence: 99%