This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

A Difficulty in Controlling Blockchain Mining Costs via Cryptopuzzle Difficulty

Venkata Sriram Siddhardh Nadendla Department of Computer ScienceMissouri University of Science and TechnologyRollaMO65410 [email protected]  and  Lav R. Varshney Department of Electrical and Computer EngineeringUniversity of Illinois, Urbana-ChampaignUrbanaIL61801 [email protected]
Abstract.

Blockchain systems often employ proof-of-work consensus protocols to validate and add transactions into hashchains. These protocols stimulate competition among miners in solving cryptopuzzles (e.g. SHA-256 hash computation in Bitcoin) in exchange for a monetary reward. Here, we model mining as an all-pay auction, where miners’ computational efforts are interpreted as bids, and the allocation function is the probability of solving the cryptopuzzle in a single attempt with unit (normalized) computational capability. Such an allocation function captures how blockchain systems control the difficulty of the cryptopuzzle as a function of miners’ computational abilities (bids). In an attempt to reduce mining costs, we investigate designing a mining auction mechanism which induces a logit equilibrium amongst the miners with choice distributions that are unilaterally decreasing with costs at each miner. We show it is impossible to design a lenient allocation function that does this. Specifically, we show that there exists no allocation function that discourages miners to bid higher costs at logit equilibrium, if the rate of change of difficulty with respect to each miner’s cost is bounded by the inverse of the sum of costs at all the miners.

1. Motivation

Permission-less blockchain systems including the Bitcoin cryptocurrency rely on proof-of-work consensus protocols that involve competitions among participants to solve difficult computational problems (cryptopuzzles). These participants, called miners, are bounded by the costs of resources needed for computation, such as energy. The consensus protocols, however, are subject to so-called forking attacks (51% attacks), where a miner or pool of miners having a large fraction of the computation power in the system can asymptotically almost surely fork the blockchain to prevent new transactions from being verified, double-spend coins, or destroy the system via dramatic loss of confidence (NarayananBFMG2016, ; EyalS2018, ). As such, an implicit assumption in ensuring the security of the distributed trust system is that there are a large number of independent miners with incentives to follow the protocol. In current practice, though, a small number of participants perform the majority of mining, often concentrated in locales such as in China where energy costs are low (ChowP2017, ).

One can view mining as participating in an all-pay auction (ArnostiW2018, ), where the bidding strategy captures heterogeneity amongst miners due to non-identical computational abilities and diverse electricity costs at different geographic locations. Recall that in an all-pay auction, the bid is forfeited whether win or lose (BayeVK1996, ). In Bitcoin, mining involves computing the SHA-256 hash function over and over as quickly as possible, and so the bid can be thought of as the hash rate; likewise in other blockchain systems. Equal hash rates (bids) incur varying costs to different miners, depending on the basic cost of resources in different locales. The Nash equilibrium strategies for all-pay auctions under complete information are such that only the two strongest players (lowest costs of bidding) should actively participate and all others should bid zero (HillmanR1989, ); this is exactly a concentration of participants. On the other hand, there is over-participation in many practical settings of all-pay auctions where there are many more than two participants. Several explanations for over-bidding behavior have been suggested in the literature, including bounded rationality and prospect-theoretic explanations (DechenauxKS2015, ).

Even with rational agents, overbidding behavior can emerge. In the context of crowdsourcing contests, previous work in designing auction systems has demonstrated that reducing information about competitors can increase participation (RanadeV2018, ; VarshneyRVG2011, ; BoudreauLL2011, ). When players have incomplete information about other players’ strengths, the Bayesian equilibrium strategies involve participation by more than two players (NoussairS2006, ). Alternatively, when bids do not directly translate into winning or losing, but rather only into increased chances of winning or losing, quantal response equilibrium (QRE) strategies also promote greater participation than that of Nash equilibrium strategies (AndersonGH1998, ). (Note that QRE is often used to model bounded rationality of human agents, but in blockchain mining, the auction itself has inherent uncertainty.)

Game theory has been used by several researchers in the design of secure blockchain systems (ArnostiW2018, ; AzouviH2019, ; Budish2018, ; HubermanLM2019, ; LeonardosLP2019, ; LiuLWNWLK2019, ), especially in the last year. Most of these efforts investigate various economic reasons behind the centralization of Bitcoin mining. For example, Budish showed that the necessary conditions for miners to be at equilibrium are very expensive, which promotes miners to sabotage via pooling their resources (Budish2018, ). On the other hand, Huberman et al. have shown that both the block reward and the transaction fees in Bitcoin do not reflect miners’ preferences, causing temporal fluctuations in miners’ investments (HubermanLM2019, ). Another interesting perspective on the centralization of Bitcoin miners was given by Leonardos et al., where miners are assumed to play oceanic games, as opposed to non-cooperative games, which model interactions between small numbers of dominant players and large numbers of individually insignificant players, as in the case of Bitcoin mining (LeonardosLP2019, ). It was shown that oceanic games in Bitcoin mining incentivize miners to join forces and form coalitions that increase the concentration of mining power.

Like these efforts, our work also contributes further to the game theory of blockchain systems. Specifically, we model blockchain mining as an all-pay auction to design cryptopuzzles that discourage miners to adopt higher computational costs at logit equilibrium (QRE with logit responses) with all miners actively participating. We show that it is not possible to design such a trustworthy distributed protocol, if the blockchain system does not react sharply to the increasing miner costs.

2. Modeling Blockchain Mining as All-Pay Auctions

Let ={1,,N}\mathcal{M}=\{1,\ldots,N\} denote the set of NN blockchain miners, who compete against each other in solving a given cryptographic puzzle (i.e. computing a target hash) and win a prize of value A>0A>0. During this competition, each miner makes multiple attempts sequentially to solve the crypto-puzzle. Let the outcome of the kkth attempt made by the iith miner be denoted as ai,k{0,1}a_{i,k}\in\{0,1\}, where ai,k=1a_{i,k}=1 denotes the puzzle being solved successfully. Since a crypto-puzzle can only be solved using random guesses, it is natural to model the outcome of the iith miner at time kk, i.e. ai,ka_{i,k}, as a Bernoulli random variable with probability P(ai,k=1)=piP(a_{i,k}=1)=p_{i}. Note that this probability pip_{i} characterizes the difficulty-level of the crypto-puzzle at the iith agent, since smaller values of pip_{i} needs several Bernoulli trials to obtain the outcome of ai,k=1a_{i,k}=1. Note that modeling blockchain mining as a sequence of Bernoulli trials is not new. For example, Bagaria et al. have modeled Bitcoin mining as a Poisson process (BagariaKTFV2018, ).

In this paper, we assume that each player employs a different hash rate in computing the hash function in the crypto-puzzle. Let KK denote the total number of random guesses after which one of the miners solves the cryto-puzzle successfully. Then, the iith miner wins the prize AA, if

(1) k=1Kai,k=1.\displaystyle\sum_{k=1}^{K}a_{i,k}=1.

In practical settings, mining agents have non-identical computational capabilities. For example, a miner with larger computational resources can complete the task in less effort per attempt (e.g. average run-time to execute a pseudorandom generator), as opposed to a less resourceful miner who needs more effort per attempt to complete the same task. This effort cost could be based on the cost of energy or specialized hardware availability (VilimDK2016, ). We model this miner heterogeneity (in terms of computational abilities and/or geo-location based disparities in electricity prices) using a non-negative cost-bid ci+c_{i}\in\mathbb{R_{+}} per attempt at the iith miner, for all i=1,,ni=1,\ldots,n. Furthermore, if we assume that the joint belief about the other agents’ cost-bids are denoted as π(𝒄i)\pi(\boldsymbol{c}_{-i}), the probability with which the iith miner solves the puzzle before other miners is given by

(2) Qi(ci)=𝔼π[P(k=1Kai,k=1,k=1Kai,k=0|ci,𝒄i)],=N1pi(1pi)K1ji[(1pj)K]π(𝒄i)d𝒄i.\begin{array}[]{lcl}Q_{i}(c_{i})&=&\displaystyle\mathbb{E}_{\pi}\left[P\left(\left.\displaystyle\sum_{k=1}^{K}a_{i,k}=1,\displaystyle\sum_{k=1}^{K}a_{{-i},k}=0\ \right|\ c_{i},\boldsymbol{c}_{-i}\right)\right],\\[17.22217pt] &=&\displaystyle\int_{\mathbb{R}^{N-1}}p_{i}(1-p_{i})^{K-1}\cdot\prod_{j\neq i}\left[(1-p_{j})^{K}\right]\cdot\pi(\boldsymbol{c}_{-i})\ d\boldsymbol{c}_{-i}.\end{array}

Then, the expected utility of the iith miner choosing a cost-bid cic_{i} is given by

(3) Ui(ci)=AQi(ci)Kci,\begin{array}[]{lcl}U_{i}(c_{i})&=&\displaystyle A\cdot Q_{i}(c_{i})-K\cdot c_{i},\end{array}

where the first term represents the average reward obtained by the iith miner, and the second term represents the total effort invested by the iith miner over KK attempts. Since the competition ends whenever a miner finds the target hash within the given crypto-puzzle, the individual rationality of each miner is satiated only when Ui0U_{i}\geq 0 for all i=1,,ni=1,\ldots,n.

Furthermore, since blockchain is known to automatically choose the difficulty of the crypto-puzzle depending on miners’ ability profile 𝒄={c1,,cN}\boldsymbol{c}=\{c_{1},\ldots,c_{N}\}, we denote this allocation as a probability f(𝒄)f(\boldsymbol{c}) with which the puzzle can be solved in one attempt per unit cost (computational ability). Therefore, in the presence of multiple agents with a cost profile 𝒄={c1,,cN}\boldsymbol{c}=\{c_{1},\ldots,c_{N}\}, we can compute the Bernoulli probability

(4) pi=f(𝒄)cijcj.p_{i}=\displaystyle f(\boldsymbol{c})\cdot\frac{c_{i}}{\displaystyle\sum_{j\in\mathcal{M}}c_{j}}.

In other words, the strategies available at the blockchain system (auctioneer) is to generate an appropriate crypto-puzzle via choosing a difficulty-level that specifies pip_{i} at its miners accordingly. On the other hand, the miners’ strategies include choosing effort-costs, which are revealed to the blockchain system. Therefore, it is natural to model this interaction between the blockchain system and its miners as a mining auction, where the miners’ effort-costs are their bids and the blockchain system (auctioneer) allocates the prize AA to the miner who wins the crypto-competition whose difficulty pip_{i} is specified based on miners’ bids.

Given such an auction, our goal is to investigate the equilibrium of this mechanism. In a traditional game-theoretic setting, the equilibrium of the mechanism is defined as a strategy profile where all the miners employ best responses to all the other miners’ responses. In other words, for any ii\in\mathcal{M}, given a bid-profile 𝒄i\boldsymbol{c}_{-i} from all the other players, the best response employed by the iith miner at Nash equilibrium satisfies the following conditions:

(5) Ui(ci,𝒄i)Ui(ci,𝒄i), for all ci, for all i.U_{i}(c_{i},\boldsymbol{c}_{-i})\ \geq\ U_{i}(c_{i}^{\prime},\boldsymbol{c}_{-i}),\text{ for all }c_{i}^{\prime}\in\mathbb{R},\text{ for all }i\in\mathcal{M}.

Although Blockchain system usually reveals its allocation function publicly to its miners (e.g. Bitcoin), agents may not know111Although it is possible to estimate miners’ bids from historical interactions, it is impossible to know if other miners have updated their computational capabilities in this auction round. the type of other players since miners (or miner pools) may not necessarily reveal their bids to other agents. Consequently, the miners can potentially violate their individual rationality conditions and not necessarily follow Nash equilibrium stated in Equation (5). As noted previously, similar behavior is also observed in several auction settings where human agents over-dissipate their bids and seemingly violate their individual rationality due to incomplete information (RanadeV2018, ). An alternate method to account for the overdissipation of bids (efforts) is to justify decision errors using random utility models at the players (AndersonGH1998, ). More specifically, the uncertainty in the utility of MiM_{i} in Equation (3) comes from the lack of knowledge of KK in advance and is fundamental to the blockchain setting, rather than a manifestation of bounded rationality. Therefore, in this paper, we assume that the miners choose strategies so that the mining auction converges to quantal response equilibrium (QRE), as opposed to NE.

3. Designing Mining Auctions with Quantal Responses

Quantal responses are stochastic best responses, where agents choose choices with higher expected utilities with higher probabilities. These stochastic best responses are rationalized by the presence of random utilities, which are traditionally studied in discrete choice models (e.g. logit model). An equilibrium concept using quantal responses is called quantal response equilibria (QRE), and was first proposed by McKelvey and Palfrey for normal-form games (McKelveyP1995, ). More specifically, the utility functions of the agents are modeled via logit probabilistic rule, which results in a logit equilibrium. Although logit models are originally proposed for discrete choice settings, Anderson et al. have demonstrated how similar equilibrium analysis can be performed when agent’s utilities follow a continuous logit model (AndersonGH1998, ), as shown below.

(6) πi(ci)=δiexp(Ui(ci)μ)=δiexp(AQi(ci)Kciμ)\begin{array}[]{lclcl}\pi_{i}(c_{i})&=&\delta_{i}\exp\left(\displaystyle\frac{U_{i}(c_{i})}{\mu}\right)&=&\delta_{i}\exp\left(\displaystyle\frac{\displaystyle A\cdot Q_{i}(c_{i})-K\cdot c_{i}}{\mu}\right)\end{array}

for all i=1,,Ni=1,\ldots,N, where πi(ci)\pi_{i}(c_{i}) is the allocation function which denotes the probability of ithi^{th} miner solving the cryptopuzzle before any other agent, UiU_{i} is the expected utility at the iith agent as given in Equation (3), μ\mu is the error parameter, and δi\delta_{i} is a constant that ensures that the density integrates to one. Obviously, when ci=0c_{i}=0, we have pi=0p_{i}=0. Therefore, δi=πi(ci=0)\delta_{i}=\pi_{i}(c_{i}=0).

In typical Blockchain systems, miners typically join together as mining pools to gather large amounts of computational resources, which results in a large computational cost cic_{i} at the iith miner. Therefore, our goal is to investigate how the allocation function πi(ci)\pi_{i}(c_{i}) change with the computational cost cic_{i}, at logit equilibrium. In this regard, we present the necessary condition for the iith miner to be discouraged to have a large cic_{i} in the following proposition.

Proposition 1.

A mining auction discourages its miners to adopt higher computational capabilities if

qi(ci,𝒄i)ciKA\displaystyle\frac{\partial q_{i}(c_{i},\boldsymbol{c}_{-i})}{\partial c_{i}}\leq\frac{K}{A}

holds true for all ii\in\mathcal{M}.

Proof.

Note that, in order to demotivate miners to accumulate higher computational capabilities, we desire πi(ci)\pi_{i}(c_{i}) to be a decreasing function of cic_{i}. This can happen only when

(7) πi(ci)ci=πi(ci)μ(AQi(ci)ciK)0.\begin{array}[]{c}\displaystyle\frac{\partial\pi_{i}(c_{i})}{\partial c_{i}}=\displaystyle\frac{\pi_{i}(c_{i})}{\mu}\left(\displaystyle A\cdot\frac{\partial Q_{i}(c_{i})}{\partial c_{i}}-K\right)\leq 0.\end{array}

In other words, if qi(ci,𝒄i)=pi(1pi)K1ji[(1pj)K]q_{i}(c_{i},\boldsymbol{c}_{-i})=\displaystyle p_{i}(1-p_{i})^{K-1}\cdot\prod_{j\neq i}\left[(1-p_{j})^{K}\right], an idealistic mining auction satisfies the condition

(8) Qi(ci)ci=N1qi(ci,𝒄i)ciπi(𝒄i)𝑑𝒄iKA,\displaystyle\frac{\partial Q_{i}(c_{i})}{\partial c_{i}}=\displaystyle\int_{\mathbb{R}^{N-1}}\frac{\partial q_{i}(c_{i},\boldsymbol{c}_{-i})}{\partial c_{i}}\ \pi_{-i}(\boldsymbol{c}_{-i})\ d\boldsymbol{c}_{-i}\ \leq\ \frac{K}{A},

whenever agents employ quantal responses as opposed to fixed best responses. Note that, if

qi(ci,𝒄i)ciKA\frac{\partial q_{i}(c_{i},\boldsymbol{c}_{-i})}{\partial c_{i}}\leq\frac{K}{A}

holds true, the inequality in Equation (8) holds true as well. ∎

In the remainder of this paper, our goal is to identify a mining auction (i.e. an appropriate allocation function f(𝒄)f(\boldsymbol{c})) that satisfies the condition presented in Proposition 1. In this journey, we rely on some minor results, which are first stated as lemmas.

Lemma 1.

If f(ci,𝐜i)f(c_{i},\boldsymbol{c}_{-i}) is an increasing function of cic_{i}, pip_{i} is increasing in cic_{i} for a fixed profile 𝐜i\boldsymbol{c}_{-i}. Furthermore, if f(ci,𝐜i)f(c_{i},\boldsymbol{c}_{-i}) is (1mcm)\displaystyle\left(\frac{1}{\displaystyle\sum_{m\in\mathcal{M}}c_{m}}\right)-Lipschitz in cic_{i}, then pip_{i} is (1mcm)\displaystyle\left(\frac{1}{\displaystyle\sum_{m\in\mathcal{M}}c_{m}}\right)-Lipschitz in cic_{i} for all ii\in\mathcal{M}.

Proof.

We compute the partial derivative of pip_{i} with respect to cic_{i} as shown below.

(9) pici=fcicijcj+fjicj(jcj)2.\displaystyle\frac{\partial p_{i}}{\partial c_{i}}=\displaystyle\frac{\partial f}{\partial c_{i}}\cdot\frac{c_{i}}{\displaystyle\sum_{j\in\mathcal{M}}c_{j}}+f\cdot\frac{\displaystyle\sum_{j\neq i}c_{j}}{\displaystyle\left(\sum_{j\in\mathcal{M}}c_{j}\right)^{2}}.

Note that the right side is always non-negative, as long as fci\displaystyle\frac{\partial f}{\partial c_{i}} is non-negative.

Now, if ff is (1mcm)\displaystyle\left(\frac{1}{\displaystyle\sum_{m\in\mathcal{M}}c_{m}}\right)-Lipschitz in cic_{i} for all ii\in\mathcal{M}, we have

(10) picici(jcj)2+fjicj(jcj)21jcj.\begin{array}[]{lclcl}\displaystyle\frac{\partial p_{i}}{\partial c_{i}}&\leq&\displaystyle\frac{c_{i}}{\displaystyle\left(\sum_{j\in\mathcal{M}}c_{j}\right)^{2}}+f\cdot\frac{\displaystyle\sum_{j\neq i}c_{j}}{\displaystyle\left(\sum_{j\in\mathcal{M}}c_{j}\right)^{2}}&\leq&\displaystyle\frac{1}{\displaystyle\sum_{j\in\mathcal{M}}c_{j}}.\end{array}

Lemma 2.

If f(ci,𝐜i)f(c_{i},\boldsymbol{c}_{-i}) is increasing in cic_{i} for all ii\in\mathcal{M}, then we have

(11) pjcici(jcj)2.\displaystyle\frac{\partial p_{j}}{\partial c_{i}}\ \geq\ \displaystyle\frac{-c_{i}}{\displaystyle\left(\sum_{j\in\mathcal{M}}c_{j}\right)^{2}}.
Proof.

We compute the partial derivative of pjp_{j} with respect to cic_{i} for any jij\neq i, as shown below.

(12) pjci=fcicijcjfci(jcj)2.\displaystyle\frac{\partial p_{j}}{\partial c_{i}}=\displaystyle\frac{\partial f}{\partial c_{i}}\cdot\frac{c_{i}}{\displaystyle\sum_{j\in\mathcal{M}}c_{j}}-f\cdot\frac{\displaystyle c_{i}}{\displaystyle\left(\sum_{j\in\mathcal{M}}c_{j}\right)^{2}}.

If f(ci,𝒄i)f(c_{i},\boldsymbol{c}_{-i}) is increasing in cic_{i} and since f1f\leq 1, then we have Equation (11). ∎

Next, we state the main result in this paper in the following theorem.

Theorem 1.

There does not exist a (1mcm)\left(\displaystyle\frac{1}{\displaystyle\sum_{m\in\mathcal{M}}c_{m}}\right)-Lipschitz allocation function f(ci,𝐜i)f(c_{i},\boldsymbol{c}_{-i}) that increases unilaterally with cic_{i} for all ii\in\mathcal{M}, which discourages miners to bid higher costs at logit equilibrium.

Proof.

In the following, we compute the partial derivative of gi=logqig_{i}=\log q_{i} with respect to cic_{i}:

(13) 1gigici=[1piK11pi]piciKji(11pj)pjci1Kpipi(1pi)1mcm+Kci(mcm)2ji11pj\begin{array}[]{lcl}\displaystyle\frac{1}{g_{i}}\cdot\frac{\partial g_{i}}{\partial c_{i}}&=&\displaystyle\left[\frac{1}{p_{i}}-\frac{K-1}{1-p_{i}}\right]\frac{\partial p_{i}}{\partial c_{i}}-K\cdot\sum_{j\neq i}\left(\frac{1}{1-p_{j}}\right)\frac{\partial p_{j}}{\partial c_{i}}\\[25.83325pt] &\leq&\displaystyle\frac{1-Kp_{i}}{p_{i}(1-p_{i})}\cdot\frac{1}{\displaystyle\sum_{m\in\mathcal{M}}c_{m}}\ +\ K\cdot\frac{c_{i}}{\left(\displaystyle\sum_{m\in\mathcal{M}}c_{m}\right)^{2}}\cdot\sum_{j\neq i}\frac{1}{1-p_{j}}\end{array}

Since gi(𝒄)1g_{i}(\boldsymbol{c})\leq 1 and 0pif0\leq p_{i}\leq f, we have

(14) gici1cif(1f)+Kci(mcm)2N11f=ctot.2+Kcif(N1)cif(1f)ctot.2\begin{array}[]{lcl}\displaystyle\frac{\partial g_{i}}{\partial c_{i}}&\leq&\displaystyle\frac{1}{c_{i}f(1-f)}\ +\ K\cdot\frac{c_{i}}{\left(\displaystyle\sum_{m\in\mathcal{M}}c_{m}\right)^{2}}\cdot\frac{N-1}{1-f}\\[17.22217pt] &=&\displaystyle\frac{c_{tot.}^{2}+Kc_{i}f(N-1)}{c_{i}f(1-f)c_{tot.}^{2}}\end{array}

where ctot.=mcmc_{tot.}=\displaystyle\sum_{m\in\mathcal{M}}c_{m}.

From Proposition 2, the allocation function ff demotivates miners to adopt higher computational capabilities if

(15) ctot.2+Kcif(N1)cif(1f)ctot.2KA.\begin{array}[]{lcl}\displaystyle\frac{c_{tot.}^{2}+Kc_{i}f(N-1)}{c_{i}f(1-f)c_{tot.}^{2}}&\leq&\displaystyle\frac{K}{A}.\end{array}

In other words, we expect ff to satisfy

(16) f2+[A(N1)ctot.21]f+AKci0,\begin{array}[]{lcl}\displaystyle f^{2}+\left[\frac{A(N-1)}{c_{tot.}^{2}}-1\right]f+\frac{A}{Kc_{i}}&\leq&0,\end{array}

for all ii\in\mathcal{M}.

In other words, if we denote cmin=minicic_{min}=\displaystyle\min_{i\in\mathcal{M}}c_{i}, then it is sufficient if ff satisfies

(17) f2+[A(N1)ctot.21]f+AKcmin0.\begin{array}[]{lcl}\displaystyle f^{2}+\left[\frac{A(N-1)}{c_{tot.}^{2}}-1\right]f+\frac{A}{Kc_{min}}&\leq&0.\end{array}

Note that the above equation can be equivalently written as

(18) {f+12[A(N1)ctot.21]}2+AKcmin14[A(N1)ctot.21]2.\begin{array}[]{lcl}\displaystyle\left\{f+\frac{1}{2}\left[\frac{A(N-1)}{c_{tot.}^{2}}-1\right]\right\}^{2}+\frac{A}{Kc_{min}}&\leq&\displaystyle\frac{1}{4}\left[\frac{A(N-1)}{c_{tot.}^{2}}-1\right]^{2}.\end{array}

This inequality cannot be achieved since the left side of the above inequality is always larger than the right side. ∎

In other words, the theorem says that it is impossible to design a lenient allocation function for blockchain systems that discourages miners to adopt higher computational capabilities. That is, from the perspective of logit equilibrium, blockchain systems need to take severe actions (in terms of controlling the mining difficulty) against its miners to discourage them towards lower costs.

4. Conclusion and Future Work

In this paper, we modeled mining in blockchain systems as an all-pay auction. Since many studies have shown that miners exhibit overbidding behavior, we investigated the problem of designing a mining auction mechanism which induces a logit equilibrium amongst miners. We found that the miners cannot be discouraged to bid higher costs at logit equilibrium, if the rate of change of allocation probability ff, i.e. the probability with which the cryptopuzzle can be solved in one attempt per unit normalized-cost, with respect to each miner’s cost is bounded by the inverse of the sum of costs at all the miners. In other words, it is necessary to punish the miners severely if they choose higher computational costs, in order to motivate a distributed trust system. In future work, we aim to identify allocation functions in blockchain systems whose rate of change is not upper-bounded by the inverse of the sum of costs at all the miners. We will also investigate QRE formulations where there is also incomplete information on competitor strengths to see how the interaction between these two mechanism design strategies play out.

References

  • (1) A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton, NJ, USA: Princeton University Press, 2016.
  • (2) I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” Communications of the ACM, vol. 61, pp. 95–102, July 2018.
  • (3) S. Chow and M. E. Peck, “The bitcoin mines of China,” IEEE Spectrum, vol. 54, pp. 46–53, Oct. 2017.
  • (4) N. Arnosti and S. M. Weinberg, “Bitcoin: A natural oligopoly,” Nov. 2018. arXiv:1811.08572 [cs.CR].
  • (5) M. R. Baye, D. Kovenock, and C. G. de Vries, “The all-pay auction with complete information,” Economic Theory, vol. 8, pp. 291–305, June 1996.
  • (6) A. L. Hillman and J. G. Riley, “Politically contestable rents and transfers,” Economics & Politics, vol. 1, pp. 17–39, Mar. 1989.
  • (7) E. Dechenaux, D. Kovenock, and R. M. Sheremeta, “A survey of experimental research on contests, all-pay auctions and tournaments,” Experimental Economics, vol. 18, pp. 609–669, Dec. 2015.
  • (8) G. V. Ranade and L. R. Varshney, “The role of information patterns in designing crowdsourcing contests,” in Creating and Capturing Value through Crowdsourcing (C. L. Tucci, A. Afuah, and G. Viscusi, eds.), pp. 154–177, Oxford, UK: Oxford University Press, 2018.
  • (9) L. R. Varshney, J. B. Rhim, K. R. Varshney, and V. K. Goyal, “Categorical decision making by people, committees, and crowds,” in Proceedings of the 2011 Information Theory and Applications Workshop, Feb. 2011.
  • (10) K. J. Boudreau, N. Lacetera, and K. R. Lakhani, “Incentives and problem uncertainty in innovation contests: An empirical analysis,” Management Science, vol. 57, pp. 843–863, May 2011.
  • (11) C. Noussair and J. Silver, “Behavior in all-pay auctions with incomplete information,” Games and Economic Behavior, vol. 55, pp. 189–206, Apr. 2006.
  • (12) S. P. Anderson, J. K. Goeree, and C. A. Holt, “Rent seeking with bounded rationality: An analysis of the all-pay auction,” Journal of Political Economy, vol. 106, pp. 828–853, Aug. 1998.
  • (13) S. Azouvi and A. Hicks, “SoK: Tools for game theoretic models of security for cryptocurrencies,” May 2019. arXiv:1905.08595 [cs.CR].
  • (14) E. Budish, “The economic limits of bitcoin and the blockchain,” June 2018.
  • (15) G. Huberman, J. D. Leshno, and C. Moallemi, “An economist’s perspective on the bitcoin payment system,” AEA Papers and Proceedings, vol. 109, pp. 93–96, May 2019.
  • (16) N. Leonardos, S. Leonardos, and G. Piliouras, “Oceanic games: Centralization risks and incentives in blockchain mining,” Apr. 2019. arXiv:1904.02368 [cs.GT].
  • (17) Z. Liu, N. C. Luong, W. Wang, D. Niyato, P. Wang, Y.-C. Liang, and D. I. Kim, “A survey on applications of game theory in blockchain,” Feb. 2019. arXiv:1902.10865 [cs.GT].
  • (18) V. Bagaria, S. Kannan, D. Tse, G. Fanti, and P. Viswanath, “Deconstructing the blockchain to approach physical limits,” Oct. 2018. arXiv:1810.08092 [cs.CR].
  • (19) M. Vilim, H. Duwe, and R. Kumar, “Approximate bitcoin mining,” in Proceedings of the 53rd Design Automation Conference (DAC ’16), pp. 97:1–97:6, June 2016.
  • (20) R. D. McKelvey and T. R. Palfrey, “Quantal response equilibria for normal form games,” Games and Economic Behavior, vol. 10, pp. 6–38, July 1995.