Skip to main content

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14744))

Included in the following conference series:

  • 93 Accesses

Abstract

It has been shown that the selfish mining attack enables a miner to achieve an unfair relative revenue, posing a threat to the progress of longest-chain blockchains. Although selfish mining is a well-studied attack in the context of Proof-of-Work blockchains, its impact on the longest-chain Proof-of-Stake (LC-PoS) protocols needs yet to be addressed. This paper involves both theoretical and implementation-based approaches to analyze the selfish proposing (As there is no mining process in PoS blockchains, we refer to this attack as “selfish proposing”.) attack in the LC-PoS protocols. We discuss how factors such as the nothing-at-stake phenomenon and the proposer predictability in PoS protocols can make the selfish proposing attack in LC-PoS protocols more destructive compared to selfish mining in PoW. In the first part of the paper, we use combinatorial tools to theoretically assess the selfish proposer’s block ratio in simplistic LC-PoS environments and under simplified network connection. However, these theoretical tools or classical MDP-based approaches cannot be applied to analyze the selfish proposing attack in real-world and more complicated LC-PoS environments. To overcome this issue, in the second part of the paper, we employ deep reinforcement learning techniques to find the near-optimal strategy of selfish proposing in more sophisticated protocols. The tool implemented in the paper can help us analyze the selfish proposing attack across diverse blockchain protocols with different reward mechanisms, predictability levels, and network conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Implementaion of the selfish proposing attack. https://github.com/RoozbehSrnch/Selfish-Proposing-Attack

  2. Bagaria, V., et al.: Proof-of-stake longest chain protocols: security vs predictability. In: Proceedings of the 2022 ACM Workshop on Developments in Consensus, pp. 29–42 (2022)

    Google Scholar 

  3. Bano, S., et al.: SoK: consensus in the age of blockchains. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 183–198 (2019)

    Google Scholar 

  4. Bar-Zur, R., Abu-Hanna, A., Eyal, I., Tamar, A.: Werlman: to tackle whale (transactions), go deep (RL). In: Proceedings of the 15th ACM International Conference on Systems and Storage, pp. 148–148 (2022)

    Google Scholar 

  5. Bar-Zur, R., Dori, D., Vardi, S., Eyal, I., Tamar, A.: Deep bribe: predicting the rise of bribery in blockchain mining with deep RL. Cryptology ePrint Archive (2023)

    Google Scholar 

  6. Brown-Cohen, J., Narayanan, A., Psomas, A., Weinberg, S.M.: Formal barriers to longest-chain proof-of-stake protocols. In: Proceedings of the 2019 ACM Conference on Economics and Computation, pp. 459–473 (2019)

    Google Scholar 

  7. Daian, P., Pass, R., Shi, E.: Snow White: robustly reconfigurable consensus and applications to provably secure proof of stake. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 23–41. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32101-7_2

    Chapter  MATH  Google Scholar 

  8. David, B., Gaži, P., Kiayias, A., Russell, A.: Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 66–98. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78375-8_3

    Chapter  Google Scholar 

  9. Dembo, A., et al.: Everything is a race and Nakamoto always wins. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 859–878 (2020)

    Google Scholar 

  10. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)

    Google Scholar 

  11. Ferreira, M.V., Weinberg, S.M.: Proof-of-stake mining games with perfect randomness. In: Proceedings of the 22nd ACM Conference on Economics and Computation, pp. 433–453 (2021)

    Google Scholar 

  12. Goodman, L.: Tezos—a self-amending crypto-ledger white paper. https://www.tezos.com/static/papers/white paper.pdf4, 1432–1465 (2014)

  13. Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357–388. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63688-7_12

    Chapter  MATH  Google Scholar 

  14. Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (2015)

    Article  MATH  Google Scholar 

  15. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review (2008)

    Google Scholar 

  16. Neu, J., Tas, E.N., Tse, D.: Two more attacks on proof-of-stake ghost/ethereum. In: Proceedings of the 2022 ACM Workshop on Developments in Consensus, pp. 43–52 (2022)

    Google Scholar 

  17. Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30

    Chapter  Google Scholar 

  18. Sarenche, R., Nikova, S., Preneel, B.: Deep selfish proposing in longest-chain proof-of-stake protocols. Cryptology ePrint Archive, Paper 2024/622 (2024). https://eprint.iacr.org/2024/622. https://eprint.iacr.org/2024/622

  19. Wang, T., Liew, S.C., Zhang, S.: When blockchain meets AI: optimal mining strategy achieved by machine learning. Int. J. Intell. Syst. 36(5), 2183–2207 (2021)

    Google Scholar 

  20. Zur, R.B., Eyal, I., Tamar, A.: Efficient MDP analysis for selfish-mining in blockchains. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, pp. 113–131 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roozbeh Sarenche .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarenche, R., Nikova, S., Preneel, B. (2025). Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols. In: Clark, J., Shi, E. (eds) Financial Cryptography and Data Security. FC 2024. Lecture Notes in Computer Science, vol 14744. Springer, Cham. https://doi.org/10.1007/978-3-031-78676-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-78676-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-78675-4

  • Online ISBN: 978-3-031-78676-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics