用户名: 密码: 验证码:
Zero-determinant Strategy for the Algorithm optimize of Blockchain PoW Consensus
详细信息    查看官网全文
摘要
The Proof of Work(Po W) consensus algorithm guarantees the safety and dependability of Blockchain systems. Miners can achieve a consensus through the Po W algorithm during the mining process, that is mutual attacking. However, when the miners attack each other, all miners earn less. In this paper, we established a model that mining between two miners is an iterative game, and proposed a subclass of ZD strategy(a pining strategy) to alleviate miners' dilemma, a miner can control another miner's payoff and increase the social revenue through a pinning strategy. Numerical simulation results verify the effectiveness of the proposed strategy. In summary, this work leads to the better understanding and analysis of the Po W algorithm via the game theory, rendering it possible to design a more rational consensus algorithm in the future.
The Proof of Work(PoW) consensus algorithm guarantees the safety and dependability of Blockchain systems. Miners can achieve a consensus through the Po W algorithm during the mining process, that is mutual attacking. However, when the miners attack each other, all miners earn less. In this paper, we established a model that mining between two miners is an iterative game, and proposed a subclass of ZD strategy(a pining strategy) to alleviate miners' dilemma, a miner can control another miner's payoff and increase the social revenue through a pinning strategy. Numerical simulation results verify the effectiveness of the proposed strategy. In summary, this work leads to the better understanding and analysis of the Po W algorithm via the game theory, rendering it possible to design a more rational consensus algorithm in the future.
引文
[1]Yuan Yong,Wang Fei-Yue.Blockchain:the state of the art and future trends.Acta Automatica Sinica,2016,42(4):481-494.
    [2]Nakamoto S.Bitcoin:A peer-to-peer electronic cash system.Consulted,2009.
    [3]Block chain depth report:the world be your witness(2).http://www.wxrw123.com/rm/20160420/472846_2.html,April 20,2016.
    [4]Mc Conaghy T,Marques R,Müller A,De D J,Mc Conaghy T,Mc Mullen G,et al.Bigchain DB:A Scalable Blockchain Database.https://www.bigchaindb.com/whitepaper/bigchain db-whitepaper.pdf,June 8,2016.
    [5]Blockchain introduction.http://blockchaindev.org/article/intr oduce_blockchain.html,December 14,2015.
    [6]Consensus in Bitcoin:One system,many models.https://freed om-to-tinker.com/blog/randomwalker/consensus-in-bitcoinone-system-many-models/,December 26,2014.
    [7]Nicolas T C.Bitcoin Miner Optimization.https://www.knaw.nl/shared/resources/actueel/bestanden/140212_Bitcoin_pres entatie_Nicolas_Courtois.pdf,2013
    [8]Eyal I.The Miner's Dilemma.Computer Science,89-103,2014.
    [9]Study when be threatened,the bitcoin pool attacking.http://www.bitecoin.com/online/2015/01/11102.html,Januar y 4,2015.
    [10]Tang C B,Li A,and Li X.When reputation enforces evolutionary cooperation in unreliable MANETs.IEEE Trans.Cybern,45(10):2190-2201,2015.
    [11]E yal I,Gün E S.It's Time For a Hard Bitcoin Fork.http://hackingdistributed.com/2014/06/13/time-for-a-hard-bi tcoin-fork/,June 3,2014.
    [12]Rosenfeld M.Analysis of Bitcoin Pooled Mining Reward Systems.Computer Science,2011.
    [13]Courtois N T,Bahack L.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency.Eprint Arxiv,2014.
    [14]Larimer D.Transactions as proof-of-stake.http://7fvhfe.com1.z0.glb.clouddn.com/@/wp-content/uploads/2014/01/Trans actions As Proof Of Stake10.pdf,2013.
    [15]Larimer D.Delegated proof-of-stake white paper.http://www.bts.hk/dpos-baipishu.html,2014.
    [16]The consensus mechanism in blockchain.http://blog.csdn.net/u013137970/article/details/52958176,October 28,2016.
    [17]Zhang Zhengwen.A Byzantine Fault tolerant algorithm in blockchain.http://www.onchain.com/paper/66c6773b.pdf,April,2016.
    [18]Lewenberg Y,Sompolinsky Y,Zohar A.Inclusive block chain protocols//International Conference on Financial Cryptography and Data Security.Springer Berlin Heidelberg,2015:528-547.
    [19]Kosba A,Miller A,Shi E,et al.Hawk:The blockchain model of cryptography and privacy-preserving smart contracts.IEEE Symposium on Security and Privacy,839-858,2016.
    [20]Zhang H,Cui L,Luo Y.Near-Optimal Control for Nonzero-Sum Differential Games of Continuous-Time Nonlinear Systems Using Single-Network ADP.IEEE Transactions on Systems Man&Cybernetics Part B Cybernetics A Publication of the IEEE Systems Man&Cybernetics Society,43(1):206-216,2013.
    [21]Zhang H,Qin C,Luo Y.Neural-Network-Based Constrained Optimal Control Scheme for Discrete-Time Switched Nonlinear System Using Dual Heuristic Programming.IEEE Transactions on Automation Science&Engineering,11(3):839-849,2014.
    [22]Zhang H,Cui L,Zhang X,et al.Data-Driven Robust Approximate Optimal Tracking Control for Unknown General Nonlinear Systems Using Adaptive Dynamic Programming Method.IEEE Transactions on Neural Networks,22(12):2226-2236,2011.
    [23]Block Withholding Attacks-Recent Research.http://blog.bet tercrypto.com/?p=1131,December 2,2014.
    [24]Press W H,Dyson F J.Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent.Proceedings of the National Academy of Sciences,109(26):10409-10413,2012.
    [25]Dong,Rong,Zhi-Hai,and Zhou T.Zero-determinant strategy:An underway revolution in game theory.Chinese Physics B,23(7):164-170,2014.
    [26]He X,Dai H,Ning P,et al.Zero-determinant Strategies for Multi-player Multi-action Iterated Games.IEEE Signal Processing Letters,23(3):311-315,2016.
    [27]Zhang H,Niyato D,Song L,Jiang T,Han Z.Zero-Determinant Strategy for Resource Sharing in Wireless Cooperations.IEEE Transactions on Wireless Communications,15(3):2179-2192,2016.
    [28]Zhang H,Dusit N,Song L,et al.Zero-determinant strategy in cheating management of wireless cooperation.IEEE GLOBECOM,4382-4386,2014.
    [29]Hilbe C,Wu B,Traulsen A,Nowak M.Evolutionary performance of zero-determinant strategies in multiplayer games.Journal of theoretical biology,374:115-124,2015.
    [30]Nash J F.Equilibrium Points in N-Person Games.Proceedings of the National Academy of Sciences of the United States of America,36(1):48-49,1950.
    [31]Pan L,Hao D,Rong Z,Zhou T.Zero-determinant strategies in iterated public goods game.Scientific Reports,13096-13096,2014.
    [32]Ashraf Al D,George K,Jorg L.Zero-Determinant Strategies:A Game-Theoretic Approach for Shring Licensed Spectrum Bands.IEEE Journal on Selected Areas in Communications,32(11):2297-2308,201

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700