Instability Of Bitcoin Without the Block Reward.

Slides:



Advertisements
Similar presentations
A Judgment Mechanism for Key Revocation Abstract In this paper we present a new key-revocation scheme for ad hoc network environments with the following.
Advertisements

1 Signalling Often a player wants to convey his private information to other players. It might be information about his own payoffs (My costs are low,
When a Good Reputation isn’t Good Enough Jonathan Traupman Robert Wilensky U.C. Berkeley.
Secure Multiparty Computations on Bitcoin
Short-Term Fairness and Long- Term QoS Lei Ying ECE dept, Iowa State University, Joint work with Bo Tan, UIUC and R. Srikant, UIUC.
COMS 486 Iowa State University Introduction to Bitcoin A P2P Electronic Cash System.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
Towards a More Democratic Mining in Bitcoins Goutam Paul R. C. Bose Centre for Cryptology & Security, Indian Statistical Institute Pratik Sarkar Indian.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
A Payment-based Incentive and Service Differentiation Mechanism for P2P Streaming Broadcast Guang Tan and Stephen A. Jarvis Department of Computer Science,
Perfect Competition and the
Localized Asynchronous Packet Scheduling for Buffered Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York Stony Brook.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
On Power Splitting Games in Distributed Computation: The case of Bitcoin Pooled Mining Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena & Aquinas.
© 2005 Worth Publishers Slide 9-1 CHAPTER 9 Perfect Competition and the Supply Curve PowerPoint® Slides by Can Erbil and Gustavo Indart © 2005 Worth Publishers,
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
A Transaction Fee Market Exists Without a Block Size Limit* Peter R Montreal Scalability Workshop September 12, 2015 *Provisos: (1) Inflation rate is nonzero.
Subverting Bitcoin David Evans and Samee Zahur. Mining Why do we need miners?
Oligopoly and Game Theory Topic Students should be able to: Use simple game theory to illustrate the interdependence that exists in oligopolistic.
1 Chapter 10 Marketing Channels & Supply Chain Management.
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack With Srijan Kumar, Andrew Miller and Elaine Shi 1 Kartik Nayak.
Perfect Competition and the Supply Curve Chapter 12.
Block Chain 101 May 2017.
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
Contents of the Talk Preliminary Materials Motivation and Contribution
The Secrets of Saving Introductory Level.
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
Join Bitcoin2You & Start Earning Today!!
Passion for building stronger business
Bitcoin and the Blockchain
Evaluation Forms for Blockchain- Based System ver. 1.0
Money Demand and the Equilibrium Interest Rate
Bitcoin - a distributed virtual currency system
Chapter 8: Foundations of Planning
Caching Games between Content Providers and Internet Service Providers
ECIP-1017.
Cryptocurrencies By Rui Sakurai and Shane Spears
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
Ling Ren Joint work with Ittai Abraham, Dahlia Malkhi,
Second Mortgage in Toronto - Why And How
Bitcoin Cash Mining – Basics Answered. Bitcoin Cash Mining To start Bitcoin Cash Mining, the first thing you need is a Bitcoin Cash.

Zcash Mining – A Guide For Beginners. Zcash (also known as ZEC and seventeenth most valued cryptocurrency with market capitalization of $500 million)
CS898AT – Bitcoins and Cryptocurrencies
Nakamoto Consensus Marco Canini
The Secrets of Saving Introductory Level.
Crypto Mining LLC.
ECON 211 ELEMENTS OF ECONOMICS I
Horizontal Differentiation
Bitcoin: A New Internet Currency
Blockchains (2) slides have been taken from:
Campbell R. Harvey Duke University and NBER
Bursty and Hierarchical Structure in Streams
Nonce Making Sense of Nonces.
GasToken: A Journey Through Blockchain Resource Arbitrage
What Is Planning? Planning - a primary managerial activity that involves: Defining the organization’s goals Establishing an overall strategy for achieving.
How Wages are Determined
Blockchains and Smart Contracts for the Internet of Things
Off-Chain Payment Channels
PowerPoint Presentation by Charlie Cook
Perfect Competition and the Supply Curve
Authors: Jinliang Fan and Mostafa H. Ammar
DOUBLE-UP CRYPTO CROWDFUNDING PROJECT
Time-dependent Decision-making and Decentralization in Proof-of- Work Cryptocurrencies Yevhen Zolotavkin, Julian Garcia, Joseph Liu CSF 2019.
Majority is not Enough: Bitcoin Mining is Vulnerable
Bitcoin and Blockchain
Blockchain Mining Games
Elastic Block Caps Meni Rosenfeld
Presentation transcript:

Instability Of Bitcoin Without the Block Reward. Authors: Miles Carlsten,Harry Kalodner, S. Matthew Weinberg,Arvind Narayanan

AGENDA DUAL REWARDS IN BITCOIN. SECURITY THREAT IN BITCOIN. DEVIANT MINING STARETGIES MINING EQUILIBRIUM. FUTURE RESEARCH. LIMITATIONS.

MOTIVATION Blocks rewards are main source of mining income. Block rewards eventually get replaced by transaction fee paid to miners. Common belief is block rewards or transaction fees have no impact on security. Researchers were inspired to look at long term stability of bitcoin when block rewards disappear completely.

DUAL REWARDS

DUAL REWARDS

DUAL REWARDS

Bitcoin security threat:Forking

Bitcoin Security Threat. Bitcoin game’s theoretic stability breaks down when block reward disappears. WHY??. Exponentially distributed block arrival time leads to blocks with uneven transaction fees. It becomes attractive to fork a wealthy block to steal the rewards therein.

Bitcoin Security Threat. Bitcoin game’s theoretic stability breaks down when block reward disappears. HOW?? Rational miners are incentivized to deviate from the standard behavior. Higher orphan block rates lead to lower security. Purposeful forking increases transaction throughput. Bitcoin's security and overall hash rate goes down.

Bitcoin Mining Gap. Without a block reward, after a block is found where all the available transactions were made part of the block, there is zero expected reward, but non-zero electricity cost, making it unprofitable for the miner to mine. So when gaps exists between mining blocks, miners would not mine until the point they can justify that there are enough transactions that would pay them the transaction fee which would cover the cost of electricity and earn profits. The mining gaps result in lowering the overall hash power of the network. This makes it easier for a malicious miner to fork. During mining gaps turning the rigs on and off is quite infeasible too , thereby encouraging miners to deviate from the default protocol.

Bitcoin Mining Gap.

RESEARCH CONTRIBUTIONS. Mining strategy simulator: Miners in simulation learn over time which strategies are successful using no-regret learning algorithms. Strategies are developed around three questions: Which block to extend. How much of the outstanding transactions to include in the block. When to publish found blocks. Simulator allowed modeling different numbers of miners, hash power distributions, network latencies, and reward schemes. Research on Deviant Mining Strategies.

Deviant mining strategy-1. One block Fork Rational miners will mine on top of the block with the largest transaction pool. In this case B. This happens in the 1 block fork.

Deviant mining strategy-2. Undercutting 1 block fork transitions to undercutting strategy. Miners will fork the head of the chain. A non-equilibrium happens with increasingly aggressive undercutting. Transactions are left unclaimed to incentivize selfish miners. Equilibrium is attained where miners include only a fraction of available transactions into their blocks

Deviant mining strategy-3 Selfish Mining Revisited Selfish mining performs slightly better in the transaction fee model. Selfish miners can make the decision whether to hide their block based on the value of the transactions in the block. This improved selfish mining strictly and always outperforms both default mining and traditional selfish mining.

Deviant mining behavior phases PHASE ONE: Petty compliant Miners incentivize by mining on the block that leaves the most transactions fees unclaimed. PHASE TWO: Lazy Undercutting. Once some fraction of miners is petty compliant, other miners make profit by intentionally forking the chain. Forks the blockchain if the head block is more valuable than the unclaimed transaction fees it leaves behind. Only takes half of the possible transaction fees to prevent other lazy forkers from forking their block.  

Deviant mining behavior phases PHASE THREE: Aggressive Undercutting. Aggressively optimize the tradeoff between -Maximizing the transaction fees included in blocks they mine -Minimizing the chance that their block will be undercut by other miners in the system.

Undercutting Equilibrium.

Undercutting Equilibrium. An equilibrium exists where all miners use the same undercutting strategy. It induces a growing backlog of transactions. Even if 66% of miners remain honest, undercutting is profitable.

Research Results In the transaction fee model, selfish miners outperforms traditional selfish mining. In a block chain with constant forks caused by undercutting, an attacker's effective hash power is magnified because he will always mine to extend his own blocks. 51% attack possible with much less than 51% hash power. Lot of orphaned blocks brings down the overall security of block chain. Block reward is integral to the stability of mining game. Analyzing equilibrium in the transaction-fee regime appears dramatically harder than in the block-reward regime

Future Research: Space in the block chain will be a scarce resource in the future. Market will emerge, with users being able to speed up the confirmation of a transaction by paying a sufficiently large transaction fee. But what if miners intentionally leave money on the table when solving blocks, as is the case in undercutting. Block size imposes a constraint on the total size of transactions in a block . Threat of being undercut imposes another constraint on the total fee. This thought leads to another area of research.

Limitations The researchers have not presented an analysis of miners whose strategy space includes both undercutting and selfish mining. The researchers have not proposed a resolution to preventing the under-cutting problem from happening. Mining simulator cannot model mining pools . Simulation of a non-constant arrival rate of transactions not possible.

THANK YOU!!!! Questions??