Majority is not enough: Bitcoin mining is vulnerable

Ittay Eyal, Emin Gün Sirer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed.

We show that the Bitcoin mining protocol is not incentive-compatible. We present an attack with which colluding miners obtain a revenue larger than their fair share. This attack can have significant consequences for Bitcoin: Rational miners will prefer to join the selfish miners, and the colluding group will increase in size until it becomes a majority. At this point, the Bitcoin system ceases to be a decentralized currency.

Unless certain assumptions are made, selfish mining may be feasible for any group size of colluding miners. We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case. It prohibits selfish mining by pools that command less than 1/4 of the resources. This threshold is lower than the wrongly assumed 1/2 bound, but better than the current reality where a group of any size can compromise the system.

Original languageEnglish
Title of host publicationFinancial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers
EditorsReihaneh Safavi-Naini, Nicolas Christin
Pages436-454
Number of pages19
ISBN (Electronic)9783662454718
DOIs
StatePublished - 2014
Externally publishedYes
Event18th International Conference on Financial Cryptography and Data Security, FC 2014 - Christ Church, Barbados
Duration: 3 Mar 20147 Mar 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8437

Conference

Conference18th International Conference on Financial Cryptography and Data Security, FC 2014
Country/TerritoryBarbados
CityChrist Church
Period3/03/147/03/14

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Majority is not enough: Bitcoin mining is vulnerable'. Together they form a unique fingerprint.

Cite this