Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 77 tok/s
Gemini 2.5 Pro 54 tok/s Pro
GPT-5 Medium 29 tok/s Pro
GPT-5 High 26 tok/s Pro
GPT-4o 103 tok/s Pro
Kimi K2 175 tok/s Pro
GPT OSS 120B 454 tok/s Pro
Claude Sonnet 4.5 38 tok/s Pro
2000 character limit reached

Decentralization Cheapens Corruptive Majority Attacks (2310.01546v1)

Published 2 Oct 2023 in cs.GT and cs.CE

Abstract: Corruptive majority attacks, in which mining power is distributed among miners and an attacker attempts to bribe a majority of miners into participation in a majority attack, pose a threat to blockchains. Budish bounded the cost of bribing miners to participate in an attack by their expected loss as a result of attack success. We show that this bound is loose. In particular, an attack may be structured so that under equilibrium play by most miners, a miner's choice to participate only slightly affects the attack success chance. Combined with the fact that most of the cost of attack success is externalized by any given small miner, this implies that if most mining power is controlled by small miners, bribing miners to participate in such an attack is much cheaper than the Budish bound. We provide a scheme for a cheap corruptive majority attack and discuss practical concerns and consequences.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (16)
  1. Bitcoin: A natural oligopoly. Management Science, 68(7):4755–4771, 2022.
  2. The Block. Crypto market data, Sep 2023.
  3. Joseph Bonneau. Why buy when you can rent? Bribery attacks on bitcoin-style consensus. In Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers 20, pages 19–26. Springer, 2016.
  4. Eric Budish. The economic limits of bitcoin and the blockchain. Technical report, National Bureau of Economic Research, 2018.
  5. Vitalik Buterin. Proof of stake: How I learned to love weak subjectivity, Nov 2014.
  6. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437, 2017.
  7. Control and bribery in voting, 2016.
  8. SOK: Algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers 25, pages 507–532. Springer, 2021.
  9. Incentivizing blockchain forks via whale transactions. In Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers 21, pages 264–279. Springer, 2017.
  10. Smart contracts for bribing miners. In Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers 22, pages 3–18. Springer, 2019.
  11. Double-spend counterattacks: Threat of retaliation in proof-of-work systems. arXiv preprint arXiv:2002.10736, 2020.
  12. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, page 21260, 2008.
  13. Cryptocurrency value and 51% attacks: evidence from event studies. The Journal of Alternative Investments, 22(3):65–77, 2019.
  14. Spatial analysis of global bitcoin mining. Scientific Reports, 12(1):1–12, 2022.
  15. Lirong Xia. The impact of a coalition: Assessing the likelihood of voter influence in large elections. In Proceedings of the 24th ACM Conference on Economics and Computation, pages 1156–1156, 2023.
  16. Uncle maker: (time)stamping out the competition in Ethereum. Cryptology ePrint Archive, 2022.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

This paper has been mentioned in 1 post and received 0 likes.