Select Language

A Deep Dive into Blockchain Selfish Mining: Multi-Pool Dynamics and Profitability

Analysis of selfish mining profitability with multiple misbehaving pools, featuring Markov chain modeling, Hashrate thresholds, and transient behavior insights.
hashpowertoken.org | PDF Size: 0.8 MB
Ukadiriaji: 4.5/5
Your Rating
You have already rated this document
PDF Document Cover - A Deep Dive into Blockchain Selfish Mining: Multi-Pool Dynamics and Profitability

1. Introduction & Overview

This paper presents a critical investigation into the security of blockchain Proof-of-Work (PoW) consensus, specifically focusing on the selfish mining attack. The classic work by Eyal and Sirer (2014) established that a single selfish miner becomes profitable with a Hashrate exceeding ~25%, challenging the long-held "51% attack" dogma. This research pushes the boundary further by asking: What happens when multiple, non-colluding selfish mining pools operate simultaneously? The authors develop a novel Markov chain model to analyze this multi-actor scenario, deriving closed-form expressions for the minimum profitable Hashrate and the time delay before profitability is realized, considering network difficulty adjustments.

Key Insights at a Glance

  • Lowered Collective Threshold: With symmetric selfish miners, the individual profitable threshold can drop to 21.48%.
  • Competition Raises Bar: Asymmetric Hashrates among selfish miners increase the threshold for the smaller pool.
  • Profitable Delay: The time to reach profitability increases as a selfish miner's Hashrate decreases, adding risk.
  • Transient Importance: Analysis of short-term behavior is crucial, as selfish mining is initially wasteful without subsequent difficulty adjustment.

2. Core Analysis & Expert Interpretation

An industry analyst's perspective on the paper's implications.

2.1 Core Insight: The Fragility of the 25% Myth

The most striking takeaway is the demolition of a comforting security heuristic. The blockchain community has clung to the "25% threshold" from Eyal and Sirer as a stable red line. This paper shows that line is porous. When multiple entities engage in selfish mining—a realistic scenario in today's concentrated mining landscape—the effective barrier to entry for this attack lowers significantly (to 21.48% in the symmetric case). This isn't just an incremental finding; it's a paradigm shift. It suggests that the security of major PoW chains is more precarious than widely assumed. The existence of large, opaque mining pools makes the assumption of a single adversary naive. As noted in the IEEE Security & Privacy In community discussions, attack surfaces often expand when moving from idealized to realistic multi-party models.

2.2 Logical Flow: From Single-Actor to Multi-Actor Game Theory

The authors' logical progression is sound and necessary. They start by acknowledging the established single-pool model, then correctly identify its critical limitation: it ignores strategic interaction between malicious actors. Their move to model two selfish pools (unaware of each other's nature) as a Markov game is the right methodological choice. The state space elegantly captures the lengths of public and private chains, and the transitions model the stochastic discovery of blocks. This approach mirrors the advancement in adversarial ML research, such as moving from single-attacker models in CycleGAN training to more complex, multi-adversarial environments. The derivation of closed-form thresholds from this complex model is a notable technical achievement, providing a concrete metric for risk assessment.

2.3 Strengths & Flaws: A Model's Merit and Blind Spots

Strengths: The paper's primary strength is its formalization of a more realistic threat model. The inclusion of transient analysis is particularly praiseworthy. Most analyses focus on steady-state profitability, but miners operate in finite time horizons. Showing that selfish mining is initially unprofitable and requires waiting for difficulty adjustment adds a crucial layer of practical risk, making pools more "cautious." The mathematical rigor is commendable.

Flaws & Blind Spots: The model, while sophisticated, still rests on significant simplifications. The assumption that selfish pools are "unaware" of each other is a major one. In reality, large pools are highly observant; strange chain dynamics would quickly signal the presence of other selfish miners, leading to a more complex, adaptive game. The model also sidesteps the real-world possibility of collusion, which would drastically change the dynamics and lower thresholds even further. Furthermore, it doesn't fully account for network propagation delays and the "mining gap" effect, which are known to influence selfish mining outcomes, as discussed in follow-up work to the original Eyal and Sirer paper.

2.4 Actionable Insights: For Miners, Pools, and Protocol Designers

  • For Mining Pools & Monitor: This research is a clarion call for enhanced monitoring. Security teams must look for anomalies indicative of multiple competing selfish miners, not just one. The profitability threshold is lower than you think.
  • For Protocol Designers (Ethereum, Bitcoin Cash, etc.): The urgency for post-PoS transition or robust PoW modifications (like GHOST or other chain selection rules) is amplified. Defenses designed for a single adversary may be insufficient.
  • For Investors & Analysts: Hashrate concentration in a few pools is not just a decentralization concern; it's a direct security risk multiplier. Evaluate chains not just on the 51% metric, but on the resilience of their consensus to multi-actor selfish mining.
  • For Academia: The next step is to model aware and potentially colluding selfish pools. Research should also integrate this with other known attacks (e.g., Bribery Attacks) for a holistic threat assessment.

3. Technical Model & Mathematical Framework

The core of the paper is a Markov chain model that captures the state of the blockchain in the presence of an honest pool (H) and two selfish pools (S1, S2).

3.1 State Transition Model

The system state is defined by the lead of the selfish pools' private chains over the public chain. Let $L_1$ and $L_2$ represent the lead of selfish pool 1 and 2, respectively. The public chain is always the longest published chain known to the honest miners. Transitions occur based on stochastic block discovery events:

  • Honest pool finds a block: The public chain advances, potentially reducing the relative lead of selfish pools.
  • Selfish pool S1 (or S2) finds a block: It adds to its private chain, increasing its lead $L_1$ (or $L_2$).
  • Publishing decision: A selfish pool may publish part of its private chain to overtake the public chain when strategically advantageous, resetting its lead and potentially causing a chain reorganization.

The Markov chain captures all possible $(L_1, L_2)$ states and the probabilities of moving between them, determined by the relative Hashrates $\alpha_1$, $\alpha_2$ (for S1 and S2) and $\beta = 1 - \alpha_1 - \alpha_2$ (for the honest pool).

3.2 Key Mathematical Formulations

The analysis solves for the steady-state distribution $\pi_{(L_1, L_2)}$ of the Markov chain. The key metric, relative revenue $R_i$ for selfish pool $i$, is derived from this distribution. It represents the fraction of all blocks eventually included in the canonical chain that were mined by pool $i$.

Profitability Condition: Selfish mining is profitable for pool $i$ if its relative revenue exceeds its proportional Hashrate: $$R_i(\alpha_1, \alpha_2) > \alpha_i$$ The paper derives the minimum $\alpha_i$ (or $\alpha$ in symmetric case) that satisfies this inequality.

Symmetric Case Result: When $\alpha_1 = \alpha_2 = \alpha$, the threshold $\alpha^*$ is found by solving: 21.48%.

4. Experimental Results & Findings

4.1 Profitability Thresholds

The paper presents two key numerical findings:

21.48%

Minimum Hashrate for a selfish pool in a symmetric two-pool scenario.

> 21.48%

Required Hashrate for a smaller pool when competing with a larger asymmetric selfish pool.

Interpretation: The 21.48% figure is lower than the canonical ~25% threshold. However, if one selfish pool is larger, the smaller Selfish pool needs an even higher Hashrate to compete profitably, as it now battles both the honest network and a dominant selfish rival. This creates a "selfish mining oligarchy" effect where being the dominant malicious actor is advantageous.

4.2 Transient Analysis & Profitable Delay

The paper emphasizes that profitability is not instantaneous. Because selfish mining involves withholding blocks, it initially reduces the pool's short-term reward rate compared to honest mining. Profitability only emerges after the Bitcoin network's difficulty adjustment (every 2016 blocks), which lowers the puzzle difficulty because the observed block rate (slowed by withholding) is lower.

Key Finding: The number of difficulty adjustment periods ("epochs") $D$ a selfish miner must wait to become profitable increases as its Hashrate $\alpha$ decreases. Formally, $D(\alpha)$ is a decreasing function. For a pool just above the threshold (e.g., 22%), the wait could be several epochs, representing weeks or months, during which capital is tied up and strategy risk is high. This delay acts as a natural deterrent for smaller pools considering the attack.

Chart Description (Conceptual): A line chart would show the "Profitable Delay (Epochs)" on the Y-axis against "Selfish Miner Hashrate (α)" on the X-axis. The curve starts very high for α just above 0.2148, sharply decreasing and asymptotically approaching zero as α increases towards 0.5. This visually reinforces that higher hashrate selfish miners reap rewards faster.

5. Analysis Framework & Conceptual Case Study

Scenario: Consider three major mining pools in a Proof-of-Work cryptocurrency: Pool_A (30% Hashrate), Pool_B (25%), and the rest distributed among small honest miners (45%). Assume Pool_A and Pool_B are both rational and consider selfish mining strategies independently.

Application of the Model:

  1. Initial Assessment: Both pools individually exceed the 21.48% symmetric threshold.
  2. Asymmetric Analysis: Using the paper's model for asymmetric rates (α_A=0.30, α_B=0.25), we would calculate R_A and R_B. Likely, R_A > 0.30 and R_B > 0.25? Not necessarily. The model might show that Pool_B's revenue R_B is less than 0.25 because Pool_A's larger selfish operation stifles it. Pool_B's selfish mining might be unprofitable duk da cike sama da 25%.
  3. Shawarar Dabarun Shawarwari: Pool_B, yana tsammanin hakan ta hanyar ƙirar cikin gida (ko bayan lura da baƙon tsarin sarkar), na iya zaɓar yin haƙo mai gaskiya, domin haƙon son kai zai haifar da ƙananan riba. Pool_A, yanzu mai haƙon son kai kaɗai, yana aiki yadda ya kamata a ƙarƙashin tsarin tafki guda na gargajiya tare da Hashrate na 30%, yana mai da shi mai riba sosai.
  4. Sakamako: The system converges to a state with one dominant selfish pool. The security assumption has shifted from "no pool >25%" to "no single pool >~30% and willing to act selfishly," which is a different and potentially more volatile equilibrium.
This case study illustrates how the multi-pool model changes strategic calculus and risk assessment.

6. Future Applications & Research Directions

  • Enhanced Monitoring Tools: Develop heuristics and machine learning models to detect the unique fork patterns and orphan block rates indicative of multiple competing selfish miners, moving beyond single-adversary detection.
  • Consensus Protocol Design: This work strengthens the case for alternative chain selection rules (e.g., GHOST, Inclusive) or hybrid consensus mechanisms that are less susceptible to selfish mining's profitability calculus, regardless of the number of bad actors.
  • Game-Theoretic Extensions: The most pressing direction is to model aware selfish pools that can detect each other's presence and adapt their strategies dynamically, potentially leading to collusion or retaliatory publishing schedules. This aligns with advanced research in multi-agent reinforcement learning applied to security games.
  • Cross-Attack Analysis: Integrate this model with other economic attacks like bribery attacks (e.g., the "P + ε" attack). Could a pool use a small bribe to encourage honest miners to support its private chain, drastically altering the multi-selfish-miner equilibrium?
  • Application to Proof-of-Stake (PoS): While PoS eliminates hashrate competition, similar "multi-validator" selfish behavior (e.g., block withholding in certain slots) could be analyzed using adapted Markov models to stress-test PoS finality guarantees.

7. References

  1. Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
  2. Eyal, I., & Sirer, E. G. (2014). Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security (pp. 436-454). Springer. (The seminal selfish mining paper)
  3. Bai, Q., Zhou, X., Wang, X., Xu, Y., Wang, X., & Kong, Q. (Year). A Deep Dive into Blockchain Selfish Mining. Fudan University. (The analyzed paper)
  4. Nayak, K., Kumar, S., Miller, A., & Shi, E. (2016). Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 305-320). IEEE.
  5. Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016). On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 3-16).
  6. Zhu, J. Y., Park, T., Isola, P., & Efros, A. A. (2017). Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE international conference on computer vision (pp. 2223-2232). (Cited as an example of progression in adversarial modeling)
  7. Sompolinsky, Y., & Zohar, A. (2016). Bitcoin’s security model revisited. arXiv preprint arXiv:1605.09193. (Related work on GHOST protocol)