Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack

@article{Nayak2016StubbornMG,
  title={Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack},
  author={Kartik Nayak and Srijan Kumar and A. Miller and E. Shi},
  journal={2016 IEEE European Symposium on Security and Privacy (EuroS&P)},
  year={2016},
  pages={305-320}
}
  • Kartik Nayak, Srijan Kumar, +1 author E. Shi
  • Published 2016
  • Computer Science
  • 2016 IEEE European Symposium on Security and Privacy (EuroS&P)
  • Selfish mining, originally discovered by Eyal et al. [9], is a well-known attack where a selfish miner, under certain conditions, can gain a disproportionate share of reward by deviating from the honest behavior. [...] Key Result We show, surprisingly, that given the attacker's best strategy, in some cases victims of an eclipse attack can actually benefit from being eclipsed!Expand Abstract
    311 Citations

    Figures, Tables, and Topics from this paper

    Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
    • 1
    • PDF
    Mind the Mining
    • 14
    • PDF
    Competitive Selfish Mining
    • Hamid Azimy, A. Ghorbani
    • Computer Science
    • 2019 17th International Conference on Privacy, Security and Trust (PST)
    • 2019
    Selfish Mining Re-Examined
    • 7
    • PDF
    FORTIS: FORgeable TImeStamps Thwart Selfish Mining
    • O. Biçer
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2020
    • PDF
    A Poisoning Attack Against Cryptocurrency Mining Pools
    • 2
    Analysing the Benefit of Selfish Mining with Multiple Players
    Pooled Mining Makes Selfish Mining Tricky
    • 3
    • PDF

    References

    SHOWING 1-10 OF 29 REFERENCES
    Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis
    • 162
    • PDF
    Eclipse Attacks on Bitcoin's Peer-to-Peer Network
    • 426
    • PDF
    Majority is not enough
    • 411
    • Highly Influential
    • PDF
    On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency
    • 174
    • PDF
    Optimal Selfish Mining Strategies in Bitcoin
    • 392
    • PDF
    On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
    • 115
    • PDF
    The Miner's Dilemma
    • Ittay Eyal
    • Computer Science
    • 2015 IEEE Symposium on Security and Privacy
    • 2015
    • 299
    • PDF
    Bitcoin over Tor isn't a Good Idea
    • 130
    • PDF
    Tampering with the Delivery of Blocks and Transactions in Bitcoin
    • 132
    • PDF