摘要
The Proof of Work(Po W) consensus algorithm guarantees the safety and dependability of Blockchain systems. Miners can achieve a consensus through the Po W algorithm during the mining process, that is mutual attacking. However, when the miners attack each other, all miners earn less. In this paper, we established a model that mining between two miners is an iterative game, and proposed a subclass of ZD strategy(a pining strategy) to alleviate miners' dilemma, a miner can control another miner's payoff and increase the social revenue through a pinning strategy. Numerical simulation results verify the effectiveness of the proposed strategy. In summary, this work leads to the better understanding and analysis of the Po W algorithm via the game theory, rendering it possible to design a more rational consensus algorithm in the future.
The Proof of Work(PoW) consensus algorithm guarantees the safety and dependability of Blockchain systems. Miners can achieve a consensus through the Po W algorithm during the mining process, that is mutual attacking. However, when the miners attack each other, all miners earn less. In this paper, we established a model that mining between two miners is an iterative game, and proposed a subclass of ZD strategy(a pining strategy) to alleviate miners' dilemma, a miner can control another miner's payoff and increase the social revenue through a pinning strategy. Numerical simulation results verify the effectiveness of the proposed strategy. In summary, this work leads to the better understanding and analysis of the Po W algorithm via the game theory, rendering it possible to design a more rational consensus algorithm in the future.
引文
[1]Yuan Yong,Wang Fei-Yue.Blockchain:the state of the art and future trends.Acta Automatica Sinica,2016,42(4):481-494.
[2]Nakamoto S.Bitcoin:A peer-to-peer electronic cash system.Consulted,2009.
[3]Block chain depth report:the world be your witness(2).http://www.wxrw123.com/rm/20160420/472846_2.html,April 20,2016.
[4]Mc Conaghy T,Marques R,Müller A,De D J,Mc Conaghy T,Mc Mullen G,et al.Bigchain DB:A Scalable Blockchain Database.https://www.bigchaindb.com/whitepaper/bigchain db-whitepaper.pdf,June 8,2016.
[5]Blockchain introduction.http://blockchaindev.org/article/intr oduce_blockchain.html,December 14,2015.
[6]Consensus in Bitcoin:One system,many models.https://freed om-to-tinker.com/blog/randomwalker/consensus-in-bitcoinone-system-many-models/,December 26,2014.
[7]Nicolas T C.Bitcoin Miner Optimization.https://www.knaw.nl/shared/resources/actueel/bestanden/140212_Bitcoin_pres entatie_Nicolas_Courtois.pdf,2013
[8]Eyal I.The Miner's Dilemma.Computer Science,89-103,2014.
[9]Study when be threatened,the bitcoin pool attacking.http://www.bitecoin.com/online/2015/01/11102.html,Januar y 4,2015.
[10]Tang C B,Li A,and Li X.When reputation enforces evolutionary cooperation in unreliable MANETs.IEEE Trans.Cybern,45(10):2190-2201,2015.
[11]E yal I,Gün E S.It's Time For a Hard Bitcoin Fork.http://hackingdistributed.com/2014/06/13/time-for-a-hard-bi tcoin-fork/,June 3,2014.
[12]Rosenfeld M.Analysis of Bitcoin Pooled Mining Reward Systems.Computer Science,2011.
[13]Courtois N T,Bahack L.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency.Eprint Arxiv,2014.
[14]Larimer D.Transactions as proof-of-stake.http://7fvhfe.com1.z0.glb.clouddn.com/@/wp-content/uploads/2014/01/Trans actions As Proof Of Stake10.pdf,2013.
[15]Larimer D.Delegated proof-of-stake white paper.http://www.bts.hk/dpos-baipishu.html,2014.
[16]The consensus mechanism in blockchain.http://blog.csdn.net/u013137970/article/details/52958176,October 28,2016.
[17]Zhang Zhengwen.A Byzantine Fault tolerant algorithm in blockchain.http://www.onchain.com/paper/66c6773b.pdf,April,2016.
[18]Lewenberg Y,Sompolinsky Y,Zohar A.Inclusive block chain protocols//International Conference on Financial Cryptography and Data Security.Springer Berlin Heidelberg,2015:528-547.
[19]Kosba A,Miller A,Shi E,et al.Hawk:The blockchain model of cryptography and privacy-preserving smart contracts.IEEE Symposium on Security and Privacy,839-858,2016.
[20]Zhang H,Cui L,Luo Y.Near-Optimal Control for Nonzero-Sum Differential Games of Continuous-Time Nonlinear Systems Using Single-Network ADP.IEEE Transactions on Systems Man&Cybernetics Part B Cybernetics A Publication of the IEEE Systems Man&Cybernetics Society,43(1):206-216,2013.
[21]Zhang H,Qin C,Luo Y.Neural-Network-Based Constrained Optimal Control Scheme for Discrete-Time Switched Nonlinear System Using Dual Heuristic Programming.IEEE Transactions on Automation Science&Engineering,11(3):839-849,2014.
[22]Zhang H,Cui L,Zhang X,et al.Data-Driven Robust Approximate Optimal Tracking Control for Unknown General Nonlinear Systems Using Adaptive Dynamic Programming Method.IEEE Transactions on Neural Networks,22(12):2226-2236,2011.
[23]Block Withholding Attacks-Recent Research.http://blog.bet tercrypto.com/?p=1131,December 2,2014.
[24]Press W H,Dyson F J.Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent.Proceedings of the National Academy of Sciences,109(26):10409-10413,2012.
[25]Dong,Rong,Zhi-Hai,and Zhou T.Zero-determinant strategy:An underway revolution in game theory.Chinese Physics B,23(7):164-170,2014.
[26]He X,Dai H,Ning P,et al.Zero-determinant Strategies for Multi-player Multi-action Iterated Games.IEEE Signal Processing Letters,23(3):311-315,2016.
[27]Zhang H,Niyato D,Song L,Jiang T,Han Z.Zero-Determinant Strategy for Resource Sharing in Wireless Cooperations.IEEE Transactions on Wireless Communications,15(3):2179-2192,2016.
[28]Zhang H,Dusit N,Song L,et al.Zero-determinant strategy in cheating management of wireless cooperation.IEEE GLOBECOM,4382-4386,2014.
[29]Hilbe C,Wu B,Traulsen A,Nowak M.Evolutionary performance of zero-determinant strategies in multiplayer games.Journal of theoretical biology,374:115-124,2015.
[30]Nash J F.Equilibrium Points in N-Person Games.Proceedings of the National Academy of Sciences of the United States of America,36(1):48-49,1950.
[31]Pan L,Hao D,Rong Z,Zhou T.Zero-determinant strategies in iterated public goods game.Scientific Reports,13096-13096,2014.
[32]Ashraf Al D,George K,Jorg L.Zero-Determinant Strategies:A Game-Theoretic Approach for Shring Licensed Spectrum Bands.IEEE Journal on Selected Areas in Communications,32(11):2297-2308,201