Majority Is Not Enough: Bitcoin Mining Is Vulnerable View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2014

AUTHORS

Ittay Eyal , Emin Gün Sirer

ABSTRACT

The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed. We show that the Bitcoin mining protocol is not incentive-compatible. We present an attack with which colluding miners obtain a revenue larger than their fair share. This attack can have significant consequences for Bitcoin: Rational miners will prefer to join the selfish miners, and the colluding group will increase in size until it becomes a majority. At this point, the Bitcoin system ceases to be a decentralized currency. Unless certain assumptions are made, selfish mining may be feasible for any group size of colluding miners. We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case. It prohibits selfish mining by pools that command less than \(1/4\) of the resources. This threshold is lower than the wrongly assumed \(1/2\) bound, but better than the current reality where a group of any size can compromise the system. More... »

PAGES

436-454

References to SciGraph publications

  • 1983. Blind Signatures for Untraceable Payments in ADVANCES IN CRYPTOLOGY
  • 2012. Bitter to Better — How to Make Bitcoin a Better Currency in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2013. Quantitative Analysis of the Full Bitcoin Transaction Graph in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • Book

    TITLE

    Financial Cryptography and Data Security

    ISBN

    978-3-662-45471-8
    978-3-662-45472-5

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-662-45472-5_28

    DOI

    http://dx.doi.org/10.1007/978-3-662-45472-5_28

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1001986249


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Cornell University", 
              "id": "https://www.grid.ac/institutes/grid.5386.8", 
              "name": [
                "Department of Computer Science, Cornell University, Ithaca, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Eyal", 
            "givenName": "Ittay", 
            "id": "sg:person.015022230121.71", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015022230121.71"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Cornell University", 
              "id": "https://www.grid.ac/institutes/grid.5386.8", 
              "name": [
                "Department of Computer Science, Cornell University, Ithaca, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sirer", 
            "givenName": "Emin G\u00fcn", 
            "id": "sg:person.07757027131.87", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07757027131.87"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-39884-1_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002815495", 
              "https://doi.org/10.1007/978-3-642-39884-1_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2229012.2229022", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015382152"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948150", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037887847"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-32946-3_29", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050289856", 
              "https://doi.org/10.1007/978-3-642-32946-3_29"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4757-0602-4_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051902591", 
              "https://doi.org/10.1007/978-1-4757-0602-4_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sp.2013.34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093437541"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sp.2013.34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093437541"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/p2p.2013.6688704", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095522752"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/p2p.2013.6688704", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095522752"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2014", 
        "datePublishedReg": "2014-01-01", 
        "description": "The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed. We show that the Bitcoin mining protocol is not incentive-compatible. We present an attack with which colluding miners obtain a revenue larger than their fair share. This attack can have significant consequences for Bitcoin: Rational miners will prefer to join the selfish miners, and the colluding group will increase in size until it becomes a majority. At this point, the Bitcoin system ceases to be a decentralized currency. Unless certain assumptions are made, selfish mining may be feasible for any group size of colluding miners. We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case. It prohibits selfish mining by pools that command less than \\(1/4\\) of the resources. This threshold is lower than the wrongly assumed \\(1/2\\) bound, but better than the current reality where a group of any size can compromise the system.", 
        "editor": [
          {
            "familyName": "Christin", 
            "givenName": "Nicolas", 
            "type": "Person"
          }, 
          {
            "familyName": "Safavi-Naini", 
            "givenName": "Reihaneh", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-662-45472-5_28", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-662-45471-8", 
            "978-3-662-45472-5"
          ], 
          "name": "Financial Cryptography and Data Security", 
          "type": "Book"
        }, 
        "name": "Majority Is Not Enough: Bitcoin Mining Is Vulnerable", 
        "pagination": "436-454", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-662-45472-5_28"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "0975c6e5299047416423b0e7a1f0af4c2b2cd82b8f6c02850ed3830272f7eff3"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1001986249"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-662-45472-5_28", 
          "https://app.dimensions.ai/details/publication/pub.1001986249"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T21:42", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000003.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-662-45472-5_28"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-45472-5_28'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-45472-5_28'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-45472-5_28'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-45472-5_28'


     

    This table displays all metadata directly associated to this object as RDF triples.

    101 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-662-45472-5_28 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N0efbf59546f74c74b1aaf800851d89b9
    4 schema:citation sg:pub.10.1007/978-1-4757-0602-4_18
    5 sg:pub.10.1007/978-3-642-32946-3_29
    6 sg:pub.10.1007/978-3-642-39884-1_2
    7 https://doi.org/10.1109/p2p.2013.6688704
    8 https://doi.org/10.1109/sp.2013.34
    9 https://doi.org/10.1145/2229012.2229022
    10 https://doi.org/10.1145/948109.948150
    11 schema:datePublished 2014
    12 schema:datePublishedReg 2014-01-01
    13 schema:description The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed. We show that the Bitcoin mining protocol is not incentive-compatible. We present an attack with which colluding miners obtain a revenue larger than their fair share. This attack can have significant consequences for Bitcoin: Rational miners will prefer to join the selfish miners, and the colluding group will increase in size until it becomes a majority. At this point, the Bitcoin system ceases to be a decentralized currency. Unless certain assumptions are made, selfish mining may be feasible for any group size of colluding miners. We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case. It prohibits selfish mining by pools that command less than \(1/4\) of the resources. This threshold is lower than the wrongly assumed \(1/2\) bound, but better than the current reality where a group of any size can compromise the system.
    14 schema:editor N0b8e1e94f7b640f2a973c0411e606054
    15 schema:genre chapter
    16 schema:inLanguage en
    17 schema:isAccessibleForFree true
    18 schema:isPartOf Nabf66453c2e84232b3867e4092625f19
    19 schema:name Majority Is Not Enough: Bitcoin Mining Is Vulnerable
    20 schema:pagination 436-454
    21 schema:productId N1f8ae825f6f74552b46655b22c077ca9
    22 N5de59751715b42e48ec4658650b2488a
    23 Ndfa3d0fa84544d17b048f837519788e5
    24 schema:publisher Nc789a710015b4d638b2fbf1cf91e8a8a
    25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001986249
    26 https://doi.org/10.1007/978-3-662-45472-5_28
    27 schema:sdDatePublished 2019-04-15T21:42
    28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    29 schema:sdPublisher N2674edd573044ba8b068a589dec1f9b1
    30 schema:url http://link.springer.com/10.1007/978-3-662-45472-5_28
    31 sgo:license sg:explorer/license/
    32 sgo:sdDataset chapters
    33 rdf:type schema:Chapter
    34 N0b8e1e94f7b640f2a973c0411e606054 rdf:first N720621d44bb14470bf5ac25d4a8efdf6
    35 rdf:rest N255121051c25456681f4a27fd7519c97
    36 N0efbf59546f74c74b1aaf800851d89b9 rdf:first sg:person.015022230121.71
    37 rdf:rest N7f8b124c77894831b4b23d5786082838
    38 N1f8ae825f6f74552b46655b22c077ca9 schema:name doi
    39 schema:value 10.1007/978-3-662-45472-5_28
    40 rdf:type schema:PropertyValue
    41 N255121051c25456681f4a27fd7519c97 rdf:first Nfd1f298143894875bb8601c9175a0113
    42 rdf:rest rdf:nil
    43 N2674edd573044ba8b068a589dec1f9b1 schema:name Springer Nature - SN SciGraph project
    44 rdf:type schema:Organization
    45 N5de59751715b42e48ec4658650b2488a schema:name dimensions_id
    46 schema:value pub.1001986249
    47 rdf:type schema:PropertyValue
    48 N720621d44bb14470bf5ac25d4a8efdf6 schema:familyName Christin
    49 schema:givenName Nicolas
    50 rdf:type schema:Person
    51 N7f8b124c77894831b4b23d5786082838 rdf:first sg:person.07757027131.87
    52 rdf:rest rdf:nil
    53 Nabf66453c2e84232b3867e4092625f19 schema:isbn 978-3-662-45471-8
    54 978-3-662-45472-5
    55 schema:name Financial Cryptography and Data Security
    56 rdf:type schema:Book
    57 Nc789a710015b4d638b2fbf1cf91e8a8a schema:location Berlin, Heidelberg
    58 schema:name Springer Berlin Heidelberg
    59 rdf:type schema:Organisation
    60 Ndfa3d0fa84544d17b048f837519788e5 schema:name readcube_id
    61 schema:value 0975c6e5299047416423b0e7a1f0af4c2b2cd82b8f6c02850ed3830272f7eff3
    62 rdf:type schema:PropertyValue
    63 Nfd1f298143894875bb8601c9175a0113 schema:familyName Safavi-Naini
    64 schema:givenName Reihaneh
    65 rdf:type schema:Person
    66 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    67 schema:name Information and Computing Sciences
    68 rdf:type schema:DefinedTerm
    69 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    70 schema:name Data Format
    71 rdf:type schema:DefinedTerm
    72 sg:person.015022230121.71 schema:affiliation https://www.grid.ac/institutes/grid.5386.8
    73 schema:familyName Eyal
    74 schema:givenName Ittay
    75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015022230121.71
    76 rdf:type schema:Person
    77 sg:person.07757027131.87 schema:affiliation https://www.grid.ac/institutes/grid.5386.8
    78 schema:familyName Sirer
    79 schema:givenName Emin Gün
    80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07757027131.87
    81 rdf:type schema:Person
    82 sg:pub.10.1007/978-1-4757-0602-4_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051902591
    83 https://doi.org/10.1007/978-1-4757-0602-4_18
    84 rdf:type schema:CreativeWork
    85 sg:pub.10.1007/978-3-642-32946-3_29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050289856
    86 https://doi.org/10.1007/978-3-642-32946-3_29
    87 rdf:type schema:CreativeWork
    88 sg:pub.10.1007/978-3-642-39884-1_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002815495
    89 https://doi.org/10.1007/978-3-642-39884-1_2
    90 rdf:type schema:CreativeWork
    91 https://doi.org/10.1109/p2p.2013.6688704 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095522752
    92 rdf:type schema:CreativeWork
    93 https://doi.org/10.1109/sp.2013.34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093437541
    94 rdf:type schema:CreativeWork
    95 https://doi.org/10.1145/2229012.2229022 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015382152
    96 rdf:type schema:CreativeWork
    97 https://doi.org/10.1145/948109.948150 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037887847
    98 rdf:type schema:CreativeWork
    99 https://www.grid.ac/institutes/grid.5386.8 schema:alternateName Cornell University
    100 schema:name Department of Computer Science, Cornell University, Ithaca, USA
    101 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...