by following the default Bitcoin mining protocol [19]. Using simulations, selfish
mining has been shown to be profitable only after a difficulty adjustment period
in Bitcoin for any miner with more than 33% of the global hash power [21,30].
Variants of selfish mining further optimize a miner’s expected revenue [34].
Additionally, miners face the verifier’s dilemma [26,36,7], where upon receiv-
ing a block header they have to decide whether they should wait to have received
and verified the corresponding transactions, or whether they should start mining
right away based on the block header. Different miners might react differently
to this dilemma.
Following previous works, we say that a chain of blocks is public if the honest
miners are able to receive all its content, while we say that a chain is private if
some contents of the chain are kept hidden by the adversary. In this paper, we
show that an adversary can leverage a novel block withholding strategy, which we
call perishing mining, to slow down the public chain in an unprecedented man-
ner. More precisely, perishing mining leads miners that react differently to the
verifier’s dilemma to mine on different forks. We then present the Dual Private
Chain (DPC) attack, which further leverages the verifier’s dilemma to double
spend on Bitcoin. This attack is, to the best of our knowledge, the first attack
where an adversary temporarily sacrifices part of its hash power to later favor
its double spending attack, and the first attack where an adversary simultane-
ously manages two private chains. Intuitively, the first adversarial chain inhibits
the public chain’s growth, so that the second one benefits from more favorable
conditions for a double spending attack.
To evaluate the impact of the distraction chain on the public chain we first
establish the Markov decision process (MDP) of perishing mining. From this
MDP, we obtain the probability for the system to be in each state, and quantify
the impact of perishing mining on the public chain, i.e., its growth rate decrease.
We further describe the DPC attack and its associated MDP. We then evaluate
its expected success rate based on Monte Carlo simulations. Counterintuitively,
our results show that the adversary increases its double spending success rate
by dedicating a fraction of its hash power to slow the public chain down, instead
of attacking it frontally with all its hash power.
Overall, this work makes the following contributions.
•We present perishing mining, a mining strategy that is tailored to slow
down the progress of the public chain by leveraging the verifier’s dilemma. Using
perishing mining an adversary releases the headers of blocks that extend the
public chain so that some honest miners mine on them while some honest miners
keep mining on the public chain, which effectively divides the honest miners hash
power. We present the pseudocode of the perishing mining strategy, establish its
Markov chain model and quantify its impact on the public chain growth.
•Building on perishing mining, we describe the DPC attack that an ad-
versary can employ to double spend by maintaining up to two private chains.
The first chain leverages the perishing mining strategy to slow down the pub-
lic chain’s growth and ease the task of the second chain, which aims at double
2