Papers
Topics
Authors
Recent
Search
2000 character limit reached

Resisting Selfish Mining Attacks in the Bicomp

Published 17 Sep 2018 in cs.NI | (1809.06289v1)

Abstract: Selfish mining, which is an attack on the integrity of the Bitcoin network, was first proposed by Cornell researchers Emin Gun Sirer and Ittay Eyal in 2013. Selfish mining attack also exists in most Nakamoto consensus protocols. Generally speaking, selfish mining strategy can comprise a Nakamoto consensus system with less than 25% mining power of the whole system. We have discussed how the Bicomp can resist selfish mining in our former paper "Bicomp: A Bilayer Scalable Nakamoto Consensus Protocol". In this technical report, we give a detailed derivation on the conditions a selfish attacker should meet to earn more revenues through selfish mining. And we also get a conclusion that through adjusting macroblock difficulties together with tenure lengths, the Bicomp protocol has high resistant towards selfish mining.

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (2)

Collections

Sign up for free to add this paper to one or more collections.