Score: 0

Selfish Mining in Multi-Attacker Scenarios: An Empirical Evaluation of Nakamoto, Fruitchain, and Strongchain

Published: January 6, 2026 | arXiv ID: 2601.02984v1

By: Martin Perešíni , Tomáš Hladký , Jakub Kubík and more

Potential Business Impact:

Makes online money systems safer from cheaters.

Business Areas:
Blockchain Blockchain and Cryptocurrency

The aim of this work is to enhance blockchain security by deepening the understanding of selfish mining attacks in various consensus protocols, especially the ones that have the potential to mitigate selfish mining. Previous research was mainly focused on a particular protocol with a single selfish miner, while only limited studies have been conducted on two or more attackers. To address this gap, we proposed a stochastic simulation framework that enables analysis of selfish mining with multiple attackers across various consensus protocols. We created the model of Proof-of-Work (PoW) Nakamoto consensus (serving as the baseline) as well as models of two additional consensus protocols designed to mitigate selfish mining: Fruitchain and Strongchain. Using our framework, thresholds reported in the literature were verified, and several novel thresholds were discovered for 2 and more attackers. We made the source code of our framework available, enabling researchers to evaluate any newly added protocol with one or more selfish miners and cross-compare it with already modeled protocols.

Country of Origin
🇨🇿 Czech Republic

Page Count
16 pages

Category
Computer Science:
Cryptography and Security