Skip to main content

Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin

  • Conference paper
  • First Online:
Topics in Cryptology – CT-RSA 2017 (CT-RSA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10159))

Included in the following conference series:

Abstract

The Bitcoin mining protocol has been intensively studied and widely adopted by many other cryptocurrencies. However, it has been shown that this protocol is not incentive compatible, because the selfish mining strategy enables a miner to gain unfair rewards. Existing defenses either demand fundamental changes to block validity rules or have little effect against a resourceful attacker. This paper proposes a backward-compatible defense mechanism which outperforms the previous best defense. Our fork-resolving policy neglects blocks that are not published in time and appreciates blocks that incorporate links to competing blocks of their predecessors. Consequently, a block that is kept secret until a competing block is published contributes to neither or both branches, hence it confers no advantage in winning the block race. Additionally, we discuss the dilemma between partition recovery time and selfish mining resistance, and how to balance them in our defense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bitcoin core version 0.10.1 released. https://bitcoin.org/en/release/v0.10.1

  2. Bitcoin stats - data propagation. http://bitcoinstats.com/network/propagation/

  3. Block timestamp. https://en.bitcoin.it/wiki/Block_timestamp

  4. Ethereum white paper: Modified Ghost implementation. https://github.com/ethereum/wiki/wiki/White-Paper#modified-ghost-implementation

  5. Bitcoin improvement proposals (2016). https://github.com/bitcoin/bips/blob/master/README.mediawiki

  6. Bahack, L.: Theoretical Bitcoin attacks with less than half of the computational power (draft). arXiv preprint arxiv:1312.7013 (2013)

  7. Btchris, Bytecoin: Mtgox, RHorning: Mining cartel attack (2010). https://bitcointalk.org/index.php?topic=2227

  8. Corallo, M.: Bitcoin relay network. http://bitcoinrelaynetwork.org/

  9. culubas: Timejacking & bitcoin (2011). http://culubas.blogspot.be/2011/05/timejacking-bitcoin_802.html

  10. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Berlin (2014). doi:10.1007/978-3-662-45472-5_28

    Google Scholar 

  11. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46803-6_10

    Google Scholar 

  12. Heilman, E.: One weird trick to stop selfish miners: Fresh Bitcoins, a solution for the honest miner. Cryptology ePrint Archive, Report 2014/007 (2014). https://eprint.iacr.org/2014/007

  13. Mazieres, D.: The stellar consensus protocol: A federated model for internet-level consensus. Stellar Development Foundation (2015)

    Google Scholar 

  14. Miller, A., Litton, J., Pachulski, A., Gupta, N., Levin, D., Spring, N., Bhattacharjee, B.: Discovering bitcoins public topology and influential nodes (2015)

    Google Scholar 

  15. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http://www.bitcoin.org/bitcoin.pdf

  16. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and cryptocurrency technologies. Princeton University Press (2016)

    Google Scholar 

  17. Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: IEEE European Symposium on Security and Privacy (EuroS&P), pp. 305–320. IEEE (2016)

    Google Scholar 

  18. Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in Bitcoin. Financial Cryptography and Data Security (2016)

    Google Scholar 

  19. Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive Compatibility of Bitcoin Mining Pool Reward Functions. In: Financial Cryptography and Data Security (2016)

    Google Scholar 

  20. Schwartz, D., Youngs, N., Britto, A.: The Ripple protocol consensus algorithm. Ripple Labs White Paper (2014)

    Google Scholar 

  21. Shultz, B.L.: Certification of witness: Mitigating blockchain fork attacks (2015). http://bshultz.com/paper/Shultz_Thesis.pdf

  22. Solat, S., Potop-Butucaru, M.: Zeroblock: Preventing selfish mining in bitcoin. arXiv preprint arXiv:1605.02435 (2016)

  23. Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in Bitcoin. Financial Cryptography and Data Security (2015)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Research Council KU Leuven: C16/15/058. In addition, this work was supported by the imec High Impact initiative Distributed Trust project on Blockchain and Smart contracts. The authors would like to thank Yonatan Sompolinsky for pointing out several potential attacks on an earlier version of the protocol. We would also like to thank Kaiyu Shao, Güneş Acar, Alan Szepieniec, Danny De Cock, Michael Herrmann and the anonymous reviewers for their valuable comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ren Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhang, R., Preneel, B. (2017). Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin. In: Handschuh, H. (eds) Topics in Cryptology – CT-RSA 2017. CT-RSA 2017. Lecture Notes in Computer Science(), vol 10159. Springer, Cham. https://doi.org/10.1007/978-3-319-52153-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52153-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52152-7

  • Online ISBN: 978-3-319-52153-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics