8,248 research outputs found

    A Difficulty in Controlling Blockchain Mining Costs via Cryptopuzzle Difficulty

    Full text link
    Blockchain systems often employ proof-of-work consensus protocols to validate and add transactions into hashchains. These protocols stimulate competition among miners in solving cryptopuzzles (e.g. SHA-256 hash computation in Bitcoin) in exchange for a monetary reward. Here, we model mining as an all-pay auction, where miners' computational efforts are interpreted as bids, and the allocation function is the probability of solving the cryptopuzzle in a single attempt with unit (normalized) computational capability. Such an allocation function captures how blockchain systems control the difficulty of the cryptopuzzle as a function of miners' computational abilities (bids). In an attempt to reduce mining costs, we investigate designing a mining auction mechanism which induces a logit equilibrium amongst the miners with choice distributions that are unilaterally decreasing with costs at each miner. We show it is impossible to design a lenient allocation function that does this. Specifically, we show that there exists no allocation function that discourages miners to bid higher costs at logit equilibrium, if the rate of change of difficulty with respect to each miner's cost is bounded by the inverse of the sum of costs at all the miners.Comment: 8 pages. This is a working draft and can potentially have errors. Any feedback will be greatly appreciated and will be acknowledged in the updated versio

    Reward Sharing Schemes for Stake Pools

    Full text link
    We introduce and study reward sharing schemes (RSS) that promote the fair formation of {\em stake pools}\ in collaborative projects that involve a large number of stakeholders such as the maintenance of a proof-of-stake (PoS) blockchain. Our mechanisms are parameterized by a target value for the desired number of pools. We show that by properly incentivizing participants, the desired number of stake pools is a Nash equilibrium arising from rational play. Our equilibria also exhibit an efficiency / security tradeoff via a parameter that calibrates between including pools with the smallest cost and providing protection against Sybil attacks, the setting where a single stakeholder creates a large number of pools in the hopes to dominate the collaborative project. We then describe how RSS can be deployed in the PoS setting, mitigating a number of potential deployment attacks and protocol deviations that include censoring transactions, performing Sybil attacks with the objective to control the majority of stake, lying about the actual cost and others. Finally, we experimentally demonstrate fast convergence to equilibria in dynamic environments where players react to each other's strategic moves over an indefinite period of interactive play. We also show how simple reward sharing schemes that are seemingly more "fair", perhaps counterintuitively, converge to centralized equilibria

    SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies

    Full text link
    Cryptocurrencies have garnered much attention in recent years, both from the academic community and industry. One interesting aspect of cryptocurrencies is their explicit consideration of incentives at the protocol level. Understanding how to incorporate this into the models used to design cryptocurrencies has motivated a large body of work, yet many open problems still exist and current systems rarely deal with incentive related problems well. This issue arises due to the gap between Cryptography and Distributed Systems security, which deals with traditional security problems that ignore the explicit consideration of incentives, and Game Theory, which deals best with situations involving incentives. With this work, we aim to offer a systematization of the work that relates to this problem, considering papers that blend Game Theory with Cryptography or Distributed systems and discussing how they can be related. This gives an overview of the available tools, and we look at their (potential) use in practice, in the context of existing blockchain based systems that have been proposed or implemented

    Game-Theoretic Randomness for Blockchain Games

    Full text link
    In this paper, we consider the problem of generating fair randomness in a deterministic, multi-agent context (for instance, a decentralised game built on a blockchain). The existing state-of-the-art approaches are either susceptible to manipulation if the stakes are high enough, or they are not generally applicable (specifically for massive game worlds as opposed to games between a small set of players). We propose a novel method based on game theory: By allowing agents to bet on the outcomes of random events against the miners (who are ultimately responsible for the randomness), we are able to align the incentives so that the distribution of random events is skewed only slightly even if miners are trying to maximise their profit and engage in block withholding to cheat in games

    Computational Aspects of Equilibria in Discrete Preference Games

    Full text link
    We study the complexity of equilibrium computation in discrete preference games. These games were introduced by Chierichetti, Kleinberg, and Oren (EC '13, JCSS '18) to model decision-making by agents in a social network that choose a strategy from a finite, discrete set, balancing between their intrinsic preferences for the strategies and their desire to choose a strategy that is `similar' to their neighbours. There are thus two components: a social network with the agents as vertices, and a metric space of strategies. These games are potential games, and hence pure Nash equilibria exist. Since their introduction, a number of papers have studied various aspects of this model, including the social cost at equilibria, and arrival at a consensus. We show that in general, equilibrium computation in discrete preference games is PLS-complete, even in the simple case where each agent has a constant number of neighbours. If the edges in the social network are weighted, then the problem is PLS-complete even if each agent has a constant number of neighbours, the metric space has constant size, and every pair of strategies is at distance 1 or 2. Further, if the social network is directed, modelling asymmetric influence, an equilibrium may not even exist. On the positive side, we show that if the metric space is a tree metric, or is the product of path metrics, then the equilibrium can be computed in polynomial time

    Rethinking Blockchain Security: Position Paper

    Full text link
    Blockchain technology has become almost as famous for incidents involving security breaches as for its innovative potential. We shed light on the prevalence and nature of these incidents through a database structured using the STIX format. Apart from OPSEC-related incidents, we find that the nature of many incidents is specific to blockchain technology. Two categories stand out: smart contracts, and techno-economic protocol incentives. For smart contracts, we propose to use recent advances in software testing to find flaws before deployment. For protocols, we propose the PRESTO framework that allows us to compare different protocols within a five-dimensional framework.Comment: 8 pages, 1 figure, accepted for presentation as a regular paper at IEEE Blockchain 2018 (Halifax, Canada

    The Space of Planar Soap Bubble Clusters

    Full text link
    Soap bubbles and foams have been extensively studied by scientists, engineers, and mathematicians as models for organisms and materials, with applications ranging from extinguishing fires to mining to baking bread. Here we provide some basic results on the space of planar clusters of n bubbles of fixed topology. We show for example that such a space of clusters with positive second variation is an n-dimensional manifold, although the larger space without the positive second variation assumption can have singularities. Earlier work of Moukarzel showed how to realize a cluster as a generalized Voronoi partition, though not canonically.Comment: 10 pages, 3 figure

    Jump-starting coordination in a stag hunt: Motivation, mechanisms, and their analysis

    Full text link
    The stag hunt (or assurance game) is a simple game that has been used as a prototype of a variety of social coordination problems (ranging from the social contract to the adoption of technical standards). Players have the option to either use a superior cooperative strategy whose payoff depends on the other players' choices or use an inferior strategy whose payoff is independent of what other players do; the cooperative strategy may incur a loss if sufficiently many other players do not cooperate. Stag hunts have two (strict) pure Nash equilibria, namely, universal cooperation and universal defection (as well as a mixed equilibrium of low predictive value). Selection of the inferior (pure) equilibrium is called a coordination failure. In this paper, we present and analyze using game-theoretic techniques mechanisms aiming to avert coordination failures and incite instead selection of the superior equilibrium. Our analysis is based on the solution concepts of Nash equilibrium, dominance solvability, as well as a formalization of the notion of "incremental deployability," which is shown to be keenly relevant to the sink equilibrium.Comment: Some overlap with arXiv:1210.778

    Homoclinic dynamics in a restricted four body problem

    Full text link
    We describe a method for computing an atlas for the stable or unstable manifold attached to an equilibrium point, and implement the method for the saddle-focus libration points of the planar equilateral restricted four body problem. We employ the method at the maximally symmetric case of equal masses, where we compute atlases for both the stable and unstable manifolds. The resulting atlases are comprised of thousands of individual chart maps, with each chart represented by a two variable Taylor polynomial. Post-processing the atlas data yields approximate intersections of the invariant manifolds, which we refine via a shooting method for an appropriate two point boundary value problem. Finally we apply numerical continuation to the BVPs. This breaks the symmetries and leads to connecting orbits for some non-equal values of the primary masses

    How Peer Effects Influence Energy Consumption

    Full text link
    This paper analyzes the impact of peer effects on electricity consumption of a network of rational, utility-maximizing users. Users derive utility from consuming electricity as well as consuming less energy than their neighbors. However, a disutility is incurred for consuming more than their neighbors. To maximize the profit of the load-serving entity that provides electricity to such users, we develop a two-stage game-theoretic model, where the entity sets the prices in the first stage. In the second stage, consumers decide on their demand in response to the observed price set in the first stage so as to maximize their utility. To this end, we derive theoretical statements under which such peer effects reduce aggregate user consumption. Further, we obtain expressions for the resulting electricity consumption and profit of the load serving entity for the case of perfect price discrimination and a single price under complete information, and approximations under incomplete information. Simulations suggest that exposing only a selected subset of all users to peer effects maximizes the entity's profit.Comment: 9 pages, 4 figure
    • …
    corecore