盈利條件: Selfish mining is profitable for pool $i$ if its 相對收益 exceeds its proportional Hashrate:
$$R_i(\alpha_1, \alpha_2) > \alpha_i$$
The paper derives the minimum $\alpha_i$ (or $\alpha$ in symmetric case) that satisfies this inequality.
非對稱分析: Using the paper's model for asymmetric rates (α_A=0.30, α_B=0.25), we would calculate R_A and R_B. Likely, R_A > 0.30 and R_B > 0.25? Not necessarily. The model might show that Pool_B's revenue R_B is less than 0.25 because Pool_A's larger selfish operation stifles it. Pool_B's 自私挖礦 might be 無利可圖 儘管超過25%。
結果: The system converges to a state with one dominant selfish pool. The security assumption has shifted from "no pool >25%" to "no single pool >~30% and willing to act selfishly," which is a different and potentially more volatile equilibrium.
Application to Proof-of-Stake (PoS): 雖然權益證明消除了算力競爭,但類似嘅「多重驗證者」自私行為(例如喺特定時段扣留區塊)可以透過調整馬可夫模型進行分析,以壓力測試權益證明嘅最終性保證。
7. References
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
Eyal, I., & Sirer, E. G. (2014). Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security (pp. 436-454). Springer. (The seminal selfish mining paper)
Bai, Q., Zhou, X., Wang, X., Xu, Y., Wang, X., & Kong, Q. (Year). A Deep Dive into Blockchain Selfish Mining. 復旦大學。(被分析嘅論文)
Nayak, K., Kumar, S., Miller, A., & Shi, E. (2016). Stubborn mining: Generalizing 自私挖礦 and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 305-320). IEEE.
Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016). On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security (pp. 3-16).
Zhu, J. Y., Park, T., Isola, P., & Efros, A. A. (2017). Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE international conference on computer vision (pp. 2223-2232). (引用為對抗性建模進展的示例)
Sompolinsky, Y., & Zohar, A. (2016). Bitcoin’s security model revisited. arXiv preprint arXiv:1605.09193. (關於GHOST協議的相關研究)