Abstract
It has been shown that the selfish mining attack enables a miner to achieve an unfair relative revenue, posing a threat to the progress of longest-chain blockchains. Although selfish mining is a well-studied attack in the context of Proof-of-Work blockchains, its impact on the longest-chain Proof-of-Stake (LC-PoS) protocols needs yet to be addressed. This paper involves both theoretical and implementation-based approaches to analyze the selfish proposing (As there is no mining process in PoS blockchains, we refer to this attack as “selfish proposing”.) attack in the LC-PoS protocols. We discuss how factors such as the nothing-at-stake phenomenon and the proposer predictability in PoS protocols can make the selfish proposing attack in LC-PoS protocols more destructive compared to selfish mining in PoW. In the first part of the paper, we use combinatorial tools to theoretically assess the selfish proposer’s block ratio in simplistic LC-PoS environments and under simplified network connection. However, these theoretical tools or classical MDP-based approaches cannot be applied to analyze the selfish proposing attack in real-world and more complicated LC-PoS environments. To overcome this issue, in the second part of the paper, we employ deep reinforcement learning techniques to find the near-optimal strategy of selfish proposing in more sophisticated protocols. The tool implemented in the paper can help us analyze the selfish proposing attack across diverse blockchain protocols with different reward mechanisms, predictability levels, and network conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Implementaion of the selfish proposing attack. https://github.com/RoozbehSrnch/Selfish-Proposing-Attack
Bagaria, V., et al.: Proof-of-stake longest chain protocols: security vs predictability. In: Proceedings of the 2022 ACM Workshop on Developments in Consensus, pp. 29–42 (2022)
Bano, S., et al.: SoK: consensus in the age of blockchains. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 183–198 (2019)
Bar-Zur, R., Abu-Hanna, A., Eyal, I., Tamar, A.: Werlman: to tackle whale (transactions), go deep (RL). In: Proceedings of the 15th ACM International Conference on Systems and Storage, pp. 148–148 (2022)
Bar-Zur, R., Dori, D., Vardi, S., Eyal, I., Tamar, A.: Deep bribe: predicting the rise of bribery in blockchain mining with deep RL. Cryptology ePrint Archive (2023)
Brown-Cohen, J., Narayanan, A., Psomas, A., Weinberg, S.M.: Formal barriers to longest-chain proof-of-stake protocols. In: Proceedings of the 2019 ACM Conference on Economics and Computation, pp. 459–473 (2019)
Daian, P., Pass, R., Shi, E.: Snow White: robustly reconfigurable consensus and applications to provably secure proof of stake. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 23–41. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32101-7_2
David, B., Gaži, P., Kiayias, A., Russell, A.: Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 66–98. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78375-8_3
Dembo, A., et al.: Everything is a race and Nakamoto always wins. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 859–878 (2020)
Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)
Ferreira, M.V., Weinberg, S.M.: Proof-of-stake mining games with perfect randomness. In: Proceedings of the 22nd ACM Conference on Economics and Computation, pp. 433–453 (2021)
Goodman, L.: Tezos—a self-amending crypto-ledger white paper. https://www.tezos.com/static/papers/white paper.pdf4, 1432–1465 (2014)
Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357–388. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63688-7_12
Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (2015)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review (2008)
Neu, J., Tas, E.N., Tse, D.: Two more attacks on proof-of-stake ghost/ethereum. In: Proceedings of the 2022 ACM Workshop on Developments in Consensus, pp. 43–52 (2022)
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30
Sarenche, R., Nikova, S., Preneel, B.: Deep selfish proposing in longest-chain proof-of-stake protocols. Cryptology ePrint Archive, Paper 2024/622 (2024). https://eprint.iacr.org/2024/622. https://eprint.iacr.org/2024/622
Wang, T., Liew, S.C., Zhang, S.: When blockchain meets AI: optimal mining strategy achieved by machine learning. Int. J. Intell. Syst. 36(5), 2183–2207 (2021)
Zur, R.B., Eyal, I., Tamar, A.: Efficient MDP analysis for selfish-mining in blockchains. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, pp. 113–131 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 International Financial Cryptography Association
About this paper
Cite this paper
Sarenche, R., Nikova, S., Preneel, B. (2025). Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols. In: Clark, J., Shi, E. (eds) Financial Cryptography and Data Security. FC 2024. Lecture Notes in Computer Science, vol 14744. Springer, Cham. https://doi.org/10.1007/978-3-031-78676-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-78676-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-78675-4
Online ISBN: 978-3-031-78676-1
eBook Packages: Computer ScienceComputer Science (R0)