Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining
- URL: http://arxiv.org/abs/2411.11702v2
- Date: Mon, 13 Jan 2025 08:03:04 GMT
- Title: Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining
- Authors: Roozbeh Sarenche, Alireza Aghabagherloo, Svetla Nikova, Bart Preneel,
- Abstract summary: As Bitcoin experiences more halving events, the protocol reward converges to zero, making transaction fees the primary source of miner rewards.<n>Previous security analyses of Bitcoin have either considered a fixed block reward model or a highly simplified volatile model.<n>This paper presents a reinforcement learning-based tool to develop mining strategies under a more realistic volatile model.
- Score: 5.893888881448058
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The security of Bitcoin protocols is deeply dependent on the incentives provided to miners, which come from a combination of block rewards and transaction fees. As Bitcoin experiences more halving events, the protocol reward converges to zero, making transaction fees the primary source of miner rewards. This shift in Bitcoin's incentivization mechanism, which introduces volatility into block rewards, leads to the emergence of new security threats or intensifies existing ones. Previous security analyses of Bitcoin have either considered a fixed block reward model or a highly simplified volatile model, overlooking the complexities of Bitcoin's mempool behavior. This paper presents a reinforcement learning-based tool to develop mining strategies under a more realistic volatile model. We employ the Asynchronous Advantage Actor-Critic (A3C) algorithm, which efficiently handles dynamic environments, such as the Bitcoin mempool, to derive near-optimal mining strategies when interacting with an environment that models the complexity of the Bitcoin mempool. This tool enables the analysis of adversarial mining strategies, such as selfish mining and undercutting, both before and after difficulty adjustments, providing insights into the effects of mining attacks in both the short and long term. We revisit the Bitcoin security threshold presented in the WeRLman paper and demonstrate that the implicit predictability of valuable transaction arrivals in this model leads to an underestimation of the reported threshold. Additionally, we show that, while adversarial strategies like selfish mining under the fixed reward model incur an initial loss period of at least two weeks, the transition toward a transaction-fee era incentivizes mining pools to abandon honest mining for immediate profits. This incentive is expected to become more significant as the protocol reward approaches zero in the future.
Related papers
- Demystifying Private Transactions and Their Impact in PoW and PoS Ethereum [43.548299433042835]
Private transactions, a specialized transaction type employed to evade public Peer-to-Peer (P2P) network broadcasting, remain largely unexplored.
We analyze large-scale datasets comprising 14,810,392 private transactions within a 15.5-month Proof-of-Work (PoW) dataset and 30,062,232 private transactions within a 15.5-month Proof-of-Stake (PoS) dataset.
arXiv Detail & Related papers (2025-03-30T16:45:18Z) - Dynamic User Competition and Miner Behavior in the Bitcoin Market [0.0]
We develop a dynamic model of the Bitcoin market where users set fees themselves and miners decide whether to operate and whom to validate based on those fees.
Our analysis reveals how, in equilibrium, users adjust their bids in response to short-term congestion.
We show that a block reward (a fixed reward paid to miners upon a block production) can mitigate these inefficiencies.
arXiv Detail & Related papers (2025-02-21T15:02:02Z) - FiberPool: Leveraging Multiple Blockchains for Decentralized Pooled Mining [2.9281463284266973]
We present a distributed mining pool named FiberPool to address these challenges.
We validate the mining fairness, budget balance, reward stability, and incentive compatibility of the payment scheme FiberPool Proportional adopted by FiberPool.
arXiv Detail & Related papers (2025-01-26T09:08:03Z) - Examining Attacks on Consensus and Incentive Systems in Proof-of-Work Blockchains: A Systematic Literature Review [0.0]
Bitcoin's security relies on a decentralized ledger consisting of a consensus and an incentive mechanism.
As Bitcoin's acceptance grows, it faces increasing threats from attacks targeting these mechanisms.
This paper begins by examining individual attacks executed in isolation and their profitability.
It then explores how combining these attacks with each other or with other malicious and non-malicious strategies can enhance their overall effectiveness and profitability.
arXiv Detail & Related papers (2024-11-01T04:18:42Z) - BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains [5.864854777864723]
We study selfish mining attacks in longest-chain blockchains like Bitcoin, but where the proof of work is replaced with efficient proof systems.
We propose a novel selfish mining attack that aims to maximize expected relative revenue of the adversary.
We present a formal analysis procedure which computes an $epsilon$-tight lower bound on the optimal expected relative revenue in the MDP.
arXiv Detail & Related papers (2024-05-07T15:44:39Z) - Interplay between Cryptocurrency Transactions and Online Financial
Forums [41.94295877935867]
This study focuses on the study of the interplay between these cryptocurrency forums and fluctuations in cryptocurrency values.
It shows that the activity of Bitcointalk forum keeps a direct relationship with the trend in the values of BTC.
The experiment highlights that forum data can explain specific events in the financial field.
arXiv Detail & Related papers (2023-11-27T16:25:28Z) - Undetectable Selfish Mining [4.625489011466493]
A strategic Bitcoin miner may profit by deviating from the intended Bitcoin protocol.
We develop a selfish mining variant that is provably *statistically undetectable*
We show that our strategy is strictly profitable for attackers with $38.2% ll 50%$ of the total hashrate.
arXiv Detail & Related papers (2023-09-13T09:51:32Z) - Simple Opinion Dynamics for No-Regret Learning [38.61048016579232]
We study a cooperative multi-agent bandit setting in the distributed GOSSIP model.
We introduce and analyze families of memoryless and time-independent protocols for this setting.
For stationary reward settings, we prove for the first time that these simple protocols exhibit best-of-both-worlds behavior.
arXiv Detail & Related papers (2023-06-14T17:59:15Z) - Nik Defense: An Artificial Intelligence Based Defense Mechanism against
Selfish Mining in Bitcoin [1.160208922584163]
Bitcoin mining's protocol is not incentive-compatible.
Some nodes with high computational power can obtain more revenue than their fair share.
We propose an artificial intelligence-based defense against selfish mining attacks.
arXiv Detail & Related papers (2023-01-26T23:30:44Z) - Refined Bitcoin Security-Latency Under Network Delay [35.16231062731263]
We study how secure a block is after it becomes $k$-deep in the chain.
We analyze the race between adversarial and honest chains in three different phases.
We find the probability distribution of the growth of the adversarial chains under models similar to those in [Guo, Ren; AFT 2022] when a target block becomes $k$-deep in the chain.
arXiv Detail & Related papers (2022-12-02T18:54:30Z) - Partial Selfish Mining for More Profits [21.636578888742477]
Mining attacks aim to gain an unfair share of extra rewards in the blockchain mining.
In this paper, we propose a new and feasible Partial Selfish Mining (PSM) attack.
We show that PSM attackers can be more profitable than selfish miners under a certain range of mining power and network conditions.
arXiv Detail & Related papers (2022-07-27T11:58:38Z) - Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities [45.90740335615872]
Bitcoin is the most secure blockchain in the world, supported by the immense hash power of its Proof-of-Work miners.
Proof-of-Stake chains are energy-efficient, have fast finality but face several security issues.
We show that these security issues are inherent in any PoS chain without an external trusted source.
We propose a new protocol, Babylon, where an off-the-shelf PoS protocol checkpoints onto Bitcoin to resolve these issues.
arXiv Detail & Related papers (2022-07-18T06:01:25Z) - A Collaboration Strategy in the Mining Pool for
Proof-of-Neural-Architecture Consensus [16.372941299296652]
In most popular public accessible cryptocurrency systems, the mining pool plays a key role because mining cryptocurrency with the mining pool turns the non-profitable situation into profitable for individual miners.
In many recent novel blockchain consensuses, the deep learning training procedure becomes the task for miners to prove their workload.
While the incentive of miners is to earn tokens, individual miners are motivated to join mining pools to become more competitive.
arXiv Detail & Related papers (2022-05-05T17:08:02Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Blockchain Assisted Decentralized Federated Learning (BLADE-FL) with
Lazy Clients [124.48732110742623]
We propose a novel framework by integrating blockchain into Federated Learning (FL)
BLADE-FL has a good performance in terms of privacy preservation, tamper resistance, and effective cooperation of learning.
It gives rise to a new problem of training deficiency, caused by lazy clients who plagiarize others' trained models and add artificial noises to conceal their cheating behaviors.
arXiv Detail & Related papers (2020-12-02T12:18:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.