skip to main content
10.1145/3534056.3535005acmconferencesArticle/Chapter ViewAbstractPublication PagessystorConference Proceedingsconference-collections
extended-abstract

WeRLman: to tackle whale (transactions), go deep (RL)

Published:06 June 2022Publication History

ABSTRACT

Blockchain technology is responsible for the emergence of cryptocurrencies, such as Bitcoin and Ethereum. The security of a blockchain protocol relies on the incentives of its participants. Selfish mining is a form of deviation from the protocol where a participant can gain more than her fair share. Previous analyses of selfish mining make easing, non-realistic assumptions. We introduce a more realistic model with varying block rewards in the form of transaction fees. However, this comes at the cost of an intractable state space. To solve the complex model, we introduce WeRLman, a novel method based on deep Reinforcement Learning (deep RL). Using WeRLman, we show reward variability can significantly hurt blockchain security.

References

  1. Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, and Aviv Tamar. 2022. WeRLman: To Tackle Whale (Transactions), Go Deep (RL). Cryptology ePrint Archive (2022).Google ScholarGoogle Scholar
  2. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 515--532.Google ScholarGoogle Scholar

Index Terms

  1. WeRLman: to tackle whale (transactions), go deep (RL)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SYSTOR '22: Proceedings of the 15th ACM International Conference on Systems and Storage
          June 2022
          163 pages
          ISBN:9781450393805
          DOI:10.1145/3534056

          Copyright © 2022 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 June 2022

          Check for updates

          Qualifiers

          • extended-abstract

          Acceptance Rates

          SYSTOR '22 Paper Acceptance Rate12of41submissions,29%Overall Acceptance Rate94of285submissions,33%

          Upcoming Conference

          SYSTOR '24
          The 17th ACM International Systems and Storage Conference
          September 23 - 25, 2024
          Tel-Aviv , Israel

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader