Skip to main content

Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9866))

Abstract

In this paper we provide a short quantitative analysis of Bitcoin Block Withholding (BWH) Attack. In this study, we investigate the incentive earned by a miner who either independently or at the diktat of a separate mining pool launches Block Withholding attack on a target mining pool. The victim pool shares its earned revenue with the rogue attacker. We investigate the property revenue function of the attacker and find parameters that could maximize the gain of the attacker. We then propose a new concept that we call “special reward”. This special rewarding scheme is aimed at discouraging the attackers by granting additional incentive to a miner who actually finds a block. A BWH attacker who never submits a valid block to the pool will be deprived from this special reward and her gain will be less than her expectation. Depending upon the actual monetary value of the special reward a pool can significantly reduce the revenue of a BWH attacker and thus can even ward off the threat of an attack.

S. Bag—A member of the faculty of Kyushu University, Fukuoka, Japan at the time of submission of this paper.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted 1(2012), 28 (2008)

    Google Scholar 

  2. Back, A.: Hashcash - a denial of service counter-measure. Technical report, August 2002

    Google Scholar 

  3. Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. CoRR, abs/1112.4980 (2011)

    Google Scholar 

  4. Courtois, N.T., Bahack, L., On subversive miner strategies, block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)

  5. Luu, L., Saha, R., Parameshwaran, I., Saxena, P., Hobor, A., On power splitting games in distributed computation: the case of bitcoin pooled mining. In: proceedings of IEEE Computer Security Foundations Symposium, CSF 2015, Verona, Italy (2015)

    Google Scholar 

  6. Eyal, I.: The miner’s dilemma. In: IEEE Symposium on Security and Privacy, San Jose (2015)

    Google Scholar 

  7. Laszka, A., Johnson, B., Grossklags, J.: When bitcoin mining pools run dry. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015 Workshops. LNCS, vol. 8976, pp. 63–77. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

Download references

Acknowledgement

The authors were partially supported by the Japan Society for the Promotion of Science (Japan) and the Department of Science and Technology (India) under the Japan-India Science Cooperative Program of research project named: “Computational Aspects of Mathematical Design and Analysis of Secure Communication Systems Based on Cryptographic Primitives”.

The second author was partially supported by JSPS Grants-in-Aid for Scientific Research named: “KAKEN-15H02711”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samiran Bag .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Bag, S., Sakurai, K. (2016). Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools. In: Bishop, M., Nascimento, A. (eds) Information Security. ISC 2016. Lecture Notes in Computer Science(), vol 9866. Springer, Cham. https://doi.org/10.1007/978-3-319-45871-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45871-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45870-0

  • Online ISBN: 978-3-319-45871-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics