Temporary Censorship Attacks in the Presence of Rational Miners

被引:29
作者
Winzer, Fredrik [1 ]
Herd, Benjamin [1 ]
Faust, Sebastian [2 ]
机构
[1] Robert Bosch GmbH, Corp Res, Stuttgart, Germany
[2] Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany
来源
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) | 2019年
关键词
smart contract; bribery; censorship; mechanism;
D O I
10.1109/EuroSPW.2019.00046
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart contracts allow for exchange of coins according to program rules. While it is well known that so called bribery contracts can influence the incentive mechanism of a Nakamoto-style consensus, we present a more fine-grained bribery attack incentivizing a temporary censorship against a specific account. To this end, we introduce three different bribery contracts on the blockchain where each uniquely manipulates the rewards that a rational miner would receive. Additionally, we formalize the established bribery mechanisms as a Markov game and show for each game the existence of equilibria leading to successful censorships. Finally, we compare the bribery mechanisms with respect to the scalability of the attack costs and the strategic dominance. Our work is motivated by off-chain protocols including payment and state channels which require to publish transactions within a certain amount of time. In such off-chain protocols a temporary censorship attack can result into significant financial damage.
引用
收藏
页码:357 / 366
页数:10
相关论文
共 20 条
  • [1] [Anonymous], 2018, BLOCKCHAIN INFO ESTI
  • [2] [Anonymous], 2014, White Paper
  • [3] [Anonymous], 2013, Feather-forks: Enforcing a blacklist with sub-50% hash power
  • [4] RATIONALIZABLE STRATEGIC BEHAVIOR
    BERNHEIM, BD
    [J]. ECONOMETRICA, 1984, 52 (04) : 1007 - 1028
  • [5] Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus
    Bonneau, Joseph
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 : 19 - 26
  • [6] SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
    Bonneau, Joseph
    Miller, Andrew
    Clark, Jeremy
    Narayanan, Arvind
    Kroll, Joshua A.
    Felten, Edward W.
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 104 - 121
  • [7] Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
    Dong, Changyu
    Wang, Yilei
    Aldweesh, Amjad
    McCorry, Patrick
    van Moorsel, Aad
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 211 - 227
  • [8] Dziembowski S., 2017, IACR CRYPTOL EPRINT, V2017, P635
  • [9] General State Channel Networks
    Dziembowski, Stefan
    Faust, Sebastian
    Hostakova, Kristina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 949 - 966
  • [10] Majority Is Not Enough: Bitcoin Mining Is Vulnerable
    Eyal, Ittay
    Sirer, Emin Guen
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 436 - 454