Cryptology ePrint Archive: Report 2015/155

On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining

Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor

Abstract: Several new services incentivize clients to compete in solving large computation tasks in exchange for financial rewards. This model of competitive distributed computation enables every user connected to the Internet to participate in a game in which he splits his computational power among a set of competing pools — the game is called a computational power splitting game. We formally model this game and show its utility in analyzing the security of pool protocols that dictate how financial rewards are shared among the members of a pool. As a case study, we analyze the Bitcoin cryptocurrency which attracts computing power roughly equivalent to billions of desk- top machines, over 70% of which is organized into public pools. We show that existing pool reward sharing protocols are insecure in our game-theoretic analysis under an attack strategy called the “block withholding attack”. This attack is a topic of debate, initially thought to be ill-incentivized in today’s pool protocols: i.e., causing a net loss to the attacker, and later argued to be always profitable. Our analysis shows that the attack is always well-incentivized in the long-run, but may not be so for a short duration. This implies that existing pool protocols are insecure, and if the attack is conducted systematically, Bitcoin pools could lose millions of dollars worth in months. The equilibrium state is a mixed strategy—that is—in equilibrium all clients are incentivized to probabilistically attack to maximize their payoffs rather than participate honestly. As a result, a part of the Bitcoin network is incentivized to waste resource competing for higher selfish reward.

Category / Keywords: Cryptocurrency, block withholding attack, distributed computation

Original Publication (with minor differences): 28th IEEE Computer Security Foundations Symposium

Date: received 24 Feb 2015, last revised 1 Jun 2015

Contact author: loiluu at comp nus edu sg

Available format(s): PDF | BibTeX Citation

Note: Fix typos and update the information of the conference that the paper is published in.

Version: 20150601:064152 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]