Work-Optimal PRAM Algorithms
- The paper introduces work-optimal PRAM algorithms that match the work complexity of the best sequential solutions while substantially reducing parallel execution time.
- It employs balanced load distribution and minimizes redundant computations, ensuring efficiency across diverse PRAM models such as CREW and CRCW.
- Applications include sorting, graph connectivity, and numerical methods, demonstrating practical impact in parallel computational frameworks.
Selfish mining is a strategy in proof-of-work blockchains, such as Bitcoin, where a miner or a coalition strategically withholds newly discovered blocks and selectively publishes them to maximize their revenue at the expense of the network’s security and fairness. This attack exploits the incentive misalignment in longest-chain consensus protocols, and its analysis has led to a rigorous body of literature precisely characterizing its mechanics, profitability, game-theoretic equilibria, countermeasures, and empirical impact.
1. Formal Model and Strategy Mechanics
The canonical selfish-mining attack, as formalized by Eyal and Sirer, involves a mining pool controlling a fraction of the total network hash power. The attack is governed by maintaining a private fork that leads the public chain by blocks, and strategically releasing blocks to invalidate honest work and gain a higher fraction of block rewards. The protocol’s dynamics are captured by a Markov chain where each state corresponds to the lead and transitions are determined by whether the selfish or honest miners find the next block (Eyal et al., 2013). The key rules are:
- If the attacker’s private lead is at least two, continue mining privately.
- When the public chain catches up, the attacker publishes just enough blocks to maintain its advantage or initiate a fork.
- In case of a tie, honest miners split their effort between the competing forks, parameterized by , the tie-breaking fraction favoring the attacker.
This mechanism causes honest miners to waste computational effort on blocks that are eventually orphaned, boosting the attacker’s effective block reward ratio above their nominal share.
2. Profitability Thresholds and Revenue Analysis
The profitability of selfish mining is determined by the parameter values . The attack becomes profitable (i.e., yields a higher relative revenue than honest mining) for
with the revenue function
(Eyal et al., 2013). For the worst-case (naive) tie-breaking scenario , the threshold is ; with uniform splitting , the threshold is .
A crucial insight is that these thresholds can be manipulated: large, well-connected pools can increase by dominating block dissemination, reducing the threshold and making the system vulnerable to smaller colluding pools.
Ethereum adapts this model, introducing additional combinatorial complexity due to uncle/nephew block rewards and difficulty adjustment that accounts for both regular and uncle blocks. This leads to different profitability regions and further incentives for variant strategies (Grunspan et al., 2019).
Elastic hash supply magnifies the threat. When honest miners quit unprofitable mining, the attacker's share increases, potentially causing a runaway effect that destabilizes the chain once a critical (empirically, 29%) is exceeded (Shibuya et al., 2021).
3. Advanced Strategies and Stochastic Modeling
Optimal selfish mining strategies generalize beyond the basic protocol to include stubborn mining (where the attacker withholds even when the public chain catches up) and L-stubborn mining (where the attacker matches honest blocks up to a parameterized stubbornness before switching to standard selfish mining). These strategies are formalized with Markov chains and analyzed using stochastic models (Doger et al., 6 Jan 2025).
Revenue, risk of double-spending, and profitability thresholds for these generalized strategies are derived in closed form. For example, the attack’s success probability as a function of the -confirmation rule can be explicitly characterized, allowing protocol designers to choose with a clear understanding of the associated risks.
Reinforcement learning and MDP solvers have been employed to automate the discovery of optimal variants and to study multi-agent equilibria. Notably, with more than two selfish miners, honest mining often emerges as the only Nash equilibrium due to the instability of coalitions and diminishing returns for deviators (Hou et al., 2019).
4. Empirical Detection and Prevalence
Empirical evidence of selfish mining and cartels has been found in multiple cryptocurrencies using statistical analysis of block-mining sequences. Specifically, Type II binomial tests for consecutive block wins per miner detect anomalously frequent runs indicative of strategic withholding (Li et al., 2022). Table 1 summarizes detection rates across blockchains:
| Coin | ≥25% anomalous periods | 100% anomalous periods |
|---|---|---|
| Bitcoin | 6.2% | 1.8% |
| Litecoin | 5.1% | 1.0% |
| Monacoin | 83.7% | 48.9% |
| Ethereum | 14.3% | 4.8% |
| Bitcoin Cash | 74.2% | 40.8% |
Clustering heuristics further reveal coordinated “mining cartels,” especially in Monacoin and Bitcoin Cash, with persistent deviations from honest mining expectations (Li et al., 2022).
5. Countermeasures and Protocol Defenses
Multiple countermeasures have been proposed, ranging from protocol modifications to economic disincentives:
- Tie-breaking randomization: Modifying the honest mining protocol to relay all competing tips and break ties uniformly at random raises the profitability threshold, making selfish mining infeasible below (Eyal et al., 2013).
- Dummy block or forced publication timers: Imposing a hard time limit for block publication (e.g., inserting “dummy blocks” after a specified interval) guarantees that private forks cannot be withheld indefinitely and restores honest mining as the dominant strategy (Habib et al., 2023, Solat et al., 2016).
- Difficulty adjustment incorporating orphans: Adjusting difficulty based on both included and orphaned blocks neutralizes the attack’s main profit vector for sub-majority attackers (Grunspan et al., 2018).
- Adaptive learning-based fork resolution: Employing learning automata to dynamically tune fail-safe thresholds for fork resolution decisions can raise the selfish-mining threshold to $0.4-0.46$, effectively making the attack impractical for all but the largest pools (Nikhalat-Jahromi et al., 2023, Nikhalat-Jahromi et al., 2023).
- Piggyback counterstrategy: If an honest pool switches to “piggyback” mode upon detecting mining-rate slowdown due to a selfish pool, it can overtake the selfish fork and claim all future rewards, thereby neutralizing the incentive for deviant strategies (Gal et al., 2023).
- Prevention in efficient proof systems: In blockchains using efficient proof systems (e.g., proof-of-stake, proof-of-space), optimal selfish mining can be synthesized automatically using -tight MDP analysis, revealing even larger vulnerability windows and motivating tight protocol design (Chatterjee et al., 2024).
- Protocol-specific tuning: Systems like Bicomp adjust tenure length and PoW difficulty to push the break-even attacker fraction well above the classical threshold, achieving resistance against sub-majority attacks (Tian et al., 2018).
6. Impact of Decentralization, Pool Distribution, and Multi-Agent Dynamics
Recent work incorporates the distribution of honest hash power (“petty-compliant” pools), showing that greater pool decentralization can sometimes favor selfish mining by lowering the attack threshold due to weaker coordination among honest miners (Sarenche et al., 11 Feb 2025). In multi-agent games, as revealed by deep RL and theoretical analysis, the instability of selfish mining coalitions impedes real-world exploitability, as any attempt at collusion is prone to defection and strategy shifts (Hou et al., 2019, Zhang et al., 2022).
Partial selfish mining broadens the strategy space by allowing attackers to release partial block data and attract rational miners, yielding even higher profits and further complicating the equilibrium structure (Yu et al., 2022).
7. Limitations, Controversies, and Open Directions
While the theoretical model of selfish mining is now well-understood, practical exploitability depends on real-world synchrony, propagation delays, miner rationality, and the accuracy of miner detection algorithms. Not all defenses are practical for immediate adoption, and some (e.g., reliance on block timestamps) may themselves introduce new vulnerabilities.
A persistent challenge is maintaining incentive compatibility as mining landscapes evolve. Protocol changes—such as hard-coded tie-breaking, fork resolution based on timestamps or weight, or learning-based mechanisms—must be weighed against backward compatibility, decentralization, and network efficiency.
Empirical evidence confirms that selfish and cartel mining have occurred, though not universally, and that strategic behavior is more easily sustained in altcoins with less hash-rate concentration. The ongoing shift towards hybrid consensus and efficient proof systems will necessitate further analysis of attack surfaces and optimal defenses.
Key References:
- "Majority is not Enough: Bitcoin Mining is Vulnerable" (Eyal et al., 2013)
- "On profitability of selfish mining" (Grunspan et al., 2018)
- "Insightful Mining Equilibria" (Zhang et al., 2022)
- "Partial Selfish Mining for More Profits" (Yu et al., 2022)
- "Selfish Mining in Ethereum" (Grunspan et al., 2019)
- "Variable Depth Hybrid Learning Automaton and Its Application to Defense Against the Selfish Mining Attack in Bitcoin" (Nikhalat-Jahromi et al., 2023)
- "Majority is not Needed: A Counterstrategy to Selfish Mining" (Gal et al., 2023)
- "Mining Power Destruction Attacks in the Presence of Petty-Compliant Mining Pools" (Sarenche et al., 11 Feb 2025)
- "SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning" (Hou et al., 2019)
- "Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains" (Chatterjee et al., 2024)