<p>The definitive guide to the game-theoretic and probabilistic underpinning for Bitcoinβs security model. The book begins with an overview of probability and game theory. Nakamoto Consensus is discussed in both practical and theoretical terms. </p> <p>This volume: </p> <ul> <li>Describes attacks an
Bitcoin: A Game-Theoretic Analysis
β Scribed by Micah Warren
- Publisher
- De Gruyter
- Year
- 2023
- Tongue
- English
- Leaves
- 344
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The definitive guide to the game-theoretic and probabilistic underpinning for Bitcoin's security model. The book begins with an overview of probability and game theory. Nakamoto Consensus is discussed in both practical and theoretical terms.
This volume:
- Describes attacks and exploits with mathematical justifications, including selfish mining.
- Identifies common assumptions such as the Market Fragility Hypothesis, establishing a framework for analyzing incentives to attack.
- Outlines the block reward schedule and economics of ASIC mining.
- Discusses how adoption by institutions would fundamentally change the security model.
- Analyzes incentives for double-spend and sabotage attacks via stock-flow models.
- Overviews coalitional game theory with applications to majority takeover attacks
- Presents Nash bargaining with application to unregulated environments
This book is intended for students or researchers wanting to engage in a serious conversation about the future viability of Bitcoin as a decentralized, censorship-resistant, peer-to-peer electronic cash system.
β¦ Table of Contents
Preface
Acknowledgments
Contents
1 Basic of cryptographic payments
2 Probability spaces
3 Game theory basics
4 Monopolizing pool
5 Basic double-spend game
6 Censorship attacks
7 Economics of mining
8 Selfish mining
9 Strategic mining
10 What discourages strategic mining?
11 Declining block subsidy
12 The Flattening ASIC cost curve
13 Attacks
14 Direct frontal takeovers
15 Nash bargaining
16 Coalitional game theory
17 Stock, flow, and economic considerations
18 Bitcoin as it matures
Bibliography
Index
π SIMILAR VOLUMES
This is a collection of recent novel contributions in game theory from a group of prominent authors in the field. It covers Non-cooperative Games, Equilibrium Analysis, Cooperative Games and Axiomatic Values in static and dynamic contexts.Part 1: Non-cooperative Games and Equilibrium AnalysisIn game
<p>This is a collection of recent novel contributions in game theory from a group of prominent authors in the field. It covers Non-cooperative Games, Equilibrium Analysis, Cooperative Games and Axiomatic Values in static and dynamic contexts.</p><p><strong>Part 1: Non-cooperative Games and Equilibri
<p><P>Political and economic institutions are typically governed by committees that face the challenge to reconcile the preferences of their members. How should decision rules be designed to generate fair and sustainable agreements, for example if committee members represent groups of different size
<p><P>Political and economic institutions are typically governed by committees that face the challenge to reconcile the preferences of their members. How should decision rules be designed to generate fair and sustainable agreements, for example if committee members represent groups of different size
<p><P><EM>Game Theoretic Risk Analysis of Security Threats</EM> introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models will be developed for identifying optimal and/or equilibrium defense and attack strategies in systems of var