首页> 外文会议>International Conference on Applied Cryptography and Network Security >Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners
【24h】

Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners

机译:延期攻击叔叔:区块链挖掘威胁禁止扣留理性和不合作矿工

获取原文

摘要

Blockchain-based cryptocurrency replaces centralized institutions with a distributed network of Internet-based miners to generate currency and process financial transactions. Such blockchain systems reach consensus using proof of work (PoW), and the miners participating in PoW join mining pools to reduce the variance for more stable reward income. Prior literature in blockchain security/game theory identified practical attacks in block withholding attack (BWH) and the state of the art fork-after-withholding (FAW), which have the rational and uncooperative attacker compromise a victim pool and pose as a PoW contributor by submitting shares but withholding the blocks. We advance such threat strategy (creating greater reward advantage to the attackers at the expense of the other miners in the victim pool) and introduce the uncle-block attack (UBA) which exploits uncle blocks for block withholding. We analyze UBA's incentive compatibility and identify and model the critical systems- and environmental- parameters which determine the attack's impacts. Our analyses and simulations results show that a rational attacker is always incentivized to launch the UBA attack strategy (over FAW or protocol compliance) and that UBA, is effective even in the unfavorable networking environment (in contrast, in such case, FAW is reduced to the suboptimal BWH attack and does not make use of the withheld block).
机译:基于区块链的加密货币替换了集中式机构,其中包含基于互联网的矿工的分布式网络,以生成货币和流程金融交易。这些区块链系统使用工作证明(POW)和参加POW加入采矿池的矿工达成共识,以减少更稳定的奖励收入的方差。 BlockChain安全/博弈论中的先前文献确定了块扣缴攻击(BWH)的实际攻击和禁止扣除(Faw)的状态,这使得具有理性和不合作的攻击者损害受害者池并作为权力贡献者构成通过提交股票但扣留块。我们推进了此类威胁策略(以受害者池中的其他矿工为代价为攻击者创造了更大的奖励优势),并介绍了利用块扣除楼的叔叔拦截局(UBA)。我们分析UBA的激励兼容性,识别和识别并模拟决定攻击的影响的关键系统和环境参数。我们的分析和模拟结果表明,一个合理的攻击者总是激励推出UBA攻击策略(通过超越或协议合规性),即使在不利的网络环境中,UBA也是有效的(相比之下,在这种情况下,一汽降低到次优的BWH攻击并没有利用扣除块)。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号