Majority is not Enough: Bitcoin Mining is Vulnerable

Slides:



Advertisements
Similar presentations
Bitcoins Transaction Processing Yonatan Sompolinsky joint work with Aviv Zohar.
Advertisements

Secure Multiparty Computations on Bitcoin
Huffman code and ID3 Prof. Sin-Min Lee Department of Computer Science.
Cryptocurrency Peter Carnesciali Marcus Rivera BitcoinDogecoin LitecoinPeercoin.
Benjamin Johnson Carnegie Mellon University Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information TRUST.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 14: Selfish Mining.
Bitcoin. What is Bitcoin? A P2P network for electronic payments Benefits: – Low fees – No middlemen – No central authority – Can be anonymous – Each payment.
Towards a More Democratic Mining in Bitcoins Goutam Paul R. C. Bose Centre for Cryptology & Security, Indian Statistical Institute Pratik Sarkar Indian.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
On Power Splitting Games in Distributed Computation: The case of Bitcoin Pooled Mining Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena & Aquinas.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 11: Mining Pools and Attacks.
Bitcoin (what, why and how?)
Bitcoins and the Digital Economy Presented By: Matt Blackman.
1 Bitcoin A Digital Currency. Functions of Money.
Perils of Transitive Trust in the Domain Name System Chen Xi Chen Xi.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
More Mining David Evans and Samee Zahur CS4501, Fall 2015 University of Virginia.
Demystifying incentives in the consensus computer Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena National University of Singapore.
Subverting Bitcoin David Evans and Samee Zahur. Mining Why do we need miners?
Bitcoin Tech Talk Zehady Abdullah Khan (Andy) Graduate Assistant, Computer Science Department, Purdue University.
Bitcoin is a cryptographic currency that has been in continuous operation over the last 3 years. It currently enjoys an exchange rate of $4.80 (as of April.
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack With Srijan Kumar, Andrew Miller and Elaine Shi 1 Kartik Nayak.
BITCOIN IS LEGAL IN THE WHOLE WORLD. What are the concerns about bitcoin? Government agencies are increasingly worried about the implications of bitcoin,
First… What is Cryptocurrency? A Cryptocurrency is a digital currency that is created through mathematical engineering (algorithm). It is designed to.
Digital vs. paper currencies Paper: Digital: 16fab13fc6890 Very useful if is also digital.
Block Chain 101 May 2017.
these are protocols used for changing the bitcoin network protocols
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
Investment Personality
“Connecting bitcoiners worldwide”
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
Bitcoin A Basic Tutorial on Decentralized money
Passion for building stronger business
Hijacking Bitcoin: Routing attacks on cryptocurrencies
Bitcoin and the Blockchain
Cryptocurrencies by.
Blockchains in 12 Easy Steps and Observations to Ponder…
Bitcoin - a distributed virtual currency system
Instability Of Bitcoin Without the Block Reward.
Distributed Systems for Information Systems Management
ECIP-1017.
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
Ling Ren Joint work with Ittai Abraham, Dahlia Malkhi,
M onero is an open source, secure, private and non-traceable cryptocurrency. Monero token is known as XMR. Monero is aimed at privacy of transaction and.
Dash Mining - for Dummies. Dash, an altcoin, is best known for two main features – ability to send instantly and highest level of privacy provision. It’s.
From “Cash on the internet” to “Digital Gold”
CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini
Bitcoin & Blockchains Kevin Sekniqi.
Ryan Bitcoin 101 Ryan
NEECOM – May 16, 2018 Todd L. Gould, CEO
History of Bitcoin Where do we come from? Bas Wisselink
Bitcoin and the Blockchain
Campbell R. Harvey Duke University and NBER
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Bitcoin and Blockchains
Blockchains and Smart Contracts for the Internet of Things
Faculty Seminar Series Blockchain Technology
Bitcoin & Blockchains Kevin Sekniqi.
Chapter 1 Key Security Terms.
Blockchain == Crypto + Raft++
CSE 552 preparation for reading
Bitcoin and Blockchain
Cryptocurrency Zili Zhou.
Blockchain Mining Games
Author: Satoshi Nakamoto
Presentation transcript:

Majority is not Enough: Bitcoin Mining is Vulnerable Ittay Eyal and Emin Gün Sirer Department of Computer Science, Cornell University Presented By Ovia Seshadri, CSE IITD

The original version of this paper was Published in Financial Cryptography and Data Security (FC 2014). Lecture Notes in Computer Science 8437, Springer; https://link.springer.com/ chapter/10.1007/978-3-662-45472-5_28 Laid foundations for the well known Selfish Mining Attack Cited by 896 and counting Gained popularity in all Financial markets and news

Preliminaries Blockchain, Bitcoin, PoW, Hashing Power, Mining, Pools Forks Longest chain Rule, Majority, 51% attack Block Rewards, Difficulty

Discussion An Honest majority is an important requirement!! Miners are independent and self motivated Best strategy must be to play honest A Blockchain must be fair! Incentive – compatibility Are pools a problem??

Miner controls 25% he gets 1 block every 4 blocks

Paper Contributions Bitcoin Mining is not incentive Compatible Incentive to form pools and strategy to benefit pools Possibility of system collapse above a threshold A possible solution to increase threshold.

Selfish Mining Selfish Mining outperforms honest mining GOAL: Get more that fair share HOW: Maintain secret blocks, publish judiciously INTUITION: Risk some work, Others waste a lot more.

Attacker tries to create as long a secret chain as possible Publish secret branch just before losing lead (assuming no latency)

Also Publish when the lead is lost!! Intentional public fork - RACE Risk - RACE Also Publish when the lead is lost!! Intentional public fork - RACE      

 

Markov Chain model

Fraction of Attacker’s hash power - α

System is partitioned at every arrival. The system grows at the same rate left to right or right to left. Pi – is the probability of being at ith state.

Where 0<=α<=1/2

Solution   Discussion System Collapse – Even attackers are invested in the coin Altruistic Agents – moral nodes Naïve Lines of Defense – police infiltration into selfish pools Imminent Danger

Thank You