# Incentive Compatibility of Bitcoin Mining Pool Reward Functions

## Abstract

In this paper we introduce a game-theoretic model for reward functions in Bitcoin mining pools. Our model consists only of an unordered history of reported shares and gives participating miners the strategy choices of either reporting or delaying when they discover a share or full solution. We defined a precise condition for incentive compatibility to ensure miners strategy choices optimize the welfare of the pool as a whole. With this definition we show that proportional mining rewards are not incentive compatible in this model. We introduce and analyze a novel reward function which is incentive compatible in this model. Finally we show that the popular reward function pay-per-last-N-shares is also incentive compatible in a more general model.

## Keywords

Reward Function Incentive Compatibility Full Solution Steady Stream Informational Model## References

- 1.Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Consulted
**1**(2012), 28 (2008)Google Scholar - 2.Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, May 2015Google Scholar
- 3.Miller, A., Shi, E., Kosba, A., Katz, J.: Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions (2014). (preprint)Google Scholar
- 4.Rosenfeld, M.: Analysis of Bitcoin pooled mining reward systems (2011). arXiv preprint arXiv:1112.4980
- 5.Eyal, I.: The miner’s dilemma. In: IEEE Symposium on Security and Privacy (2015)Google Scholar
- 6.Laszka, A., Johnson, B., Grossklags, J.: When bitcoin mining pools run dry. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 63–77. Springer, Heidelberg (2015). doi: 10.1007/978-3-662-48051-9_5 CrossRefGoogle Scholar
- 7.Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against bitcoin mining pools. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 72–86. Springer, Heidelberg (2014). doi: 10.1007/978-3-662-44774-1_6 Google Scholar
- 8.Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Financial Cryptography (2014)Google Scholar