Author

Topic: Selfish Mining Reconsidered (Read 1143 times)

legendary
Activity: 1302
Merit: 1008
Core dev leaves me neg feedback #abuse #political
June 17, 2014, 03:25:24 PM
#5
just a very quick review of the paper.

1. they are trying to solve a non-existent problem.
By the author's own research (see figure 2),
the revenue would be nearly the same with
honest vs selfish mining.

2. I dont think their proposal would work
as far as propogating chains of the same
length.  At least, it would be risky.
There always has to be a best chain.
One does not mess with the keystone to
distributed consensus.
--

Selfish mining is a real problem if attacker
has 51% but we already knew that.

sr. member
Activity: 448
Merit: 250
It's Money 2.0| It’s gold for nerds | It's Bitcoin
June 17, 2014, 12:46:41 PM
#4
Finally got around to reading this Selfish Mining Paper.  http://arxiv.org/pdf/1311.0243v5.pdf

Quote
We now describe our strategy, called Self sh-Mine. As we show in Section Sel fish-Mine allows a pool of sufficient size to obtain a revenue larger than its ratio of mining power. For simplicity, and without loss of generality, we assume that miners are divided into two groups, a colluding minority pool that follows the self sh mining strategy, and a majority that follows the honest mining strategy (others). It is immaterial whether the hon.est miners operate as a single group, as a collection of groups, or individually.

Here the author makes some very poor assumptions.  It is possible to easily thwart this attack by making a double-agent miner who claims to be part of this subversive pool, but isn't and publishes the selfish chain information to the outside.  This double agent miner need not even have any real mining power, they only need to CLAIM such.  Thus the cost of this defense is virtually negligible.  This would thwart this attack vector entirely.

-bm


In order for the "double" agent miner solution to work the "double" agent needs to be the one who finds the block
legendary
Activity: 1680
Merit: 1001
CEO Bitpanda.com
June 17, 2014, 12:09:21 PM
#3
the essential problem here, and completely unexplored by the author who is convinced he is in the possession of a economic weapon of mass destruction, is that of secrecy.  How can one maintain the secrecy of blocks in a p2p network?  It's not as easy as the author suggests and he ignores the GREATER incentive(and minimal cost) of maintaining the integrity of the network as a whole.  Basically anyone who is invested in the long term viability need only create a double-agent that participates in the pool.  Then through a back-channel the node publishes the secret blocks.  The selfish pool has no way of knowing who is the snitch.

Sorry but Selfish Mining is not a fatal flaw in Bitcoin.

-bm


pay back the 1 Million NXT you stole from the NXT community.
https://nxtforum.org/nxtventures/nxtautodac-all-of-bluemeanie%27s-automated-profit-making-blockchain-companies/60/
sr. member
Activity: 280
Merit: 257
bluemeanie
June 16, 2014, 08:07:26 PM
#2
the essential problem here, and completely unexplored by the author who is convinced he is in the possession of a economic weapon of mass destruction, is that of secrecy.  How can one maintain the secrecy of blocks in a p2p network?  It's not as easy as the author suggests and he ignores the GREATER incentive(and minimal cost) of maintaining the integrity of the network as a whole.  Basically anyone who is invested in the long term viability need only create a double-agent that participates in the pool.  Then through a back-channel the node publishes the secret blocks.  The selfish pool has no way of knowing who is the snitch.

Sorry but Selfish Mining is not a fatal flaw in Bitcoin.

-bm
sr. member
Activity: 280
Merit: 257
bluemeanie
June 16, 2014, 07:45:34 PM
#1
Finally got around to reading this Selfish Mining Paper.  http://arxiv.org/pdf/1311.0243v5.pdf

Quote
We now describe our strategy, called Self sh-Mine. As we show in Section Sel fish-Mine allows a pool of sufficient size to obtain a revenue larger than its ratio of mining power. For simplicity, and without loss of generality, we assume that miners are divided into two groups, a colluding minority pool that follows the self sh mining strategy, and a majority that follows the honest mining strategy (others). It is immaterial whether the hon.est miners operate as a single group, as a collection of groups, or individually.

Here the author makes some very poor assumptions.  It is possible to easily thwart this attack by making a double-agent miner who claims to be part of this subversive pool, but isn't and publishes the selfish chain information to the outside.  This double agent miner need not even have any real mining power, they only need to CLAIM such.  Thus the cost of this defense is virtually negligible.  This would thwart this attack vector entirely.

-bm
Jump to: