Next Article in Journal
On the Classification of Polyhedral Links
Next Article in Special Issue
Special Issue: Symmetric and Asymmetric Encryption in Blockchain
Previous Article in Journal
Aγ Eigenvalues of Zero Divisor Graph of Integer Modulo and Von Neumann Regular Rings
Previous Article in Special Issue
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks

1
The Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan 250014, China
2
Mathematical Institute, The Serbian Academy of Sciences and Arts, 11000 Belgrade, Serbia
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(8), 1711; https://doi.org/10.3390/sym14081711
Submission received: 8 July 2022 / Revised: 5 August 2022 / Accepted: 8 August 2022 / Published: 17 August 2022
(This article belongs to the Special Issue Symmetric and Asymmetric Encryption in Blockchain)

Abstract

:
This paper proposes an approach for pool mining in public blockchain systems based on the employment of a recently reported consensus protocol with the puzzle based on a symmetric encryption that provides an energy–space trade-off and reduces energy consumption. The proposed architecture employs a pseudo-symmetric allocation of the resources for the blockchain consensus protocol and provides protection against certain malicious actions of the pool members, as well as a miner’s opportunity for selecting the resources required for participation in the consensus protocol. Given that the considered consensus protocol employs two resources, the proposed architecture uses this two-dimensional nature to provide resistance against block withholding and selfish mining attacks, as well as a reduction in energy spending as a trade-off with the employment of certain memory resources. The high resistance of the proposed pool mining approach against the considered attacks appears to be a consequence of the success probability of the pool in comparison with the success probability of malicious miners. Assuming appropriate selection of the puzzle hardness, the probability that malicious miners can solve the puzzle without the support of the pool manager can be arbitrarily small. Implementation of the proposed approach on a modified Ethereum platform and experimental evaluation issues have also been reported. The conceptual novelty of the proposed pool mining approach is the following: Instead of separation of the blockchain consensus protocol and control of pool miners honest work, this paper proposes an approach where honest work of miners and pool managers is provided by a dedicated application of the considered consensus protocol. Advantages of the proposal in comparison with the previously reported ones include the following: (i) high resistance against block withholding and selfish mining attacks without an additional security procedure; (ii) reduction in the energy required, and at the same time preservationthe security of the consensus protocol; (iii) flexibility of the pool miners regarding selection of the resources that should be employed providing a trade-off between required energy and memory resources. The proposed architecture was implemented employing a dedicated modification of the Ethereum platform and the performed experiments confirmed the feasibility and effectiveness of the proposal.

1. Introduction

Blockchain technology has been widely recognized as a very important one after its first breakthrough application for cryptocurrency “Bitcoin”. Blockchain technology provides verified updates of a distributed and strictly expanding database in a distributed and immutable manner. This database is called blockchain and it is a decentralized digital ledger. A blockchain system consists of the following two basic classes of entities: ordinary users and the entities that participate in the system operations called miners (they could act as users, as well). One of the key issues is that in blockchain systems the verification is performed without a third trusted party. Instead, the blockchain system provides verification by the miners that participate in the consensus protocol. Regarding the miners, there are two main types of blockchain systems: permissionless or public blockchain and permissioned. In the public blockchain any entity could be a miner, as compared to permissioned blockchain systems where only selected entities play the role of the miners. In public blockchain systems, execution of the consensus protocol mainly requires that the miners solve a computationally hard problem. More details on the blockchain systems and consensus protocols can be learned from [1,2,3], for example. An added functionality of blockchain with an increased importance is smart contracts and a recent illustrative review is given in [4]. Applications of blockchain technology record a huge increase and a recent overview is given in [5].
Pool mining assumes that a miner joins a pool of miners operated by a pool manager instead of acting as a solo miner. Pool mining appears to be the preferable working approach in public blockchain systems based on proof-of-work-like consensus paradigms (see [6], for example). The main objective for miners to join mining pools is to receive regular income, in contrast to solo mining, where the rewards are infrequent and have a low appearance rate. The mining process for miners can be seen as a type of lottery, where the probability that individual miners with small computational power will win the next block proposition is almost negligible. Mining within a mining pool reduces the effects implied by this very low probability.
Motivation for the Work. The blockchain pools of miners are vulnerable to malicious miners who could join the open pools. On the other hand, pool mining is the main mining approach, and accordingly pool miners’ honesty is well recognized as an important issue in order to protect the pool from malicious miners. Although there are a number of proposals for reducing this vulnerability, an interesting open issue is the consideration of advanced pool mining architectures that provide enhanced security against malicious activities. In particular, please note that the hash-based blockchain puzzle has the following two drawbacks: (i) it requires heavy energy consumption, (ii) during the sub-problem solving process, a malicious miner could find a solution to the main puzzle, and it does not disclose it to the pool manager in order to perform block withholding or selfish mining-based attacks. Accordingly, it is interesting to consider Proof-of-Work (PoW) based blockchain consensus protocols that are not based on the hashing problem, and that generically provide a potential for developing a mining framework that yields high security against certain attacks, such as block-withholding attacks and selfish mining against a pool of miners. In particular, an origin for alternative design is that generic approach for solving hard inversion problems (solving certain cryptographic puzzles) is not only an exhaustive search (employed in hash-based PoW), but in certain cases could be the so-called “codebook approach” where instead of an exhaustive search, a pre-specified memory is employed, as well as a combination of these two approaches known as time–memory trade-off. It is well known that the exhaustive search-based PoW requires an amount of energy that limits its applicability.
Summary of the Results. This paper proposes and evaluates security, yields an implementation framework, and experimentally considers an approach for pool mining in public blockchain systems. In particular, a novel architecture for pool mining and the corresponding procedure for interaction between a miner and the pool manager are proposed. The proposed architecture provides (i) miners’ flexibility in selecting the resources required for participation in the consensus protocol and (ii) high resistance against the main attacks that could appear within pool mining, such as block-withholding attacks and selfish mining. The architecture is based on employment of the recently reported blockchain consensus protocol [7], with the puzzle based on symmetric key encryption, and employs energy and space resources and appropriate control of these resources. The architecture separates the energy and memory resources between the miners and pool manager in a quasi-symmetric manner and yields power to the pool manager to control access to the memory resources, i.e., tables, which provide substantial efficiency for solving the consensus protocol puzzle. The success rate of pool mining and robustness against malicious miner attacks are considered. A dedicated protocol for communication between a miner and pool manager is proposed. It is shown that the success probability of malicious miners verifying a block could be made arbitrarily small in comparison with the pool success probability, implying robustness against block-withholding attacks and selfish mining. The implementation framework of the proposed architecture is given based on employment of a modified Ethereum platform, where the proof-of-work (PoW) consensus protocol is replaced by the protocol reported by the one based on the energy–memory trade-off. According to the above, in comparison with the previously reported results, this paper yields the following novelties: (i) A different paradigm is employed for providing resistance against the block-withholding and selfish mining attacks: The resistance is incorporated into the consensus protocol oppositely to the previously reported approaches where the consensus protocol and control against the considered attacks are independent issues. (ii) A novel architecture for pool mining is proposed where the miners and the Pool Manager combine their resources for performing the consensus protocol. (iii) The pool mining employs a consensus protocol that provides flexibility concerning the resource selection required at a miner’s side and reduction in the total pool energy consumption. The reported experimental work was carried out as follows: (i) Implementation of a modified Ethereum platform for the pool mining according to the proposed architecture; (ii) in order to prove the feasibility of the proposed mining approach, the experiments were conducted on a platform with an Ubuntu 20.04 operating 536 system that has an Intel Core i7-10750H CPU @2.60 GHz with 12 cores; (iii) experiments have confirmed the feasibility and effectiveness of the proposal.
Organization of the Paper. Section 2 summarizes the background for this paper. A proposal for a pool mining approach based on a novel pool mining architecture and the corresponding communication procedure between a miner and the pool manager is given in Section 3. An analysis of the proposed pool mining is given in Section 4. Section 5 discusses implementation and experimental evaluation issues. Conclusions are given in Section 6. Finally, Appendix A and Appendix B contain certain technical issues.

2. Background

2.1. Pool Mining

Pool mining is the dominant approach for the participation of a miner in a blockchain system, particularly in public blockchain systems that involve proof-of-work-based consensus protocols. Pool mining provides a miner with a working framework that preserves the return of mining investment because a miner will be rewarded for work efforts even if they do not yield a mining solution. Different issues regarding pool mining are reported in a number of papers beginning with [8] and including recent studies [6,9,10,11,12]. Taking into account difficulty in finding a valid solution of a cryptographic puzzle, the operator of the pool will reward participating miners based on work efforts at solving the subpuzzles distributed to the miners. The difficulty of a subpuzzle is much smaller than the challenging puzzle, and the miners can find the solutions of the sub-puzzles with reasonable effort. The operator of the pool will let its miners submit as many solutions of the subpuzzles as they can and distribute the rewards among its miners according to their submitted solutions. A solution of the subpuzzle has the probability of being the solution of the blockchain puzzle. If the solution found by the miners also satisfies the difficulty of the current blockchain puzzle, it is the complete solution; otherwise, it is a partial solution. Note that only if the pool can find a complete solution can it receive the reward. If the partial solution is not a complete solution, the pool does not receive any reward, but the miners receive compensation for their work. A problem is that a pool of miners, in public blockchains, could contain not only honest but also dishonest miners, which submit to the pool only partial solutions that are incomplete, and they still receive rewards for the pool mining participation. A number of attacks could also appear, including so-called block-withholding and self-mining attacks, which are summarized below.

2.2. Block-Withholding Attack

In a block-withholding attack, dishonest miners will only submit partial solutions to the pool but the complete solutions will be hidden. Block-withholding attacks are disadvantageous for both pools and their miners because they can greatly reduce the winning probability of the pools in the mining games, so the expected rewards for the pools and their miners can be substantially reduced. This attack is possible since each miner can know whether the obtained partial solution is a complete solution or not. Illustrative results regarding the block-withholding attack have been reported in [13,14,15,16].

2.3. Selfish Mining

Selfish mining is a variant of block-withholding attacks, and there are the following two main types of malicious approaches: (i) Block-withholding delay, in which newly mined blocks are released with intentional delay to increase the attacker’s revenue; and (ii) Block-withholding attack, where the withheld blocks are never released to degrade the mining utility of the victim pool and miners.
The selfish mining approach consists of the following: In contrast to an honest miner, one or more attackers do not release a block immediately upon mining it, and instead, selfish miners try to mine more blocks to build a private extension branch of the blockchain. The main goal is to build a blockchain that will be longer than the one mined by honest miners and release it at a suitable time with the goal of wasting honest miner work and gaining larger revenue. Selfish miners not only obtain rewards but also grow in a snowball-like manner to obtain the majority. For an illustration of the reported issues on selfish mining, we point to [17,18].

2.4. Blockchain Consensus Protocol Based on Energy and Memory Resources

The blockchain mining employed in this paper is based on the consensus protocol reported in [7], as well as its reported security evaluation. The consensus protocol proposed in [7] follows the same framework as the traditional consensus protocols for public blockchains based on PoW employed in Bitcoin and Ethereum. Accordingly, each execution of these protocols consists of the following three main phases: The first is construction of a block of transactions. The second phase is the process of solving a puzzle. The final phase is inclusion of the considered block into the blockchain under the assumption that no one transaction from the block has already been included in the blockchain. The main differences of the blockchain consensus protocol reported in [7] and the previously reported protocols are related to the following two issues: (i) the puzzle that has to be solved, and (ii) construction of the challenge for the puzzle and technique for solving the puzzle. The employed puzzle, and the solving method are explained in Appendix A.

3. Proposal for the Pool Mining Approach

This section proposes a pool mining approach that provides (i) high resistance against block-withholding attacks and selfish mining, and (ii) a high reduction in the energy required for the consensus protocol at a suitable trade-off with a requirement for employment of certain space (memory) resources. Consequently, this section yields a novel architecture for the pool mining and corresponding procedure for interaction between a miner and the pool manager.

3.1. Underlying Ideas

We employ the blockchain consensus protocol summarized in Section 2 with the following consensus puzzle: For given ciphertext c find the encryption key k such that
y = E k ( 1 )
where E is an encryption function and the plaintext is an dimensional all-ones vector. The considered puzzle problem requires cryptographic inversion and we assume that the most efficient inversion is based on the time–memory trade-off approach. Consequently, for solving the consensus puzzle, two types of resources, energy and memory, should be employed.
A dedicated employment of this “resources two dimensional” consensus protocol in the pool mining scenario is proposed. The main underlying idea is to separate resources required for puzzle solving between the pool manager and the miners to provide resistance against certain attacks and to heavily reduce energy spending on the miners’ side without introducing an additional space overhead, which is moved to the pool manager as displayed in Figure 1.
The main underlying idea is to split execution of the puzzle-solving technique between miners and the pool manager, based on required resources of two-dimensional nature, so that neither the miner nor the pool manager could independently solve the consensus protocol puzzle. We assume the following: (i) The employed puzzle is such that it cannot be solved without employment of a certain amount of energy and involvement of certain memory; (ii) The mining pool energy is associated with the miners; (iii) The memory employed by the pool is associated with the pool manager.
The pool mining is organized as follows:
-
Miners perform computationally extensive iterative re-encryptions, and after each recalculation, send the result to the pool manager;
-
Pool manager performs a table look-up operation to check, as described in Appendix A, whether the current encryption outcome provides the puzzle solution.
An additional underlying idea is to employ direct sampled checking of the data a miner submits to the pool manager instead of employing a reduced puzzle problem to check honest participation in pool mining. We consider public blockchain pool mining where, in addition to honest miners, malicious miners could also be members of the pool. We assume that honest miners do not have, for the relevant protocol, memory resources, but we also admit that there are malicious miners that hide that have certain memory resources allocated for the tables relevant for solving the puzzle.

3.2. Architecture

Following the above underlying ideas, this section proposes the pool mining architecture by specifying:
-
Main architectural components;
-
Role of these components;
-
Architectural design.

3.2.1. Components

Recall that we consider public blockchain pool mining, so we consider the architecture where, in addition to honest miners, malicious miners could exist as well. Consequently, the main architectural elements are
-
Miners with computational power but without memory resources, called Miner Type A (honest miners);
-
Miners with computational power and memory resources, called Miner Type B (potentially malicious miners);
-
A pool manager with memory resources for collection of the tables: the tables are generated by the pool manager; the pool manager possesses computational power for the use of the collection of the tables.

3.2.2. Roles

Miners: We assume that both types of miners, Types A and B, perform iterative re-encryptions to generate candidates for the puzzle solution and to deserve the pool mining award. After recalculation, a miner puts the outcome into the buffer at the communications gate and continues with a new encryption round of iterative recalculation by using the current outcome as the new key for encryption of all-ones binary vectors as specified in the puzzle-solving algorithm. For the described activity, the miners receive pool awards assuming that they pass control of dedicated work. In addition, Miner Type B could perform the following malicious activity: In addition to submitting the outcomes of iterative re-evaluations to the pool manager, a Miner Type B could perform a check, employing its own table and the tables it can access, on whether the current candidate provides a solution for the puzzle to reach the block-mining award independently of the pool.
The Pool Manager: Organizes and operates pool mining, including acceptance of the miners to the pool. During processing, the main roles of the pool manager are the following: (i) To check if the current recalculation result exists in the second column of a table from the collection and to process the comparison outcomes; (ii) To perform a sampled correctness check of the miner’s data submitted as the recalculation outcome, which is a substitution for checking the honest work of a miner employing the reduced puzzle problem. A miner that passes the correctness check obtains the share reward for participation in pool mining.

3.2.3. Design

In the process of forming the pool of miners, pool managers register all miners involved in pool mining. During the registration phase a miner claims the dimension of the sub-table it will support (i.e., virtually rent) and receives information on the miner’s reward for pool mining participation. We assume that the reward of a miner depends on the computational resources associated with pool mining and the size of the rented memory part at the pool manager that the miner supports, but a detailed discussion of these issues is outside the scope of this paper.
The pool manager communicates with the miners employing the communications gate with a buffer for receiving the miners’ outcomes after each iterative re-encryption. Each miner submits the re-encryption outcome to the buffer, and the pool manager picks it up for further processing and deletes it from the buffer. The pool mining algorithm is described in the next section.
By design, the proposed pool mining approach provides the following two levels of security: (i) robustness against malicious miners that would like to launch block-withholding and selfish mining attacks against the pool; and (ii) Protection against malicious pool managers that could have the intention of hiding mining results from the pool members in order to reduce their rewards.
For further consideration, we employ the notation in Table 1. The architectural framework is proposed in Figure 2.

3.3. Pool Mining Procedure

The pool manager (PM) communicates with each of the miners employing the same protocol. The main input of the protocol is a block that is the subject of verification generated by the PM. All the miners involved in the pool mining process the same block of data. The outputs of the protocol are the flags that inform a miner about outcomes of the performed mining activities. If a miner has provided the image of a puzzle solution and the PM finds the puzzle solution, the flags F s o l u t i o n and F s h a r e are raised. The flag F s h a r e is raised when PM detects that a miner has honestly performed the mining activities although the activities have not ended with the puzzle solution. The flag F A informs a miner to abort further processing of the considered block because somebody else has found the puzzle solution.
The interaction of a miner and pool manager during the puzzle-solving process is displayed in Figure 3.
Note that instead of the reduced puzzle problem for controlling the dedicated work of a miner, the proposed pool mining approach employs a sampled correctness check of the recursive evaluation: If the checked evaluations of a miner are correct, the PM grants a share as a reward for the miner’s work regarding the considered block processing.
Table 2 displays the proposed mining procedure. In particular, according to Table 1, note that within a time slot τ , the computing power q i provides that the miner i could execute q i τ / δ encryptions.

3.4. A Comparison of Energy Consumption

In order to illustrate the reduction in the energy requirements of the pool when the proposed approach is employed in comparison with a traditional PoW, we point to the reports in [7], Section 6. Suppose that the consensus puzzle solution is a point in a space of N different hypotheses, and that both approaches have the same probability P of success for solving the corresponding puzzles. Moreover, we suppose that checking each hypothesis in both approaches has the same computational complexity so that it requires the same energy cost. We assume that during the proposed mining process all the miners submit to the pool manager in total D different candidates for a solution and that D M = P N , where M is the total memory employed at the pool manager. Consequently, total computational complexity on the pool miner side is O ( PN / M ) which yields the total energy cost, as well, and the energy cost on the pool manager side is Δ , noting that Δ < < O ( P N / M ) . The illustrative comparison of the resources required for the pool mining employing the proposed approach and a traditional one with hash-based PoW is given in Table 3.
According to the table, for example, when M = 2 30 the energy consumption is reduced about 2 30 times in comparison with PoW requirement at the expense of employing a memory of dimension O ( 2 30 ) .

4. The Probabilities of Success

The resistance against block-withholding attacks and selfish mining depends on the probability that A malicious miner or a group of malicious miners could succeed in the attack in which the goal is solving the puzzle before PM. Consequently, we discuss the probabilities that the pool will win and that a sub-pool of malicious miners could win. Assuming that the parameters are appropriate, it is shown that the probability rate, which implies attack resistance, could be arbitrarily high.
Assumption A1.
Table dimension | m i | < < 2 and the parameter t i show that the repetitions that are consequence of the Birthday paradox do not appear in tables m i , i = 1 , 2 , , N .
Lemma 1.
The time–memory-based inversion over the space of dimension 2 within a time slot Δ, employing a table m with t 1 hidden columns, and the generation of the candidates for inversion based on the power rate q, assuming that required energy for generating a candidate is δ, has the following probability of success:
P r i n v = 2 q Δ δ | m | t .
Proof. 
Each row of the two-column table m is generated based on the following: (i) random selection of the first row element; (ii) iterative re-evaluation of the encryption t times; (iii) setting the second column as the value obtained after t re-evaluations performed in step (ii). Assuming that | m | < < 2 and t is such that the repetitions that are a consequence of the Birthday Paradox will not appear, the table m implicitly contains the opportunity for | m | t inversions. Accordingly, the inversion rate α is:
α = 2 | m | t ,
Consequently, if ν different candidates are employed, the probability that at least one inversion appears is equal to α ν . When the computation rate is q, the time slot is Δ and the energy cost for generating a candidate is δ , we have:
ν = q Δ δ ,
and combined with the previous equation, we have a proof of the lemma.    □
Proposition 1.
As a generalization of Lemma 1, we have the following. Assuming that all N pool miners submit correct data to the PM to receive the share-based reward, the probability P r p o o l w i n that the pool will perform an inversion with the parameter ℓ within the time slot Δ is:
P r p o o l w i n = 2 Δ i = 1 N q i δ i = 1 N | m i | t i .
Proof. 
During the Δ time slot, a miner v i provides the PM with q i / δ candidates, i = 1 , 2 , , N . Accordingly, assuming that all miners honestly provide the candidates, the PM obtains a total of Δ i = 1 N q i δ candidates. Each candidate is subject to the inversion attempt by the PM employing a joint table that implicitly contains i = 1 N | m i | t inversion pairs, implying that the probability of inversion for a candidate is 2 i = 1 N | m i | t .    □
Proposition 2.
The probability P r v D w i n that the pool of dishonest miners will perform an inversion with the parameter ℓ within the time slot Δ is:
P r v D w i n = 2 Δ v i v D q i * δ v i v D | m i * | t i * ,
where q i * , m i * , t * are the parameters of the resources employed by a dishonest miner v i v D for malicious activities.   
Proof. 
As a generalization of Lemma 1, we have the following. Within the Δ time slot, a pool of dishonest miners is generated in a total of Δ v i v D q i * δ candidates. The pool of dishonest miners makes all the tables available for the inversion check of each candidate open to all malicious miners and a dishonest miner employs computation power q i * . Consequently, each candidate is subject to the inversion attempt employing the tables that implicitly contain v i v D | m i * | t i * inversion pairs, implying that the probability of successful inversion of a candidate is 2 v i v D | m i * | t i * .    □
Propositions 1 and 2 directly imply the following corollary.
Corollary 1.
P r v D w i n P r p o o l w i n = v i v D q i * v i v D | m i * | t i * i = 1 N q i i = 1 N | m i | t i
Assuming that the parameters are appropriate, Corollary 1 points out that the resistance of the pool against malicious miners could be arbitrarily high.

5. Implementation and Experimental Evaluation

This section provides a toy example implementation of the pool mining design proposed in Section 3 and illustrative experimental evaluation of the considered implementation. The implementation employs a modified Ethereum platform. The given experimental results show the feasibility of the proposal and illustrate the performances.

5.1. Implementation of the Proposed Pool Mining Employing a Modified Ethereum Platform

Architecture of the implemented pool mining is displayed in Figure 4.
Pool manager implementation consists of two interconnected components: Ethereum client and Pool Manager software (Figure 4). Ethereum client is used for maintaining the local blockchain copy, for communicating with the network and for creating blocks that are to be mined by the pool. The Pool Manager software is used for distributing the mining jobs to the miners, receiving values that the miners calculate, for looking for the values in the tables, and for completing the mined blocks. Ethereum client used in this implementation is modified Geth client [19], while the Pool Manager software is based on Open Ethereum Mining Pool [20].
The miners use a newly implemented software that performs needed calculations for the proposed consensus protocol.

5.1.1. Modified Ethereum Platform

Geth is the current up-to-date implementation of the Ethereum protocol written in the Go programming language. One of the principles of Ethereum is modularity, so Geth already has a certain predefined interface that consists of the following modules:
  • The Author module returns the Ethereum address of the account that has mined the block with the given header. If the implemented consensus protocol is based on signatures (such as Etherium’s Clique protocol), this address can be differently compared to the address of the coinbase account, which represents the base account of every Ethereum node.
  • The VerifyHeader module checks whether the header of the new mined block follows the rules of the consensus algorithm that is implemented. This module may check the validity of the crypto seal if the value of its parameter, seal, is set to true, which can also be done explicitly using the VerifySeal module. The module uses argument chain to read the content of the blockchain.
  • The VerifyHeaders module is similar to that of VerifyHeader. The difference is that this module verifies a series of block headers using the chain reader as the VerifyHeader module does. The module returns two go channels as return values: the quit channel that serves to abort the operations of the module and the result channel that is used to asynchronously transfer the results of the verification, following the order of the blocks in the module’s argument list.
  • The VerifyUncles module checks the validity of the uncles of the given block. Uncle blocks are blocks that were mined at the same time when the parent of the given block was mined, but have not made it into the blockchain. Those blocks must be valid, as Ethereum protocol stores them and gives some reward to the nodes that mined them. Uncle verification is done in the same way as the verification of other blocks that are part of the blockchain.
  • The VerifySeal module verifies that the crypto seal of the given block is valid according to the rules of the implemented consensus protocol.
  • The Prepare module is used to initialize the consensus fields of the block header according to the rules of the implemented consensus protocol.
  • The Finalize module adds the final values to the block, for example, a reward for finding the block, after the crypto seal value has been added to the block. The result of this module is the block that will be added to the blockchain if the majority of nodes accept it.
  • The Seal module generates a new block for a given input block with the local miner’s crypto seal, which depends on the block itself, placed on top of it. This is the main module of the consensus algorithm, as its core is the process of mining.
  • The CalcDifficulty module returns the difficulty of the next block. This adjustment ensures that the time that passes until the new block is added to the blockchain stays always the same or as close as possible.
  • The APIs module contains RPC API methods that are used by the Pool Manager software to communicate with the client. These methods are used for obtaining mining jobs and sending the newly mined blocks to the client.
  • The Close module stops every background thread of the consensus protocol and ends it.
According to the above description, a modular decomposition of the Geth Ethereum client is proposed in Figure 5.
The workflow of Ethereum’s proof-of-work (PoW) algorithm mining procedure is shown in Figure 6, while the workflow of the verification procedure of the algorithm is shown in Figure 7.
Recall that the basic Ethereum employs the consensus protocol based on PoW, which operates within the set of modules denoted as “Consensus Modules” in Figure 5. The main goal is to make the modified Ethereum client employ an alternative consensus protocol that provides flexibility regarding the resources required to execute the protocol. Consequently, framework architecture of the modified Ethereum is proposed which is displayed in Figure 8: The modified Ethereum is obtained by substitution or modification of certain modules of the traditional Ethereum with those that provide flexibility of resources required for participation in the consensus protocol. The main modifications are performed regarding the following three issues: (i) the puzzle employed instead of PoW; (ii) setting the challenge for the puzzle problem and control of the puzzle solving process; (iii) the verification procedure.
According to the above, Figure 9 shows which of Ethereum’s consensus modules were modified compared to Ethereum’s PoW algorithm modules.

5.1.2. Modified Open Ethereum Mining Pool

As mentioned earlier, the Pool Manager software is based on Open Ethereum Mining Pool, and runs two threads called network communication thread and miner communication thread.
Network communication thread is used for communicating with the Ethereum client, and through it with the blockchain network. During the operation of the pool, this software periodically sends eth_getWork messages to the Ethereum client, requesting a new mining job. Once the valid response that contains the job is received, Pool Manager software first checks if the current mining job is the same as the one that was received. In cases where the pool has no current job, the mining job received from the client becomes the current job and is sent to the miners as per their request. It may happen, however, that the current mining job already exists, which leads to two possible cases. In the first case, the current mining job is the same as the one that was received, which means that the miners are already working on the up-to-date job, so the PM does not need to do anything. In the second case, the received job is different from the current one, which occurs when a new block is mined in the blockchain network. In that case, the Pool Manager software stores the newly received job, which becomes the new current job that will be distributed to the miners.
Miner communication thread is used for distributing mining jobs to the miners, and to perform task that are specific to the proposed consensus protocol. This thread expects messages from the miners, and once it receives them, it reacts appropriately, by creating a new thread for each message that will be processed. This thread expects three different types of messages:
  • eth_getWork—this represents a miner’s request for the current mining job of the mining pool. Once the PM receives this request, he first checks if the particular miner is blacklisted due to malicious behavior. If a miner is blacklisted, the PM will ignore his message and do nothing. Otherwise, the PM will send a response to the miner that contains the current mining job, or a message informing the miner that there is no current job, depending on the situation.
  • tmto_submitValue—this message is used by a miner to send a value that he calculated ( c ( e n c ) ) in order for the PM to search the tables. Once the PM receives this message, he reads the value that was sent and with a certain probability first checks the correctness of the miner’s work. If the work is found to be correct, the PM checks if the received value can be found in the second column of any of the tables. If the value is found, the PM informs the miner by using the F s o l u t i o n flag and requests the nonce value from the miner in order to complete the block and send it to the network.
  • tmto_submitSolution—once a miner receives a request from the PM for the nonce value, he uses this message to send it. Upon receiving the nonce value, the PM uses it to find the puzzle solution in the appropriate table row. Once the solution is found, the block is completed and the PM software sends the block to the Ethereum client, where the validity of the block is once again checked, after which the block is broadcasted to the blockchain network.

5.1.3. Pool Miner Implementation

As mentioned above, the miners use a new mining software implemented using Go programming language. The software runs two parallel threads: communication thread and mining thread.
Communication thread is used to communicate with the PM regarding the mining jobs. This thread sends eth_getWork, which was described earlier, in order to obtain the current mining job. If no job is received, the thread will keep sending this message periodically until a job is received. Once a job is received from the PM, the miner must check if the received job is different from the job that the miner is currently working on. If it is, the miner starts working on the received job and abandons the previous one.
Mining thread is the main thread of the mining software that performs the actual mining work. Once a mining job is received by the miner, this thread first randomly selects a nonce value that is needed for the proposed consensus protocol. Afterwards, the miner starts working on the mining job as described in Table 2. When the miner calculates a new value, he uses the tmto_submitValue message to send the calculated value to the PM for processing. If the sent value is found in one of the tables located at the PM, the miner is notified and must send the nonce value he selected earlier to the PM so that the block can be completed. The miner uses a tmto_submitSolution message to send the nonce value to the PM, which effectively completes the mining process for the current mining job, as the PM will complete the block and broadcast it to the blockchain network.

5.2. Algorithms of Pool Mining

Pool mining is based on the following seven algorithms: Algorithms A1–A7. A summary description of these algorithms is given below, and the pseudo-codes of these algorithms are given in Appendix B. The algorithms are split into two groups: (i) preparation procedure algorithms, Algorithms A1–A3; (ii) mining procedure algorithms, Algorithms A4–A7.
Algorithm  A1. The Pool Manager initializes the time–memory table by initializing needed memory, followed by creation of different random numbers, one for the beginning of every row of the table. Once those numbers are created, subsequent elements of every row are calculated by applying the encoding function on the elements that precede them. Once all of the elements are found, only the first and the last column are stored in the TMTO table.
Algorithm A2. A miner sends a request to join the specific mining pool by selecting and sending dimensions of the table that will be ‘rented’ from the pool manager, along with its credentials and identification.
Algorithm A3. The pool manager first checks if the miner who sent the join request is blacklisted. If he is, he is not allowed to join the pool. Otherwise, the pool manager checks the resources for creation of the TMTO table. If he has enough resources, he initializes a table and appends the miner to the pool’s list of miners.
Algorithm A4. The pool manager initializes a new block that is going to be mined by writing various data to the newly created block. Those data include block number, hash of the block’s parent, hash of block’s uncles, and the block’s gas limit. The pool manager also selects and executes transactions from the transaction pool that will become part of the new block.
Algorithm A5. During the mining process, every miner first obtains the block for mining from the pool manager. Afterwards, the miner randomly selects a nonce value, writes it to the block, obtains the block’s hash value, and applies the P r e f i x l function to that hash value. The received value represents the starting point for consecutive application of the E n c p function. Every new value is obtained by applying this function to the previously obtained value, starting with the result of the P r e f i x l function. Once the miner finds a new value, he sends it to the pool manager, who in return checks his TMTO tables for the value. Based on the manager’s response, the miner may abort the mining of the block (response is F A ), the miner may receive a share as his work was verified (response is F s h a r e ), and the miner may need to send a nonce value to the manager because the value he sent to the pool manager is the one needed to mine the block.
Algorithm A6. The pool manager receives a value from a miner and needs to check if that value is contained in one of his tables. First, however, he checks if the mining work on the current block should continue, as some other miners could have already found the block. If they did, current mining work must be discarded, and the pool manager informs the miner. Otherwise, the pool manager looks for the received value in his tables. If the value is found, the manager stores it to the location where the value was found and informs the miner that he found the solution and that he needs to send his nonce value to the manager. The pool manager may also check the correctness of the miner’s work with a certain probability. If the work is correct, the miner receives a share. If no value was found, the manager informs the miner to continue mining.
Algorithm A7. The pool manager receives the nonce from the miner that is needed to complete the block. The manager firsts finds the location that he stored when he located the value that was sent by the miner previously. The manager now has the required nonce and the location of the value, so he can reconstruct the mining solution by a number of consecutive applications on the encoding function. When the miner finds the solution, he completes the block and publishes it.
The above algorithms show the main procedures of the consensus protocol that is based on two different types of resources and at the same time provides: (i) increased resistance against certain attacks as a consequence of suitable separation of the resources (required for the consensus protocol execution) between the miners and PM; (ii) reduction in the total pool energy required for performing the consensus protocol at the expense of the involvement of certain memory resources. An experimental evaluation of the proposed pool mining approach is given in the next section and it shows the feasibility of the approach. In the considered setting, the PM creates a block that will be the subject of pool miners’ validation attempts and includes the validated block in the blockchain, employing the same approach as in traditional blockchain platforms like Ethereum.

5.3. Experimental Evaluation of Implemented Pool Mining

The experiments were conducted on a platform with an Ubuntu 20.04 operating system that has an Intel Core i7-10750H CPU @2.60 GHz with 12 cores. The goal of the experiment was to show that a malicious miner, who is also a member of the mining pool, will not be able to secretly mine a new block by having a table that he created in local memory and then publish it independently from the pool itself when it is suitable for him. For illustrative purposes, as encryption in the consensus puzzle, a well-known DES (Data Encryption Standard) block cipher is employed. The implemented consensus puzzle is displayed in Figure 10. Note that the DES has been employed only as a toy example for the puzzle problem that could be considered, because it was the subject of a time–memory trade-off-based cryptanalysis (see reference [21]). A number of other encryption techniques for which we believe that the time–memory trade-off, or the time–memory-data trade-off are the most efficient attacking approaches can be considered instead of DES. Additionally, we point out that the coding-based encryption schemes discussed in [22,23,24] could be considered as appropriate encryption schemes for the puzzle.
The following conditions were set for execution of the experiments. A private Ethereum network was deployed to measure times needed for mining new blocks. The network ran with only one mining entity active at the same time, which was either the mining pool or the malicious miner. The height of the mining pool table was 11,400,850,688, and its memory size was 17 GiB. The table that the malicious miner kept in secret was the 1 / 17 th part of the pool’s table. Its height was 67,108,864, while its size was 1 GiB. A malicious miner can have his own table that he keeps in secret, which can either be a part of the mining pool’s table, or a new table constructed by the malicious miner. During the experiment, the malicious miner used his own table that he constructed in secret. Another thing worth noting is that both the mining pool and the malicious user used the same computing power during mining, which represents the worst-case scenario for the mining pool and the best-case scenario for the malicious miner. However, in reality, this case is highly unlikely to occur, as the members of the mining pool will almost certainly have more cumulative computing power than one single member of the pool. Even if the malicious miner withholds his computing power and does not use it for regular mining in the pool, he just reduces the chance that the pool mines a new block, which in turn reduces the revenue that the pool’s members (including the malicious miner) receive. The difficulty parameter of the mining protocol had the same value throughout the experiment, which ensured that the results received for the mining pool and malicious miner were comparable. Both the mining pool and the malicious miner had the same amount of time (56 h) for mining.
Table 4 shows the experimental results for the mining pool obtained after 56 h of mining. During that time, the mining pool mined 509 new blocks, with the average time needed to find a new block being approximately 393 s. However, the median of times needed for mining a new block was significantly shorter, approximately 290 s, as there were few blocks that required much more time for mining. This can be easily seen from Figure 11, which shows the distribution of blocks per time needed to mine them.
The histogram shows that more than half of the mined blocks (264 blocks) were mined for 5 min or less, whereas only 48 blocks required more than 15 min to be mined, from which 24 needed more than 20 min.
Table 5 shows the experimental results for the malicious miner obtained after 56 h of mining with the same computing power as the whole mining pool. The first result that is drastically different is the number of blocks mined by the malicious miner, which is only 27. The rest of the results show that the minimum mining time spent finding a block was approximately 168 s, while the average time was approximately 5355 s (close to 1.5 h). It is clear that the malicious miner needed much more mining time to create new blocks than the mining pool. Figure 12 shows the distribution of blocks per time needed to mine them.
Overall, the results clearly show that even if the malicious miner had the same computing power as the whole mining pool, he would still mine drastically fewer nodes in the same time. Moreover, the maximum mining time for a block by the mining pool is much shorter than the average mining time for a block by the malicious miner. This means that it would be practically impossible for the malicious miner to find a new block and keep it for himself to publish when he finds it suitable.

6. Conclusions

This paper proposed a pool mining approach that provides (i) high resistance against block-withholding attacks and selfish mining; (ii) reduction in the energy required by the system in comparison with PoW-based systems, at the expense of employment certain memory. A novel paradigm for the organization of pool mining was shown based on the consensus protocol, which has a two-dimensional nature concerning the resources required for the puzzle solving: The puzzle solving requires employment of energy and space resources. This two-dimensional nature enables splitting of the resources required between the miners and the pool manager so that energy spending is at the side of the miners and the pool manager provides required memory resources. Consequently, assuming appropriate selection of the puzzle hardness, the probability that the miners could solve the puzzle without the support of the pool manager can be arbitrarily small. This directly implies that the proposed approach provides high resistance against block-withholding attack and selfish mining because they are almost not feasible. Nevertheless, because the puzzle solving is based on a trade-off between required energy and space, energy spending at the miners side is heavily reduced in comparison with the requirement of employment traditional PoW-based consensus protocols. An implementation framework is shown based on employment of a modified Ethereum platform where the PoW consensus protocol is replaced with one instance of the consensus protocol reported in [7]. The given experimental results show the feasibility of the proposal and illustrate the performances. Presenting the performance comparison of the proposed pool mining approach with the previously reported ones in detail is an issue of the planned future work.

Author Contributions

Conceptualization, M.J.M.; methodology, M.J.M.; software, M.T.; validation, M.J.M., L.W. and S.X.; formal analysis, M.J.M.; writing—original draft preparation, M.J.M., M.T.; writing—review and editing, M.J.M., L.W. and S.X.; supervision, L.W. and S.X.; project administration, L.W. and S.X.; funding acquisition, L.W. and S.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Shandong Provincial Key Research and Development Program (2020CXGC010107, 2019JZZY020129), the Science, Education and Industry Integration Innovation Program of Qilu University of Technology (Shandong Academy of Science) (2020KJC-GH11).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. The Puzzle and Its Solving Technique

As the first step, the puzzle for the consensus protocol proposed in [7] requires construction of a challenge that should be solved. Specification of the challenge is based on the following two steps: The first step requires finding a nonce such that after being added to the binary representation of the block, it provides that hash of the block with the nonce begins with a certain number of zeros. The second step consists of taking a certain number of bits from the hash vector, and these decimated bits form the challenge binary vector.
The first step could be considered a mini PoW and could employ the same hash function as employed in Bitcoin and Ethereum consensus protocols. The bits selected in the second step could be from arbitrary positions of the hash vector, and as a particular instantiation they could be a suffix of hash values. The approach employed for construction of the challenge for the puzzle, which should be solved are shown in Figure A1 and displays the following: (i) A number of the transactions and a nonce are organized as a binary vector; (ii) This vector is input to the hash function; (iii) The obtained hash value is subject to decimation, which yields the challenge for the inversion.
Figure A1. Paradigm of the challenge construction for the puzzle problem [7].
Figure A1. Paradigm of the challenge construction for the puzzle problem [7].
Symmetry 14 01711 g0a1
The puzzle problem is to find an inversion for the given challenge assuming the following: (a) The challenge is considered as a ciphertext generated by certain encryption algorithm when the message for encryption is the all-ones vector (but in a general case it can be any other given message); (b) The puzzle problem is to find a key which maps the message into a ciphertext. Figure A2 illustrates the puzzle paradigm.
Figure A2. Paradigm of the puzzle [7].
Figure A2. Paradigm of the puzzle [7].
Symmetry 14 01711 g0a2
The method for solving the puzzle is a general one for inversion based on joint employment of a memory and restricted exhaustive search. It is a dedicated so-called time–memory-data trade-off (TMD-TO) approach that belongs to a family of generic cryptanalytic approaches for cryptanalysis of certain encryption schemes, and it is also a generic technique for inversion of certain one-way functions that can be easily evaluated in the forward direction but is hard for inversion. The proposed approach originates from the TM-TO technique reported in [21]. The TM/TMD-TO-based inversion technique consists of two phases. The first phase is the preparation (preprocessing) phase and second phase is the processing phase. The first phase should be performed only once and consists of initialization of a certain memory. This memory employed consists of suitably initialized tables/tables that are constructed only once in advance and later used for all inversions of the considered one-way function. In the processing phase, the inversion is performed employing a restricted exhaustive search and the constructed tables.
Preprocessing. The tables constructed in the preprocessing phase have the following structure: Each table contains just two columns. Each element of the first column element is randomly selected, and the second column row element is evaluated through a number of recursive recalculations that begins with the first row element as follows:
x i , j + 1 = f ( x i , j ) , j = 0 , 1 , t 1 , i = 1 , 2 , , m ,
where x i , j is a binary vector, and f ( · ) is a function under inversion processing, and t and m are the parameters. In each row of the constructed two-column table, the first column element is x i , 0 , and the second is x i , t , i = 1 , 2 , , m . The recalculation process, which generates a table, is displayed in Figure A3, which also illustrates the time–memory trade-off framework for the inversion.
Figure A3. Time–memory trade-off framework for the inversion [7].
Figure A3. Time–memory trade-off framework for the inversion [7].
Symmetry 14 01711 g0a3
Processing. The processing phase yields a solution for the given inversion problem. Informally, the goal is to find an argument x i , j such that y = f ( x i , j ) where y is a given image. The inversion is based on a number of iterative recalculations and checks. After each recalculation, a search is performed over the second column of the table constructed in the preprocessing phase. The iterative recalculation follows the same approach as that employed for the generation of the table. Assuming that, after certain recalculation, the result is equal to the element in the i-th row of the second column, we finalize the inversion as follows: Take the i-th row element of the first column and perform the iterative recalculations until we obtain the result which corresponds to the given y - the inversion result is the argument x i , j which has generated y.
The method for solving the puzzle problem, i.e., the inversion problem is illustrated in Figure A4.
Figure A4. Illustration of the inversion approach.
Figure A4. Illustration of the inversion approach.
Symmetry 14 01711 g0a4

Appendix B. The Pseudo-Codes of Pool Mining

This section yields the pseudo codes of the main pool mining algorithms organized into two groups: (i) Preparation procedures; (ii) Mining procedures.
The preparation procedures are displayed in the following Algorithms A1–A3. Algorithm A1 is the procedure of Pool Manager’s initialization of a table to be employed for finding the puzzle solution. Algorithm A2 provides miner’s claims regarding joining the pool. Algorithm A3 performs acceptance of miners by the pool manager.
Algorithm A1 Procedure of Pool Manager’s initialization of a table.
  • Input
  •      w i d t h and h e i g h t of table
  • Output
  •     TMTO table
  • proceduretableInit( w i d t h , h e i g h t )
  •      t a b l e a l l o c a t e M e m o r y ( )
  •      i 0
  •     while  i < h e i g h t  do
  •          n e x t c r e a t e D i f f e r e n t R a n d o m ( h e i g h t )
  •          j 0
  •         while  j < w i d t h  do
  •            if  j = 0  then
  •                 t a b l e ( i , 0 ) = n e x t
  •            end if
  •            if  j = w i d t h 1  then
  •                 t a b l e ( i , 1 ) = n e x t
  •            end if
  •             n e x t E n c p ( n e x t )
  •             j j + 1
  •         end while
  •          i i + 1
  •     end while
  •     return  t a b l e
  • end procedure
Algorithm A2 Miner’s joining the pool.
  • Input
  •     Specific m i n i n g P o o l that miner wants to join
  • procedurejoinPool( m i n i n g P o o l )
  •      w , h g e t T a b l e D i m e n s i o n s ( q i )                   ▹ get table dimension to rent from PM
  •      r e q u e s t J o i n ( w , h , m i n i n g P o o l )
  • end procedure
Algorithm A3 Acceptance of miners by the pool manager.
  • Input
  •     Miner’s c r e d e n t i a l s and i d
  • Output
  •     Join status
  • procedureacceptMiner( c r e d e n t i a l s , i d )
  •     if  i d is blacklisted then
  •         return  I n v a l i d
  •     else
  •          s t a t u s c h e c k R e s o u r c e s ( w i d t h , h e i g h t )         ▹ pool manager checks if he can                                                                                                       create table for the requested                                                                                                       size.
  •         if  s t a t u s = f a l s e  then
  •            return “Not enough resources"
  •         end if
  •          a p p e n d ( V , m i n e r )
  •          m i d = t a b l e I n i t ( w i d t h , h e i g h t )
  •         return  O K
  •     end if
  • end procedure
The processing phases, i.e., the mining from creation a block to be mined to creation a block for inclusion into the blockchain is specified by the following Algorithms A4–A7. Algorithm A4 provides generation of a block by Pool Manager that is to be used for the mining. Algorithm A5 provides mining procedure of a pool member. Algorithm A6 yields Pool Manager searches a table for the solution of the puzzle. Algorithm A7 shows how the Pool Manager receives the nonce value from the miner who found the solution candidate and generates a block for inclusion into the blockchain.
Algorithm A4 Generation of a block by Pool Manager.
  • Input
  •      c h a i n , transaction pool t p and g a s L i m i t
  • Output
  •      b l o c k that will be mined
  • procedurecreateBlockForMining( c h a i n , t p , g a s L i m i t )
  •      b l o c k i n i t B l o c k ( )
  •      b l o c k . t i m e s t a m p t i m e ( )
  •      b l o c k . n u m b e r l e n ( c h a i n )
  •      b l o c k . p a r e n t H a s h h a s h ( last block in c h a i n ) )
  •      b l o c k . u n c l e s H a s h s e t U n c l e s H a s h ( )
  •      b l o c k . g a s L i m i t g a s L i m i t
  •      b l o c k . t r a n s a c t i o n s s e l e c t T r a n s a c t i o n s ( t p , g a s L i m i t )
  •      b l o c k . t r a n s a c t i o n s R o o t h a s h ( r o o t ( b l o c k . t r a n s a c t i o n s ) )
  •      b l o c k . s t a t e e x e c u t e ( b l o c k . t r a n s a c t i o n s )
  •      b l o c k . s t a t e R o o t h a s h ( r o o t ( b l o c k . s t a t e ) )
  •     return  b l o c k
  • end procedure
Algorithm A5 Mining procedure of a pool member.
  • Input
  •     block b, obtained from the Pool Manager, parameters of the puzzle , ,
  •     parameter t for solving the puzzle
  • proceduremine(b, , , t)
  •     while true do
  •         obtain mining job
  •          n r a n d o m N o n c e ( )
  •          c P r e f i x ( h ( [ b | | n ] ) )
  •          c ( 0 ) c
  •          i 1
  •         while  i t  do
  •             c ( i ) E c ( i 1 ) ( 1 )
  •             c ( e n c ) E n c p ( c ( i ) )
  •            Ask Pool Manager to check his table:
  •             f l a g q u e r y P o o l M a n a g e r ( c ( e n c ) , m i n e r I d , i , , , t )
  •            if  f l a g = F A  then
  •                break
  •            else if  f l a g = F s h a r e  then
  •                Miner’s work is verified. Share is granted.
  •            else if  f l a g = F s o l u t i o n  then
  •                 s e n d N o n c e T o P o o l M a n a g e r ( E n c p ( n ) )
  •                break
  •            end if
  •            Flag is F 0 so mining is continued
  •             i i + 1
  •         end while
  •     end while
  • end procedure
Algorithm A6 Pool Manager searches a table for the solution of the puzzle.
  • Input
  •     received v a l u e , miner i d , mining s t e p , parameters of the puzzle , ,
  •     parameter t for solving the puzzle
  • Output
  •     Mining flag
  • procedurequeryPoolManager( v a l u e , i d , s t e p , , , t)
  •     if  s t o p M i n i n g ( ) then               ▹ Stop mining if a new block was found by others
  •         return  F A
  •     end if
  •      c ( i ) E n c s 1 ( v a l u e )
  •      r o w N u l l
  •      r o w s e a r c h T a b l e ( c ( i ) , m k )
  •     if  r o w N u l l  then
  •          s t o r e R o w ( r o w , i d )                ▹ store row for completing the block when the nonce                                                                arrives
  •         return  F s o l u t i o n
  •     end if
  •      p r o b r a n d ( 0 , 1 )
  •     if  s t e p > 1 p r o b < Δ / t  then
  •         if  c ( i ) = E c ( i 1 ) ( 1 ) then                              ▹ check correctness of Miner’s work
  •             j i d j i d + 1
  •         end if
  •         if  j i d > = s t e p = t  then
  •             j i d = 0
  •            return  F s h a r e
  •         end if
  •     end if
  •     return  F 0                                                                                           ▹ Continue mining
  • end procedure
Algorithm A7 Generates of a block for inclusion into the blockchain.
  • Input
  •     received v a l u e , miner i d
  • Output
  •     Mining flag
  • procedurereceiveValueFromMiner( v a l u e , i d )
  •      n o n c e E n c s 1 ( v a l u e )
  •      x r e s t o r e R o w ( i d )
  •     while  do x c
  •          x p r e v x
  •          x E x ( 1 )
  •     end while
  •      s o l u t i o n = x p r e v
  •      c o m p l e t e B l o c k = ( b | | n o n c e | | s o l u t i o n )
  •      p u b l i s h B l o c k ( c o m p l e t e B l o c k )
  •     return  F s h a r e
  • end procedure
The above pseudo-codes show employment of the consensus protocol that is based on two different types of resources and at the same time provides: (i) increased resistance against certain attacks as a consequence of suitable separation of the resources (required for the consensus protocol execution) between the miners and PM; (ii) reduction in the total pool energy required for performing the consensus protocol at expense of involvement certain memory resources. An experimental evaluation of the proposed pool mining approach is given in the next section and it shows feasibility of the approach. In the setting, PM creates a block that will be subject of pool miners validation attempts and includes the validated block into the blockchain employing the same approach as in traditional blockchain platforms like Etheurem.

References

  1. Verma, S.; Yadov, D.; Chandra, G. Introduction of Formal Methods in Blockchain Consensus Mechanism and Its Associated Protocols. IEEE Access 2022, 10, 6661–66624. [Google Scholar] [CrossRef]
  2. Oyinloye, D.P.; Teh, J.S.; Jamil, N.; Alawida, M. Blockchain Consensus: An Overview of Alternative Protocols. Symmetry 2021, 13, 1363. [Google Scholar] [CrossRef]
  3. Lepore, C.; Ceria, M.; Visconti, A.; Rao, U.P.; Shah, K.A.; Zanolini, L. A Survey on Blockchain Consensus with a Performance Comparison of PoW, PoS and Pure PoS. Mathematics 2020, 8, 1782. [Google Scholar] [CrossRef]
  4. Kemmoe, V.Y.; Stone, W.; Kim, J.; Kim, D.; Son, J. Recent Advances in Smart Contracts: A Technical Overview and State of the Art. IEEE Access 2020, 8, 117782–117801. [Google Scholar] [CrossRef]
  5. Sunny, F.A.; Hajek, P.; Munk, M.; Abedin, M.Z.; Satu, M.D.S.; Efat, M.D.I.A.; Islam, M.D.J. A Systematic Review of Blockchain Applications. IEEE Access 2022, 10, 59155–59177. [Google Scholar] [CrossRef]
  6. Tang, C.; Li, C.; Yu, X.; Zheng, Z.; Chen, Z. Cooperative Mining in Blockchain Networks With Zero-Determinant Strategies. IEEE Trans. Cybern. 2020, 50, 4544–4549. [Google Scholar] [CrossRef] [PubMed]
  7. Mihaljevic, M.J. A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off. IEEE Access 2020, 8, 141258–141268. [Google Scholar] [CrossRef]
  8. Rosenfeld, M. Analysis of bitcoin pooled mining reward systems. arXiv 2011, arXiv:1112.4980. [Google Scholar]
  9. Li, W.; Cao, M.; Wang, Y.; Tang, C.; Lin, F. Mining Pool Game Model and Nash Equilibrium Analysis for PoW-Based Blockchain Networks. IEEE Access 2020, 8, 101049–101060. [Google Scholar] [CrossRef]
  10. Tang, C.; Wu, L.; Wen, G.; Zheng, Z. Incentivizing Honest Mining in Blockchain Networks: A Reputation Approach. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 117–121. [Google Scholar] [CrossRef]
  11. Yu, J.; Kozhaya, D.; Decouchant, J.; Esteves-Verissimo, P. RepuCoin: Your Reputation is Your Power. IEEE Trans. Comput. 2019, 68, 1225–1237. [Google Scholar] [CrossRef]
  12. Chen, Z.; Sun, X.; Shan, X.; Zhang, J. Decentralized Mining Pool Games in Blockchain. In Proceedings of the 2020 IEEE International Conference on Knowledge Graph (ICKG), Nanjing, China, 9–11 August 2020; pp. 426–432. [Google Scholar]
  13. Qin, R.; Yuan, Y.; Wang, F.-Y. Optimal Block Withholding Strategies for Blockchain Mining Pools. IEEE Trans. Comput. Soc. Syst. 2020, 7, 709–717. [Google Scholar] [CrossRef]
  14. Chen, Y.; Chen, H.; Han, M.; Liu, B.; Chen, Q.; Ren, T. A Novel Computing Power Allocation Algorithm for Blockchain System in Multiple Mining Pools Under Withholding Attack. IEEE Access 2020, 8, 155630–155644. [Google Scholar] [CrossRef]
  15. Fujita, K.; Zhang, Y.; Sasabe, M.; Kasahara, S. Mining Pool Selection under Block WithHolding Attack. Appl. Sci. 2021, 11, 1617. [Google Scholar] [CrossRef]
  16. Yu, L.; Yu, J.; Zolotavkin, Y. Game Theoretic Analysis of Reputation Approach on Block Withholding Attack. In Proceedings of the International Conference on Network and System Security, NSS 2020, Melbourne, VIC, Australia, 25–27 November 2020; pp. 149–166. [Google Scholar]
  17. Dong, X.; Wu, F.; Faree, A.; Guo, D.; Shen, Y.; Ma, J. Selfholding: A combined attack model using selfish mining with block-withholding attack. Comput. Secur. 2019, 87, 101584. [Google Scholar] [CrossRef]
  18. Kang, H.; Chang, X.; Yang, R.; Misic, J.; Misic, V.B. Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks with Extended Forks. IEEE Trans. Netw. Serv. Manag. 2021, 18, 3079–3091. [Google Scholar] [CrossRef]
  19. Ethereum Go Implementation—Geth. Available online: https://github.com/ethereum/go-ethereum (accessed on 7 July 2022).
  20. Open Ethereum Mining Pool. Available online: https://github.com/sammy007/open-ethereum-pool (accessed on 7 July 2022).
  21. Hellman, M.E. A Cryptanalytic Time-Memory Trade-Off. IEEE Trans. Inf. Theory 1980, IT-26, 401–406. [Google Scholar] [CrossRef]
  22. Oggier, F.; Mihaljević, M.J. An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes. IEEE Trans. Inf. Forensics Secur. 2014, 9, 158–168. [Google Scholar] [CrossRef]
  23. Mihaljevic, M.J.; Oggier, F. Security Evaluation and Design Elements for a Class of Randomized Encryptions. IET Inf. Secur. 2019, 13, 36–47. [Google Scholar] [CrossRef]
  24. Mihaljevic, M.J. A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security. Entropy 2019, 21, 11. [Google Scholar] [CrossRef]
Figure 1. Separation of the resources for puzzle solving: Time–memory trade-off framework for the inversion in the pool mining scenario.
Figure 1. Separation of the resources for puzzle solving: Time–memory trade-off framework for the inversion in the pool mining scenario.
Symmetry 14 01711 g001
Figure 2. Architecture of the proposed pool mining.
Figure 2. Architecture of the proposed pool mining.
Symmetry 14 01711 g002
Figure 3. Interaction of a miner and pool manager during the puzzle-solving process.
Figure 3. Interaction of a miner and pool manager during the puzzle-solving process.
Symmetry 14 01711 g003
Figure 4. Architecture of the implemented mining pool.
Figure 4. Architecture of the implemented mining pool.
Symmetry 14 01711 g004
Figure 5. Ethereum’s modules.
Figure 5. Ethereum’s modules.
Symmetry 14 01711 g005
Figure 6. Block-mining procedure in Ethereum’s proof-of-work algorithm.
Figure 6. Block-mining procedure in Ethereum’s proof-of-work algorithm.
Symmetry 14 01711 g006
Figure 7. Block-verification procedure.
Figure 7. Block-verification procedure.
Symmetry 14 01711 g007
Figure 8. Framework of a modified Ethereum.
Figure 8. Framework of a modified Ethereum.
Symmetry 14 01711 g008
Figure 9. Modification of Ethereum’s consensus modules.
Figure 9. Modification of Ethereum’s consensus modules.
Symmetry 14 01711 g009
Figure 10. The consensus puzzle implemented in modified Ethereum.
Figure 10. The consensus puzzle implemented in modified Ethereum.
Symmetry 14 01711 g010
Figure 11. Distribution of the mined blocks per time (in seconds) for the mining pool.
Figure 11. Distribution of the mined blocks per time (in seconds) for the mining pool.
Symmetry 14 01711 g011
Figure 12. Distribution of the mined blocks per time (in seconds) for the malicious node.
Figure 12. Distribution of the mined blocks per time (in seconds) for the malicious node.
Symmetry 14 01711 g012
Table 1. Table of frequently used notation.
Table 1. Table of frequently used notation.
NotationDefinition
V = { v 1 , v 2 , , v N } pool of N miners
V D sub-pool of dishonest miners
q i computing rate (power) of miner v i , i = 1 , 2 , , N
PMPool Manager
m i i-th two-column table at PM, i = 1 , 2 , , N
| m i | number of rows in i-th table, i = 1 , 2 , , N
t i parameter of the puzzle-solving problem (time–memory trade-off parameter)
b binary vector equivalent of the basic block of transactions
n binary vector of the nonce
p public key of PM
s secret key of PM
E ( · ) ( · ) encryption employed in the puzzle
δ computing (energy) cost of encryption employed in the puzzle
E n c ( · ) ( · ) encryption employed by PM
parameter of encryption
t , parameter regarding the puzzle problem
Δ expected time slot for verification of a block
F s h a r e flag from PM that a share solution has been detected
F s o l u t i o n flag from PM that a solution of the puzzle has been detected
F A flag from PM that further mining of the considered block should be aborted
Table 2. The mining procedure between a miner and pool manager.
Table 2. The mining procedure between a miner and pool manager.
1.Input: block b, public key p, secret key s, and the parameters t, t , , .
2.Miner: Randomly selects the nonce vector n
3.Miner: Evaluate c = P r e f i x ( h ( [ b | | n ] ) ) and c ( 0 ) = c
4.PM set the counter j = 0 .
do i = 1 , t
5.Miner and PM perform:
        - Miner: c ( i ) = E c ( i 1 ) ( 1 )
        - Miner: c ( e n c ) = E n c p ( c ( i ) )
        - Miner: sends c ( e n c ) to PM for comparison of c ( i ) with the second column elements of the tables
        - PM decrypts E n c s 1 ( c ( e n c ) ) recovering c ( i ) , compares c ( i ) with second column elements in all tables m ( · ) ,
          and sends the flags to Miner as follows:
               - if i > 1 with probability Δ t decide to check check correctness of Miner’s work as follows:
                      - if c ( i ) = E c ( i 1 ) ( 1 ) set j = j + 1 ,
                      - if j and i = t , output the flag F s h a r e and reset j = 0
               - if c ( i ) is equal to an element of the table second column, PM rises the flag F s o l u t i o n requesting
                 Miner to submit n, and Miner submits E n c p ( n ) .
6.If the flag is F s o l u t i o n , PM performs the following:
  • PM decrypts n by E n c s 1 ( E n c p ( n ) ) and evaluate c = P r e f i x ( h ( [ b | | n ] ) ) ;
  • Assuming that the above overlapping in the second column appears in the k * -th row, PM sets x 0 to value of the first element of the k * -th row, and performs iterative re-evaluation x k = E x k 1 ( 1 ) , k = 1 , 2 , , until the reevaluation result is equal to c ;
  • PM recovers the puzzle solution as x k 1 that yields c = E x k 1 ( 1 ) ;
  • Go to the step 9: PM outputs the flags F s h a r e and F A , and Miner aborts further processing of the block b .
7.If another Miner from the pool has submitted the solution go to the step 9: PM outputs flag F A , in order to Miner aborts the processing of the current block b .
end do
8.Go to step 2 & continue.
9.Output: Flags from the set { F s h a r e , F s o l u t i o n , F A } .
Table 3. Comparison of the execution complexities assuming that the the expected probability of success is P and that the complexity of solving the puzzle is determined by N , and M , Δ , are parameters such that M < < N , Δ < < O ( PN / M ) .
Table 3. Comparison of the execution complexities assuming that the the expected probability of success is P and that the complexity of solving the puzzle is determined by N , and M , Δ , are parameters such that M < < N , Δ < < O ( PN / M ) .
Computational ComplexityMemory Required
traditional
PoW O ( N · P ) O ( 1 )
proposed approach O ( N M P ) + Δ O ( M )
Table 4. Experimental results for the mining pool showing experiment parameters, minimum, maximum, average, and median of times, in seconds, needed to mine new blocks.
Table 4. Experimental results for the mining pool showing experiment parameters, minimum, maximum, average, and median of times, in seconds, needed to mine new blocks.
Mining Pool
Table height11,400,850,688
Table width100
Memory size17 GiB
Number of mined blocks509
Minimum mining time0.70919 s
Maximum mining time2435.46075 s
Average mining time393.14522 s
Median of mining times290.51234 s
Table 5. Experimental results for the malicious miner that is part of the mining pool showing experiment parameters, minimum, maximum, average and median of times, in seconds, needed to mine new blocks.
Table 5. Experimental results for the malicious miner that is part of the mining pool showing experiment parameters, minimum, maximum, average and median of times, in seconds, needed to mine new blocks.
Malicious Miner
Table height67,108,864
Table width100
Memory size1 GiB
Number of mined blocks27
Minimum mining time168.55772 s
Maximum mining time31191.216 s
Average mining time5355.43111 s
Median of mining times3175.074 s
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mihaljević, M.J.; Wang, L.; Xu, S.; Todorović, M. An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks. Symmetry 2022, 14, 1711. https://doi.org/10.3390/sym14081711

AMA Style

Mihaljević MJ, Wang L, Xu S, Todorović M. An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks. Symmetry. 2022; 14(8):1711. https://doi.org/10.3390/sym14081711

Chicago/Turabian Style

Mihaljević, Miodrag J., Lianhai Wang, Shujiang Xu, and Milan Todorović. 2022. "An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks" Symmetry 14, no. 8: 1711. https://doi.org/10.3390/sym14081711

APA Style

Mihaljević, M. J., Wang, L., Xu, S., & Todorović, M. (2022). An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks. Symmetry, 14(8), 1711. https://doi.org/10.3390/sym14081711

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop