Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We model the protocol stability and the security of proof-of-work cryptocurrencies using voting games. The first game, which we call the Rule Game, pertains to the scenario where the cryptocurrency miners engage in a voting procedure to accept or reject a proposal for change of the cryptocurrency protocol. The second game, which we call the Attack Game, refers to the scenario where a group of miners can form a coalition to launch a attack on the system and consequently change a portion of the history of the underlying blockchain, thus defeating its promise of immutability. For the Attack Game, we define progressively granular notions of security all of which are based on the key concept of minimal winning coalitions from voting game theory. For both the Rule Game and the Attack Game, we show practical applicability of tools from voting game theory using a snapshot of real world data for Bitcoin. In particular, this highlights the fragile nature of the security of Bitcoin with respect to attacks.

Cite

CITATION STYLE

APA

Bhattacherjee, S., & Sarkar, P. (2023). Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13727 LNCS, pp. 297–318). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-26369-9_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free