Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash 92 tok/s
Gemini 2.5 Pro 50 tok/s Pro
GPT-5 Medium 11 tok/s
GPT-5 High 14 tok/s Pro
GPT-4o 99 tok/s
GPT OSS 120B 462 tok/s Pro
Kimi K2 192 tok/s Pro
2000 character limit reached

Selfish mining under general stochastic rewards (2502.20360v1)

Published 27 Feb 2025 in cs.GT

Abstract: Selfish mining, a strategy where Proof-of-Work consensus participants selectively withhold blocks, allows miners to earn disproportionately high revenue. The vast majority of the selfish mining literature focuses exclusively on block rewards. Carlsten et al. [2016] is a notable exception, which observes that similar strategic behavior may be profitable in a zero-block-reward regime if miners are compensated with transaction fees alone. As of February 2025, neither model fully captures miner incentives. The block reward remains 3.125 BTC, yet some blocks yield significantly higher revenue. For example, congestion during the launch of the Babylon protocol in August 2024 caused transaction fees to spike from 0.14 BTC to 9.52 BTC, a $68\times$ increase in fee rewards within two blocks. We present a framework for considering strategic behavior under more general miner reward functions that could be stochastic, variable in time, and/or ephemeral. This model can capture many existing reward sources (sometimes called Miner/Maximal Extractable Value or MEV) in blockchains today. We use our framework to examine the profitability of cutoff selfish mining strategies for any reward function identically distributed across forks. Our analysis requires a novel reward calculation technique to capture non-linearity in general rewards. We instantiate these results in a combined reward function that much more accurately represents miner incentives as they exist in Bitcoin today. This reward function includes block rewards and linear-in-time transaction fees, which have been studied in isolation. It also introduces a third random reward motivated by the aforementioned transaction fee spike. This instantiation enables us to (i) make qualitative observations, (ii) make quantitative claims, and (iii) confirm the theoretical analysis using Monte Carlo simulations.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

  • The paper introduces a framework and novel reward calculation technique for analyzing selfish mining profitability under general stochastic reward functions, capturing complex incentives like MEV.
  • It analyzes β-cutoff selfish mining strategies using a Markov Chain and derives attacker profit equations, instantiated with a reward function combining block rewards, transaction fees, and random MEV.
  • Results from instantiating a Bitcoin-like reward model demonstrate that considering transaction fees and MEV can significantly decrease the profitability threshold for selfish mining by over 50% compared to block rewards alone and pure selfish mining analysis respectively.

This paper introduces a framework for analyzing strategic behavior in Proof-of-Work consensus mechanisms under general miner reward functions, which can be stochastic, variable in time, and/or ephemeral. These reward functions aim to capture various existing reward sources, including Miner/Maximal Extractable Value (MEV), in modern blockchains. The paper focuses on analyzing the profitability of cutoff selfish mining strategies for reward functions identically distributed across forks, employing a novel reward calculation technique to capture non-linearity in general rewards.

The authors instantiate these results in a combined reward function that represents miner incentives in Bitcoin today. This reward function includes block rewards, linear-in-time transaction fees, and a third random reward based on observed transaction fee spikes. The instantiation enables qualitative observations, quantitative claims, and confirmation of the theoretical analysis using Monte Carlo simulations.

Key contributions of the paper include:

  • A general reward function model to capture the aggregate incentives for following a specific strategy under distinct revenue streams.
  • A set of properties characterizing subtleties of blockchain rewards.
  • A technique to calculate expected attacker profit given an aggregate reward function under mild assumptions about the distribution of the constituent reward sources.
  • An instantiated reward function combining block reward, transaction fee, and MEV rewards.

The paper begins by defining a stylized model of Proof-of-Work mining with general stochastic rewards, referred to as the Nakamoto Consensus Game (NCG). The NCG models the set of miners MM, where each miner mMm \in M has hashrate αm\alpha_m. At any time tt, there is a public view VtV_t which consists of the state of the blockchain known to all miners, and a private view VtmV_t^m for each miner mm which includes VtV_t and any additional blocks mm knows about. Miners are rewarded for creating blocks on the eventual longest chain, which is modeled as a reward function Rm(t,V,B,r,B)RR^m(t,V,B,r,B') \to \mathbb{R}, where tt is the time, VV is the view, BB is a block in VV, rr is randomness, and BB' is a block created by miner mm. Each miner mm has a strategy that takes as input a time tt, a view VtmV_t^m, and the reward Rm(t,Vtm,B,r,B)R^m(t,V_t^m,B,r,B') for extending each block BVtmB\in V_t^m by a valid block BBm(t,Vtm,B,r)B'\in\mathcal{B}^m(t,V_t^m,B,r), and outputs (i) a block BVtmB\in V_{t}^m to mine on, (ii) contents of the next block BBm(t,Vtm,B,r)B'\in\mathcal{B}^m(t,V_t^m,B,r), and (iii) a (potentially empty) subset of blocks in VtmVtV^m_t\setminus V_t to broadcast.

The paper also defines properties of the reward functions, including:

  • Miner-Independent Rewards: A reward function RR is miner-independent if the set of valid views, the set of valid blocks extending each block in those views, and equal rewards from any such valid block are the same for all miners.
  • View-Independent Rewards: A reward function RR is view-independent if the probability of reward xx extending block B1B_1 with timestamp tt' in view V1V_1 is the same as the probability of reward xx extending block B2B_2 with timestamp tt' in view V2V_2.
  • Static Rewards: A reward function RR is static if the probability of reward xx extending block B1B_1 at time t1t_1 with timestamp t1Δt_1 - \Delta in view V1V_1 is the same as the probability of reward xx extending block B2B_2 at time t2t_2 with timestamp t2Δt_2 - \Delta in view V2V_2.
  • Persistent Rewards: A reward function RR is persistent if for all blocks BB' mined at time tt extending block BB and resulting in view VV, R(t,V,B,r,B)R(t,V,B,r,B') is bound above by the total rewards minus the sum of claimed rewards on the ancestral chain of BB.

The paper then presents examples of reward functions, including transaction fees and Loss-Versus-Rebalancing (LVR), and uses them to illustrate the properties.

The paper analyzes β\beta-cutoff selfish mining strategies, where the attacker withholds blocks if the rewards they earn are below a threshold β\beta. The attacker follows the longest chain and claims all available rewards but withholds any block found where the time since parent is less than β\beta. The paper introduces the β\beta-cutoff Markov Chain, which captures the states of the attacker's hidden chain length. Using this Markov Chain, the stationary distribution pip_i is calculated as the probability of being in State ii. The stationary distribution measures the probability that a block produced in the Markov Chain is orphaned, \begin{align*} \lambda = p_1 (1-\alpha) \left(1+\frac{\alpha}{1-2\alpha}\right). \end{align*}

The per-state attacker rewards, fif_i, are then calculated as the expected reward of a canonicalized attacker block mined in State ii. For all states i2i\geq 2, the expected attacker rewards collected in State ii is given by: \begin{align*} f_i &= \sum_{j=0}{i-1} \left[\alpha (1-\alpha)j \int_{0}\infty \frac{tj e{-t/(1-\lambda)}}{j!(1-\lambda){j+1}} \mathbb{E}_{r}[R(t)]dt\right] \end{align*}

The attacker's reward is then calculated as: \begin{align*} \text{ATTACKER REWARD} =f_0p_0 + f_1 p_1 + \alpha \sum_{i=2}\infty f_i p_{i-1}. \end{align*}

The paper instantiates an aggregate reward function, R^\hat{R}, composed of (1) a fixed block reward of size CC, (2) a linear-in-time transaction fee reward, and (3) a random "extra" reward of size EE awarded to a block based on the outcome of a Bernoulli trial with probability pp. R^\hat{R} is then defined as: \begin{align*} \hat{R}(t) &= C + t + E \cdot \mathds{1}[X=1], \; X\sim \text{Bernoulli}(p). \end{align*}

With this combined reward function, the paper analyzes the transition probabilities, stationary distribution, and expected attacker rewards. For example, it was demonstrated that the profitability threshold of β\beta-cutoff selfish mining decreases by about 22\% and another 31\% compared to pure selfish mining when considering other rewards at γ=0\gamma=0.

The paper concludes by discussing potential future research directions, including applying the methodology more broadly to other consensus protocols and expanding the strategy space to capture more realistic mining strategies.

The paper also includes several appendices which provide further details on the derivations and calculations used in the analysis.

  • Appendix A: Proof of Lemmas
  • Appendix B: Derivation of f3f_3
  • Appendix C: Evaluation of f0,(i),f0,(ii),f0,(iii)f_{0,(i)}, f_{0,(ii)}, f_{0,(iii)} Integrals
  • Appendix D: Derivation of Full Attacker Reward Equation
  • Appendix E: Block Rewards Only
  • Appendix F: Linear-in-Time Transaction Fees
Ai Generate Text Spark Streamline Icon: https://streamlinehq.com

Paper Prompts

Sign up for free to create and run prompts on this paper using GPT-5.

X Twitter Logo Streamline Icon: https://streamlinehq.com