"Zero Cost'' Majority Attacks on Permissionless Blockchains

Joshua S. Gans,Hanna Halaburda
2023-08-12
Abstract:The core premise of permissionless blockchains is their reliable and secure operation without the need to trust any individual agent. At the heart of blockchain consensus mechanisms is an explicit cost (whether work or stake) for participation in the network and the opportunity to add blocks to the blockchain. A key rationale for that cost is to make attacks on the network, which could be theoretically carried out if a majority of nodes were controlled by a single entity, too expensive to be worthwhile. We demonstrate that a majority attacker can successfully attack with a {\em negative cost}, which shows that the protocol mechanisms are insufficient to create a secure network, and emphasizes the importance of socially driven mechanisms external to the protocol. At the same time, negative cost enables a new type of majority attack that is more likely to elude external scrutiny.
Cryptography and Security,Computer Science and Game Theory,General Economics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the security issue of majority attack in permissionless blockchains (such as Bitcoin). Specifically, the paper explores how, in these blockchain systems, when an entity controls the majority of computing power or equity, it can successfully launch an attack at zero cost or even negative cost, thus affecting the reliability of blockchain records. The paper emphasizes that the existing protocol mechanisms may not be sufficient to create a secure network environment and points out the importance of social - driven mechanisms in ensuring blockchain security. ### Core Problems of the Paper 1. **Limitations of Existing Consensus Mechanisms**: - The core of the blockchain lies in participating in the network and adding blocks through Proof of Work (PoW) or Proof of Stake (PoS), which requires participants to bear certain costs. - The original intention of this cost design is to make the attack in which the majority of nodes are controlled by a single entity too expensive to be worth attempting. 2. **Possibility of Negative - Cost Attacks**: - The paper points out that attackers can achieve negative - cost attacks through certain strategies, that is, they may not only not lose costs but also may profit from it. - The existence of negative - cost attacks indicates that the existing protocol mechanisms are insufficient in preventing majority attacks. 3. **Importance of Social - Driven Mechanisms**: - Due to the decentralized nature of the blockchain network, it is challenging to detect and respond to malicious behaviors. - The paper emphasizes that in addition to technical protection measures, external social mechanisms also need to be relied on to enhance the security of the blockchain, such as the market's reaction to double - spending attacks, the waiting time before transaction confirmation, etc. ### Main Contributions of the Paper - **Theoretical Analysis of Negative - Cost Attacks**: - By analyzing in detail the cost composition of the attack, the paper shows that in some cases, attackers can offset the attack cost through higher mining rewards and even achieve negative cost. - This negative - cost attack is not limited to double - spending attacks. Even without direct economic benefits, attackers may also launch attacks because they obtain additional mining rewards. - **New Attack Types**: - Traditional majority attacks usually focus on double - spending attacks, while the paper proposes a new attack type, that is, attackers obtain additional mining rewards by reorganizing the blockchain, even without direct double - spending gains. - This new attack type is more difficult to detect because they can be carried out on a smaller scale and will not immediately attract attention. - **Impact on Centralization**: - The paper also discusses the miner centralization problem that may be caused by this new attack type. Small miners may exit the network because their blocks are orphaned, further exacerbating the centralization trend. ### Conclusion Through in - depth analysis of majority attacks, the paper reveals the potential vulnerabilities in the security of existing blockchain protocols and emphasizes the important role of social mechanisms in ensuring blockchain security. This research provides an important theoretical basis for future blockchain design and security strategies.