Countering Block Withholding Attack Efficiently

Suhyeon Lee, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Bitcoin, well-known cryptocurrency, selected Poof-of-Work (PoW) for its security. PoW mechanism incentivizes participants and deters attacks on the network. So far, Bitcoin's PoW has been adopted in many cryptocurrencies. Researchers found, however, some vulnerabilities in PoW such as selfish mining, block withholding attack, and so on. Especially, after Rosenfeld suggested block withholding attack and Eyal made this attack practical, many variants and countermeasures have been proposed. However, most of countermeasures cause many changes in the mining algorithm itself, which makes it impractical. In this paper, we propose new countermeasure to prevent block withholding attack effectively. Mining pools can adapt our method without changing their mining environment.

Original languageEnglish
Title of host publicationINFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages330-335
Number of pages6
ISBN (Electronic)9781728118789
DOIs
Publication statusPublished - 2019 Apr
Externally publishedYes
Event2019 INFOCOM IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019 - Paris, France
Duration: 2019 Apr 292019 May 2

Publication series

NameINFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019

Conference

Conference2019 INFOCOM IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
Country/TerritoryFrance
CityParis
Period19/4/2919/5/2

Keywords

  • Bitcoin
  • Blockchain
  • Mining pool
  • Security analysis

ASJC Scopus subject areas

  • Hardware and Architecture
  • Signal Processing
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Countering Block Withholding Attack Efficiently'. Together they form a unique fingerprint.

Cite this