ABSTRACT
In a consensus algorithm based on Proof-of-Work, miners are motivated by crypto rewards. Furthermore, security is guaranteed because a cost of a 50% attack chance is higher than the potential rewards. However, because of the sudden price jump of cryptocurrencies and cheap prices of mining machines like ASICs, the cost and profit were on equilibrium for Bitcoin in 2017. In this situation, attackers are motivated by the balance between hash power and profits. In this paper, we describe that there is relevance between mining power on the network and price of tokens that can be taken securely on a blockchain. Users who exchange tokens on the PoW blockchain should monitor mining power and exchange tokens cheaper than the attack cost so that profit and cost of the attacker are not in equilibrium.
- U.S. Energy Information Administration. 2018. Average Price of Electricity to Ultimate Customers by End-Use Sector. https://www.eia.gov/electricity/monthly/epm_table_grapher.php?t=epmt_5_06_aGoogle Scholar
- Adam Back et al. 2002. Hashcash-a denial of service counter-measure.Google Scholar
- Samiran Bag, Sushmita Ruj, and Kouichi Sakurai. 2017. Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Transactions on Information Forensics and Security 12, 8 (aug 2017), 1967--1978.Google ScholarDigital Library
- BITMAIN. 2018. Antminer S9i. (2018). https://www.asicminervalue.com/miners/bitmain/antminer-s9i-14thGoogle Scholar
- Blockchain.com. 2018. blockchain.com. https://www.blockchain.com/explorerGoogle Scholar
- Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, and Arvind Narayanan. 2016. On the Instability of Bitcoin Without the Block Reward. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16 (2016). Google ScholarDigital Library
- Nicolas T. Courtois and Lear Bahack. 2014. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. (jan 2014). arXiv:1402.1718 http://arxiv.org/abs/1402.1718Google Scholar
- Dexaran. 2017. ERC223 token standard. https://github.com/ethereum/EIPs/issues/223Google Scholar
- Ethereum. 2016. Solidity. https://solidity.readthedocs.io/en/v0.4.24/Google Scholar
- Ittay Eyal. 2015. The Miner's Dilemma. In 2015 IEEE Symposium on Security and Privacy. IEEE, 89--103. Google ScholarDigital Library
- Ittay Eyal and Emin Gün Sirer. 2018. Majority is not enough. Commun. ACM 61, 7 (jun 2018), 95--102. Google ScholarDigital Library
- Vogelsteller Fabian and Buterin Vitalik. 2015. ERC-20 Token Standard. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20.mdGoogle Scholar
- Shigeru Fujimura, Hiroki Watanabe, Atsushi Nakadaira, Tomokazu Yamada, Akihito Akutsu, and Jay Junichi Kishigami. 2015. BRIGHT: A concept for a decentralized rights management system based on blockchain. In 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin). IEEE, 345--346.Google ScholarCross Ref
- Nicolas Houy. 2014. The Bitcoin Mining Game. SSRN Electronic Journal (mar 2014).Google Scholar
- Mitsuru Iwamura, Yukinobu Kitamura, Tsutomu Matsumoto, and Kenji Saito. 2014. Can We Stabilize the Price of a Cryptocurrency?: Understanding the Design of Bitcoin and Its Potential to Compete with Central Bank Money. SSRN Electronic Journal (oct 2014).Google Scholar
- Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, and Yiannis Tselekounis. 2016. Blockchain Mining Games. (2016). arXiv:1607.02420 Google ScholarDigital Library
- Junichi Kishigami, Shigeru Fujimura, Hiroki Watanabe, Atsushi Nakadaira, and Akihiko Akutsu. 2015. The Blockchain-Based Digital Content Distribution System. In 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. IEEE, 187--190. Google ScholarDigital Library
- Ben Laurie and Richard Clayton. 2004. Proof-of-Work Proves Not to Work. In Third Workshop on the Economics of Information Security. Minneapolis, MN., http://infosecon.net/workshop/downloads/2004/pdf/clayton.pdfGoogle Scholar
- Debin Liu and Jean Camp. 2006. Proof of Work can Work. In The Fifth Workshop on the Economics of Information Security (WEIS 2006). England. https://www.econinfosec.org/archive/weis2006/docs/50.pdfGoogle Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google Scholar
- Meni Rosenfeld. 2014. Analysis of Hashrate-Based Double Spending. (feb 2014). arXiv:1402.2009 https://arxiv.org/abs/1402.2009Google Scholar
- Kenji Saito and Mitsuru Iwamura. 2018. How to Make a Digital Currency on a Blockchain Stable. (jan 2018). arXiv:1801.06771 http://arxiv.org/abs/1801.06771Google Scholar
- Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2017. Optimal Selfish Mining Strategies in Bitcoin. Springer, Berlin, Heidelberg, 515--532.Google Scholar
- Nathan Shedroff. 2018. Self-Managing Real Estate. Computer 51, 1 (jan 2018), 104--104.Google ScholarCross Ref
- Kazuyuki Shudo, Reiki Kanda, and Kenji Saito. 2018. Towards Application Portability on Blockchains. (jan 2018). arXiv:1801.01421 http://arxiv.org/abs/1801.01421Google Scholar
- Entriken William, Shirley Dieter, Jacob Evans, and Sachs Nastassia. 2018. ERC-721 Non-Fungible Token Standard. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-721.mdGoogle Scholar
- Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1--32.Google Scholar
Index Terms
- Attack Incentive and Security of Exchanging Tokens on Proof-of-Work Blockchain
Recommendations
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack
CCGrid '17: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid ComputingThe blockchain technology has emerged as an attractive solution to address performance and security issues in distributed systems. Blockchain's public and distributed peer-to-peer ledger capability benefits cloud computing services which require ...
Is the cost of proof-of-work consensus quasilinear?
CODS-COMAD '18: Proceedings of the ACM India Joint International Conference on Data Science and Management of DataThe increasing popularity of Bitcoin, Ethereum and other cryptocurrencies has led to a rising interest in its underlying blockchain technology. Blockchains serve as distributed ledgers, and are fundamentally different from traditional distributed ...
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityHonest majority is the key security assumption of Proof-of-Work (PoW) based blockchains. However, the recent 51% attacks render this assumption unrealistic in practice. In this paper, we challenge this assumption against rational miners in the PoW-based ...
Comments