### On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms

Michael Davidson and Tyler Diamond

##### Abstract

The selfish mining attack allows cryptocurrency miners to mine more than their "fair share" of blocks, stealing revenue from other miners while reducing the overall security of payments. This malicious strategy has been extensively studied in Bitcoin, but far less attention has been paid to how the strategy may impact other cryptocurrencies. Because selfish mining is an attack against the difficulty adjustment algorithm (DAA) of a cryptocurrency, it may have a different effect when used on coins with different DAAs. In this work, we study the degree to which selfish mining can increase the revenue of miners for a wider variety of cryptocurrencies than have been studied before, including Bitcoin, Litecoin, Bitcoin Cash, Dash, Monero, and Zcash. To do so, we generalize the selfish mining strategy to blockchains with variable difficulty, and use simulations to measure how profitable the strategy is. We find that the other cryptocurrencies under consideration are far more susceptible to selfish mining than Bitcoin is, and that the strategy is profitable for miners with a lower hash rate. We also show that by dishonestly reporting block timestamps, selfish miners can generate enormously disproportionate revenues up to 2.5 times larger than they would through honest mining for some DAAs. For each DAA, we consider what happens when parameters are changed, and suggest parameter sets that would improve the algorithm’s resilience against selfish mining.

Available format(s)
Category
Foundations
Publication info
Preprint. MINOR revision.
Keywords
BitcoinCryptocurrencyProof of WorkSelfish MiningDifficulty Adjustment AlgorithmBlockchain
Contact author(s)
michael davidson @ nist gov
tyler diamond @ nist gov
History
Short URL
https://ia.cr/2020/094

CC BY

BibTeX

@misc{cryptoeprint:2020/094,
author = {Michael Davidson and Tyler Diamond},
title = {On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms},
howpublished = {Cryptology ePrint Archive, Paper 2020/094},
year = {2020},
note = {\url{https://eprint.iacr.org/2020/094}},
url = {https://eprint.iacr.org/2020/094}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.