Feb. 2, 2023, 2:10 a.m. | Haoran Zhu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Lei Han, Zhi Chen

cs.CR updates on arXiv.org arxiv.org

GHOST, like the longest-chain protocol, is a chain selection protocol and its
capability in resisting selfish mining attack has been validated in imperfect
blockchains of Bitcoin and its variants (Bitcoin-like). This paper explores an
analytical-model-based method to investigate the impact of stubborn mining
attack in imperfect GHOST Bitcoin-like blockchains. We first quantify chain
dynamics based on Markov chain and then derive the formulas of miner revenue
and system throughput. We also propose a new metric, "Hazard Index", which can
be …

analysis attack bitcoin blockchains ghost impact miner mining protocol quantitative revenue

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Solution Architect

@ Civica | London, England, United Kingdom

Information Security Officer (80-100%)

@ SIX Group | Zurich, CH

Cloud Information Systems Security Engineer

@ Analytic Solutions Group | Chantilly, Virginia, United States

SRE Engineer & Security Software Administrator

@ Talan | Mexico City, Spain