Log in
Enquire now
Selfish mining attack

Selfish mining attack

A selfish mining attack, or block withholding attack, is when a cryptocurrency miner decides to keep a valid block they have successfully mined secret instead of broadcasting it to the network.

OverviewStructured DataIssuesContributors

Contents

Other attributes

Also Known As
BWH
Block withholding attack
Location
Haifa
Haifa
Related Industries
Blockchain
Blockchain

A selfish mining attack, also known as a block withholding attack, describes a malicious attempt to discredit blockchain network integrity. Selfish mining attacks occur when an individual in a mining pool attempts to withhold a successfully validated block from being broadcast to the rest of the mining pool network. After the selfish miner withholds their successfully mined block from the group, they continue to mine the next block, resulting in the selfish miner having demonstrated more proof-of-work compared to other miners in the mining pool. This allows the selfish miner to claim the block rewards (and financial rewards) while the rest of the network adopts their block solutions.

A selfish miner will maintain their own private chain, and publicly reveal it opportunistically in order to obtain greater rewards that would normally be granted based on their actual contributions (Hashrate) to the mining pool. It is possible for multiple participants in a mining pool to engage in selfish mining behavior during the mining process.

Profitable selfish mining

The minimum profitable threshold, using the Markov chain model, has been demonstrated to be symmetric around 21.48% if two miners in a pool are engaging in profitable selfish mining. Research using Markov chain models demonstrates that two selfish miners are profitable after 51 rounds of difficulty adjustments (approximately 714 days for Bitcoin) if both their hashrates are 22% (which is slightly higher than the profitability threshold of the mining pool which is 21.48%), and are profitable after 5 rounds (approximately 70 days for Bitcoin) of difficulty adjustment if their hashrates are 33%. Profitable selfish mining becomes more difficult to successfully execute as the number of selfish miners in a mining pool increases, and/or the miners choose to increase their selfish mining hashrates because there is a negative correlation between the profitable time of selfish miners and their mining power.

Solutions

Two possible solutions have been proposed to prevent selfish mining attacks from occurring on blockchain networks. The first is to randomly assign miners to branches of the blockchain when a fork occurs, and the second is to set threshold limits for mining pools on the network that would prevent selfish miners from gaining a signifiant advantages over other miners operating on the network.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date

A Deep Dive into Blockchain Selfish Mining

Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong

https://eprint.iacr.org/2018/1084.pdf

Journal

2018

Analyzing Bitcoin Security

Philippe Camacho

https://www.slideshare.net/philippecamacho/analyzing-bitcoin-security

Attack Vectors: Selfish Mining Attack. Part 1 of 3 | INSIDE DFINITY

https://www.youtube.com/watch?v=Uc9JuAl58js

September 11, 2018

Bitcoin is Broken: Selfish Mining - Part 1

https://www.youtube.com/watch?v=u5-u-xqZJ7g

November 11, 2013

Cryptoeconomics - 3.5 - Bitcoin: Selfish Mining

https://www.youtube.com/watch?v=SWKjSEi-9pg

Web

September 17, 2019

References

Find more entities like Selfish mining attack

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.