Advertisement

Towards a More Democratic Mining in Bitcoins

  • Goutam Paul
  • Pratik Sarkar
  • Sarbajit Mukherjee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8880)

Abstract

Bitcoin is a peer-to-peer electronic cash system that uses a decentralized architecture. It has enjoyed superiority compared to other cyptocurrencies but it has also attracted attackers to take advantage of the possible operational insecurity. All the Bitcoin miners independently try to find the winning block by finding a hash lower than a particular target. On 14 th June 2014, a particular mining pool was able to take control of 51% of Bitcoins processing power, thus extracting the maximum amount of profit for their work. In this paper, we introduce a new defense against this 51% attack. We modify the present block header by introducing some extra bytes and utilize the Timestamp more effectively in the hash generation and suggest an alternative to the existing Proof-of-Work scheme. The proposed approach does not rely on finding a hash value lower than the target, rather it awards the miner involved in generating the minimum hash value across the entire distributed network. Fraudulent activities easily get caught due to effective use of the Timestamp. The new scheme thus introduces fair competition among the miners. Moreover, it facilitates the generation of Bitcoins at a fixed rate. Finally, we calculate and show how the new scheme can lead to an energy-efficient Bitcoin.

Keywords

Bitcoins Electronic Cash System Miners Proof-of-Work 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bitcoin–Wiki. Address, https://en.bitcoin.it/wiki/Address
  2. 2.
    Bitcoin–Wiki. Bitcoin Wikipedia, https://en.bitcoin.it/wiki/Main_Page
  3. 3.
    Bitcoin–Wiki. Block hashing algorithm, https://en.bitcoin.it/wiki/Block_hashing_algorithm
  4. 4.
  5. 5.
  6. 6.
    Bitcoin–Wiki. Network, https://en.bitcoin.it/wiki/Network
  7. 7.
    Bitcoin–Wiki. Proof of Burn, https://en.bitcoin.it/wiki/Proof_of_burn
  8. 8.
    Bitcoin–Wiki. Proof of Work Protocol, https://en.bitcoin.it/wiki/Proof_of_work
  9. 9.
    Bitcoin–Wiki. Protocol specification, https://en.bitcoin.it/wiki/Protocol_specification
  10. 10.
    Bitcoin Magazine. Government bans Professor mining bitcoin supercomputer, http://bitcoinmagazine.com/13774/government-bans-professor-mining-bitcoin-supercomputer/
  11. 11.
    Bitcoin Talk. Proof of stake instead of proof of work, https://bitcointalk.org/index.php?topic=27787.0
  12. 12.
    Bitcoinx. Mining pool giant GHash.io reaches 50% of bitcoin hashing power, http://www.bitcoinx.com/mining-pool-giant-ghash-io-reaches-50-of-bitcoin-hashing-power/
  13. 13.
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Blockchain. Transactions, https://en.bitcoin.it/wiki/Transaction
  18. 18.
  19. 19.
    CoinDesk. Under the Microscope: Economic and Environmental Costs of Bitcoin Mining, http://www.coindesk.com/microscope-economic-environmental-costs-bitcoin-mining/
  20. 20.
    Eyal, Ittay and Sirer, Emin Gün Sirer. Majority is not enough: Bitcoin mining is vulnerable. CoRR, abs/1311.0243 (2013)Google Scholar
  21. 21.
    Forbes. Brilliant But Evil: Gaming Company Fined $1 Million For Secretly Using Players’ Computers To Mine Bitcoin. http://www.forbes.com/sites/kashmirhill/2013/11/19/brilliant-but-evil-gaming-company-turned-players-computers-into-unwitting-bitcoin-mining-slaves/
  22. 22.
    Frequently Asked Questions. Transactions, https://bitcoin.org/en/faq#why-do-i-have-to-wait-10-minutes.
  23. 23.
    Gizmodo. The World’s Most Powerful Computer Network Is Being Wasted on Bitcoin, http://gizmodo.com/the-worlds-most-powerful-computer-network-is-being-was-504503726
  24. 24.
    Learn Cryptography. 51% Attack, http://learncryptography.com/51-attack/
  25. 25.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (May 2009)Google Scholar
  26. 26.
    Santoro, N.: Design and Analysis of Distributed Algorithms. Wiley Series on Parallel and Distributed Computing, pp. 71–76. Wiley Interscience (2006)Google Scholar
  27. 27.
    The Guardian. Student uses university computers to mine Dogecoin, http://www.theguardian.com/technology/2014/mar/04/dogecoin-bitcoin-imperial-college-student-mine
  28. 28.
    The Harvard Crimson. Harvard Research Computing Resources Misused for Dogecoin Mining Operation, http://www.thecrimson.com/article/2014/2/20/harvard-odyssey-dogecoin/
  29. 29.
    Wikipedia. Proof-of-stake — Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/w/index.php?title=Proof-of-stake&oldid=615023202

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Goutam Paul
    • 1
  • Pratik Sarkar
    • 2
  • Sarbajit Mukherjee
    • 3
  1. 1.Cryptology and Security Research Unit, R. C. Bose Centre for Cryptology & SecurityIndian Statistical InstituteKolkataIndia
  2. 2.Department of Computer Science and TechnologyIndian Institute of Engineering Science and TechnologyHowrahIndia
  3. 3.Department of Computer ScienceUtah State UniversityLoganCanada

Personalised recommendations