PoW协议中基于agent的策略行为建模

Caspar Schwarz-Schilling, Sheng-Nan Li, C. Tessone
{"title":"PoW协议中基于agent的策略行为建模","authors":"Caspar Schwarz-Schilling, Sheng-Nan Li, C. Tessone","doi":"10.1109/BCCA53669.2021.9657011","DOIUrl":null,"url":null,"abstract":"In blockchain-based systems, such as Bitcoin’s Proof-of-Work (PoW) protocol, it is expected that a miner’s share of total block revenue is proportional to their share of the network’s total hashing power. However, a deviation to this behavior is the selfish mining strategy, an attack vector discovered by Eyal and Sirer in 2014. This strategy may lead to a miner earning more than their “fair share As a result, Bitcoin’s security assumption of an honest majority may not be sufficient. In this paper, in order to verify whether selfish mining is indeed a profitable strategy in PoW systems, we introduce an agent-based model to simulate the dynamics of selfish mining behavior. The model is by design minimalistic allowing us to analyze the effect of network latency, hashing power distribution, and network topology on relative revenue of selfish miners. We find that for high levels of latency, selfish mining is always a relatively more profitable strategy, and the results turn out to be very robust to changes in the network topology. In addition, we find that the hashing power distribution following power laws, as found empirically, can make it harder for selfish miners to be profitable. Our analysis confirms the main observations that selfish mining is always relatively more profitable for hashing powers representing more than one third of the total computing power. Further, it also confirms that selfish mining behavior could cause a statistically significant high probability of contiguously mined blocks.","PeriodicalId":202582,"journal":{"name":"2021 Third International Conference on Blockchain Computing and Applications (BCCA)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Agent-based Modelling of Strategic behavior in PoW Protocols\",\"authors\":\"Caspar Schwarz-Schilling, Sheng-Nan Li, C. Tessone\",\"doi\":\"10.1109/BCCA53669.2021.9657011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In blockchain-based systems, such as Bitcoin’s Proof-of-Work (PoW) protocol, it is expected that a miner’s share of total block revenue is proportional to their share of the network’s total hashing power. However, a deviation to this behavior is the selfish mining strategy, an attack vector discovered by Eyal and Sirer in 2014. This strategy may lead to a miner earning more than their “fair share As a result, Bitcoin’s security assumption of an honest majority may not be sufficient. In this paper, in order to verify whether selfish mining is indeed a profitable strategy in PoW systems, we introduce an agent-based model to simulate the dynamics of selfish mining behavior. The model is by design minimalistic allowing us to analyze the effect of network latency, hashing power distribution, and network topology on relative revenue of selfish miners. We find that for high levels of latency, selfish mining is always a relatively more profitable strategy, and the results turn out to be very robust to changes in the network topology. In addition, we find that the hashing power distribution following power laws, as found empirically, can make it harder for selfish miners to be profitable. Our analysis confirms the main observations that selfish mining is always relatively more profitable for hashing powers representing more than one third of the total computing power. Further, it also confirms that selfish mining behavior could cause a statistically significant high probability of contiguously mined blocks.\",\"PeriodicalId\":202582,\"journal\":{\"name\":\"2021 Third International Conference on Blockchain Computing and Applications (BCCA)\",\"volume\":\"316 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Third International Conference on Blockchain Computing and Applications (BCCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BCCA53669.2021.9657011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Third International Conference on Blockchain Computing and Applications (BCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BCCA53669.2021.9657011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

在基于区块链的系统中,例如比特币的工作量证明(PoW)协议,预计矿工在总区块收入中的份额与他们在网络总哈希能力中的份额成正比。然而,这种行为的一个偏差是自私的挖掘策略,这是Eyal和Sirer在2014年发现的一种攻击媒介。这种策略可能会导致矿工的收入超过他们的“公平份额”。因此,比特币的安全假设——诚实多数——可能是不够的。为了验证在PoW系统中自私挖掘是否确实是一种有利可图的策略,我们引入了一个基于智能体的模型来模拟自私挖掘行为的动态。该模型设计简约,允许我们分析网络延迟、哈希功率分配和网络拓扑对自私矿工相对收入的影响。我们发现,对于高延迟水平,自私挖掘总是一种相对更有利可图的策略,并且结果对网络拓扑的变化非常健壮。此外,我们发现,根据经验发现,遵循幂律的哈希算力分配会使自私的矿工更难盈利。我们的分析证实了主要观察结果,即对于占总计算能力三分之一以上的哈希算力来说,自私挖矿总是相对更有利可图。此外,它还证实,自私的采矿行为可能导致连续开采区块的概率在统计上显着很高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Agent-based Modelling of Strategic behavior in PoW Protocols
In blockchain-based systems, such as Bitcoin’s Proof-of-Work (PoW) protocol, it is expected that a miner’s share of total block revenue is proportional to their share of the network’s total hashing power. However, a deviation to this behavior is the selfish mining strategy, an attack vector discovered by Eyal and Sirer in 2014. This strategy may lead to a miner earning more than their “fair share As a result, Bitcoin’s security assumption of an honest majority may not be sufficient. In this paper, in order to verify whether selfish mining is indeed a profitable strategy in PoW systems, we introduce an agent-based model to simulate the dynamics of selfish mining behavior. The model is by design minimalistic allowing us to analyze the effect of network latency, hashing power distribution, and network topology on relative revenue of selfish miners. We find that for high levels of latency, selfish mining is always a relatively more profitable strategy, and the results turn out to be very robust to changes in the network topology. In addition, we find that the hashing power distribution following power laws, as found empirically, can make it harder for selfish miners to be profitable. Our analysis confirms the main observations that selfish mining is always relatively more profitable for hashing powers representing more than one third of the total computing power. Further, it also confirms that selfish mining behavior could cause a statistically significant high probability of contiguously mined blocks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信