scispace - formally typeset
Open Access

The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries

Reads0
Chats0
TLDR
It is argued that Bitcoin will require the emergence of governance structures, contrary to the commonly held view in the Bitcoin community that the currency is ungovernable.
Abstract
The Bitcoin digital currency depends for its correctness and stability on a combination of cryptography, distributed algorithms, and incentivedriven behavior. We examine Bitcoin as a consensus game and determine that it relies on separate consensus about the rules and about game state. An important aspect of Bitcoin’s design is the mining mechanism, in which participants expend resources on solving computational puzzles in order to collect rewards. This mechanism purportedly protects Bitcoin against certain technical problems such as inconsistencies in the system’s distributed log data structure. We consider the economics of Bitcoin mining, and whether the Bitcoin protocol can survive attacks, assuming that participants behave according to their incentives. We show that there is a Nash equilibrium in which all players behave consistently with Bitcoin’s reference implementation, along with innitely many equilibria in which they behave otherwise. We also show how a motivated adversary might be able to disrupt the Bitcoin system and \crash" the currency. Finally, we argue that Bitcoin will require the emergence of governance structures, contrary to the commonly held view in the Bitcoin community that the currency is ungovernable.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

TL;DR: This survey unroll and structure the manyfold results and research directions of Bitcoin, and deduce the fundamental structures and insights at the core of the Bitcoin protocol and its applications.
Book ChapterDOI

Majority Is Not Enough: Bitcoin Mining Is Vulnerable

TL;DR: The Bitcoin cryptocurrency records its transactions in a public log called the blockchain, and conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups.
Posted Content

Majority is not Enough: Bitcoin Mining is Vulnerable

TL;DR: In this paper, the authors show that the Bitcoin protocol is not incentive-compatible and present an attack with which colluding miners obtain a revenue larger than their fair share, which can have significant consequences for Bitcoin: Rational miners will prefer to join the selfish miners, and the colluding group will increase in size until it becomes a majority.
Proceedings ArticleDOI

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies

TL;DR: In this paper, the authors provide a systematic exposition of Bit coin and the many related crypto currencies or "altcoins" and identify three key components of BitCoin's design that can be decoupled, which enables a more insightful analysis of Bitcoin's properties and future stability.
Proceedings ArticleDOI

A fistful of bitcoins: characterizing payments among men with no names

TL;DR: From this analysis, longitudinal changes in the Bitcoin market are characterized, the stresses these changes are placing on the system, and the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale are defined.
References
More filters
Book

The Strategy of Conflict

TL;DR: In this paper, the authors propose a theory of interdependent decision based on the Retarded Science of International Strategy (RSIS) for non-cooperative games and a solution concept for "noncooperative" games.
Book ChapterDOI

Blind Signatures for Untraceable Payments

TL;DR: Automation of the way the authors pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers.
Book ChapterDOI

Pricing via Processing or Combatting Junk Mail

TL;DR: A computational technique for combatting junk mail in particular and controlling access to a shared resource in general is presented, which requires a user to compute a moderately hard, but not intractable, function in order to gain access to the resource, thus preventing frivolous use.
Book ChapterDOI

Quantitative Analysis of the Full Bitcoin Transaction Graph

TL;DR: In this article, a variety of interesting questions about the typical behavior of Bitcoin users, including how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, how they move bitcoins between their various accounts in order to better protect their privacy.
Related Papers (5)