Monash University
Browse
- No file added yet -

Detection constraint for Harvesting Attack in Proof of Work mining pools

Download (196.21 kB)
Version 2 2019-07-09, 10:37
Version 1 2019-07-09, 09:56
report
posted on 2019-07-09, 10:37 authored by Veronika Kuchta, Yevhen ZolotavkinYevhen Zolotavkin
PoW consensus largely depends on mining that mostly happens in the pools where Pay Per Share (PPS) and Pay Per Last N Shares (PPLNS) are the most common reward schemes that are offered to the affiliated miners by pool managers. In this report, we describe detection constraint for ``pool harvesting" attack that is harmful for honest miners. In order to profit from the attack on PPLNS pool malicious manager declares that a non-existent miner A joins that pool. She then collects the portion of reward that corresponds to the mining power of the proclaimed miner A. We discuss a number of statistical tests that may be used by honest miners in PPLNS pool to detect the attack.

History