Selfish Mining Re-Examined
@inproceedings{Negy2020SelfishMR, title={Selfish Mining Re-Examined}, author={Kevin Negy and P. Rizun and Emin G{\"u}n Sirer}, booktitle={Financial Cryptography}, year={2020} }
Six years after the introduction of selfish mining, its counterintuitive findings continue to create confusion. In this paper, we comprehensively address one particular source of misunderstandings, related to difficulty adjustments. We first present a novel, modified selfish mining strategy, called intermittent selfish mining, that, perplexingly, is more profitable than honest mining even when the attacker performs no selfish mining after a difficulty adjustment. Simulations show that even in… CONTINUE READING
Supplemental Presentations
Figures and Topics from this paper
7 Citations
NC-Max: Breaking the Throughput Limit of Nakamoto Consensus
- Physics, Computer Science
- IACR Cryptol. ePrint Arch.
- 2020
- PDF
RandChain: Decentralised Randomness Beacon from Sequential Proof-of-Work
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2020
- 2
- PDF
Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach
- Computer Science
- IEEE Access
- 2021
- PDF
Achieving State Machine Replication without Honesty Assumptions
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2020
- PDF
References
SHOWING 1-10 OF 29 REFERENCES
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
- Computer Science
- 2016 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2016
- 310
- PDF
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
- Computer Science
- CCS
- 2017
- 109
- PDF
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- Computer Science
- 2015 IEEE Symposium on Security and Privacy
- 2015
- 801
- PDF
The Impact of Uncle Rewards on Selfish Mining in Ethereum
- Computer Science
- 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
- 2018
- 39
- PDF