Cryptology ePrint Archive: Report 2019/1327

Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain

Donghoon Chang and Munawar Hasan and Pranav Jain

Abstract: In this paper, we present a selfish mining attack on the multi-stage blockchain proposed by Palash Sarkar. We provide detailed analysis of computational wastage of honest miners and biased rewards achieved by the selfish pool. In our analysis, we introduce a spy inside an honest pool which is a trivial task. Our spy is responsible for leaking the information of the stage mining from the honest pool to the selfish pool. In our analysis, we consider all the possible configurations of mining namely sequential, parallel and pipelining. In all of these configurations, we show through our mathematical equations as to how a selfish miner can succeed in wasting the computation power of the honest miner and how he can influence the reward of mining. For completeness, we provide an algorithm for performing a selfish mining attack on all the scenarios on multi-stage blockchain. To thwart selfish mining on multi-stage blockchain we redesign the original verification algorithm by introducing a new parameter called the crypto-stamp. We present a new algorithm that uses crypto-stamp during the verification process of the mined stages or blocks and is able to detect with high probability whether the stages or blocks were kept private or not.

Category / Keywords: applications / blockchain, selfish mining attack

Date: received 18 Nov 2019

Contact author: donghoon at iiitd ac in, munawar1440@iiitd ac in, pranav16255@iiitd ac in

Available format(s): PDF | BibTeX Citation

Version: 20191119:140028 (All versions of this report)

Short URL: ia.cr/2019/1327


[ Cryptology ePrint archive ]