Exploring Miner Evolution in Bitcoin Network

被引:37
作者
Wang, Luqin [1 ]
Liu, Yong [2 ]
机构
[1] NYU, Dept Comp Sci & Engn, Polytech Sch Engn, New York, NY 10010 USA
[2] NYU, Dept Elect & Comp Engn, Polytech Sch Engn, New York, NY USA
来源
PASSIVE AND ACTIVE MEASUREMENT (PAM 2015) | 2015年 / 8995卷
关键词
Bitcoin; Measurement; Network analysis;
D O I
10.1007/978-3-319-15509-8_22
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Bitcoin, a peer-to-peer network based crypto digital currency, has attracted a lot of attentions from the media, the academia, and the general public. A user in Bitcoin network can create Bitcoins by packing and verifying new transactions in the network using their computation power. Driven by the price surge of Bitcoin, users are increasingly investing on expensive specialized hardware for Bitcoin mining. To obtain steady payouts, users also pool their computation resources to conduct pool mining. In this paper, we study the evolution of Bitcoin miners by analyzing the complete transaction blockchain. We characterize how the productivity, computation power and transaction activity of miners evolve over time. We also conduct an in-depth study on the largest mining pool F2Pool. We show how it grows over time and how computation power is distributed among its miners. Finally, we build a simple economic model to explain the evolution of Bitcoin miners.
引用
收藏
页码:290 / 302
页数:13
相关论文
共 10 条
  • [1] [Anonymous], P OF WEIS
  • [2] [Anonymous], 2016, Commun. ACM, DOI [DOI 10.1145/2896384, 10.1145/2896384, 10.1145/2504730.2504747, DOI 10.1145/2504730.2504747]
  • [3] [Anonymous], 2013, ARXIV13110243
  • [4] [Anonymous], 2013, The Economics of Information Security and Privacy, DOI [10.1007/978-3-642-39498-0_7, DOI 10.1007/978-3-642-39498-0_7]
  • [5] [Anonymous], P NETW DISTR SYST SE
  • [6] [Anonymous], 2013, IEEE P2P, DOI [DOI 10.1109/P2P.2013.6688704, 10.1109/p2p.2013.6688704]
  • [7] [Anonymous], 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
  • [8] Babaioff M, 2012, P 13 ACM C ELECT COM, P56, DOI DOI 10.1145/2229012.2229022
  • [9] Reid F., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P1318, DOI 10.1109/PASSAT/SocialCom.2011.79
  • [10] Ron Dorit., 2013, Financial Cryptography, DOI DOI 10.1007/978-3-642-39884-12