Decentralization Cheapens Corruptive Majority Attacks (2310.01546v1)
Abstract: Corruptive majority attacks, in which mining power is distributed among miners and an attacker attempts to bribe a majority of miners into participation in a majority attack, pose a threat to blockchains. Budish bounded the cost of bribing miners to participate in an attack by their expected loss as a result of attack success. We show that this bound is loose. In particular, an attack may be structured so that under equilibrium play by most miners, a miner's choice to participate only slightly affects the attack success chance. Combined with the fact that most of the cost of attack success is externalized by any given small miner, this implies that if most mining power is controlled by small miners, bribing miners to participate in such an attack is much cheaper than the Budish bound. We provide a scheme for a cheap corruptive majority attack and discuss practical concerns and consequences.
- Bitcoin: A natural oligopoly. Management Science, 68(7):4755–4771, 2022.
- The Block. Crypto market data, Sep 2023.
- Joseph Bonneau. Why buy when you can rent? Bribery attacks on bitcoin-style consensus. In Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers 20, pages 19–26. Springer, 2016.
- Eric Budish. The economic limits of bitcoin and the blockchain. Technical report, National Bureau of Economic Research, 2018.
- Vitalik Buterin. Proof of stake: How I learned to love weak subjectivity, Nov 2014.
- Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437, 2017.
- Control and bribery in voting, 2016.
- SOK: Algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers 25, pages 507–532. Springer, 2021.
- Incentivizing blockchain forks via whale transactions. In Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers 21, pages 264–279. Springer, 2017.
- Smart contracts for bribing miners. In Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers 22, pages 3–18. Springer, 2019.
- Double-spend counterattacks: Threat of retaliation in proof-of-work systems. arXiv preprint arXiv:2002.10736, 2020.
- Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, page 21260, 2008.
- Cryptocurrency value and 51% attacks: evidence from event studies. The Journal of Alternative Investments, 22(3):65–77, 2019.
- Spatial analysis of global bitcoin mining. Scientific Reports, 12(1):1–12, 2022.
- Lirong Xia. The impact of a coalition: Assessing the likelihood of voter influence in large elections. In Proceedings of the 24th ACM Conference on Economics and Computation, pages 1156–1156, 2023.
- Uncle maker: (time)stamping out the competition in Ethereum. Cryptology ePrint Archive, 2022.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.