TY - GEN
T1 - Analysis of variance of graph-clique mining for scalable proof of work
AU - Anada, Hiroaki
AU - Matsushima, Tomohiro
AU - Su, Chunhua
AU - Meng, Weizhi
AU - Kawamoto, Junpei
AU - Bag, Samiran
AU - Sakurai, Kouichi
N1 - Funding Information:
Acknowledgement. In the first stage of this research, Hiroaki Anada, Junpei Kawamoto and Kouichi Sakurai were supported by JSPS Kiban(B) JP15H02711. Hiroaki Anada, Chunhua Su and Kouichi Sakurai are supported by JSPS Kiban(B) JP18H03240. Chunhua Su is also supported by JSPS Kiban(C) JP18K11298. Samiran Bag is supported by the ERC starting grant, no. 306994. The authors would like to thank all anonymous reviewers for their insightful comments and suggestions.
Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - Recently, Bitcoin is becoming one of the most popular decentralized cryptographic currency technologies, and Bitcoin mining is a process of adding transaction records to Bitcoin’s public ledger of past transactions or blockchain. To obtain a bitcoin, the mining process involves compiling recent transactions into blocks and trying to solve a computationally difficult puzzle, e.g., proof of work puzzle. A proof of work allows miners the ability to quantify how much work a given proof contains. Basically, the required time for mining is decided in advance, but problems will occur if the value is large for dispersion. In this paper, we first accept that the required time between consecutive blocks follows the exponential distribution. That is, the variance is stable as long as the expected time is fixed. Then, we focus on the graph clique mining technique proposed by the literature, like Tromp (BITCOIN 2015) and Bag-Ruj-Sakurai (Inscrypt 2015), which is based on a computational difficulty problem of searching cliques of undirected graphs, where a clique is a subset of vertices. In particular, when the clique size is two, graph clique mining can be used to gain Bitcoins. The previous work also claimed that if the clique size is parameterized and increased, even if the expected time is fixed, the variance would not be stable. However, no qualitative or quantitative results were given to support their claim. Motivated by this issue, in this work, we propose a simple search algorithm for graph cliques mining, and perform a small scale evaluation on Bitcoin and Graph cliques’s solo mining to investigate the variance issue.
AB - Recently, Bitcoin is becoming one of the most popular decentralized cryptographic currency technologies, and Bitcoin mining is a process of adding transaction records to Bitcoin’s public ledger of past transactions or blockchain. To obtain a bitcoin, the mining process involves compiling recent transactions into blocks and trying to solve a computationally difficult puzzle, e.g., proof of work puzzle. A proof of work allows miners the ability to quantify how much work a given proof contains. Basically, the required time for mining is decided in advance, but problems will occur if the value is large for dispersion. In this paper, we first accept that the required time between consecutive blocks follows the exponential distribution. That is, the variance is stable as long as the expected time is fixed. Then, we focus on the graph clique mining technique proposed by the literature, like Tromp (BITCOIN 2015) and Bag-Ruj-Sakurai (Inscrypt 2015), which is based on a computational difficulty problem of searching cliques of undirected graphs, where a clique is a subset of vertices. In particular, when the clique size is two, graph clique mining can be used to gain Bitcoins. The previous work also claimed that if the clique size is parameterized and increased, even if the expected time is fixed, the variance would not be stable. However, no qualitative or quantitative results were given to support their claim. Motivated by this issue, in this work, we propose a simple search algorithm for graph cliques mining, and perform a small scale evaluation on Bitcoin and Graph cliques’s solo mining to investigate the variance issue.
UR - http://www.scopus.com/inward/record.url?scp=85064121196&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85064121196&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-14234-6_6
DO - 10.1007/978-3-030-14234-6_6
M3 - Conference contribution
AN - SCOPUS:85064121196
SN - 9783030142339
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 101
EP - 114
BT - Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers
A2 - Yung, Moti
A2 - Huang, Xinyi
A2 - Guo, Fuchun
PB - Springer Verlag
T2 - 14th International Conference on Information Security and Cryptology, Inscrypt 2018
Y2 - 14 December 2018 through 17 December 2018
ER -