Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains

  • Wanying Zeng
  • , Lijia Xie*
  • , Xiao Zhang*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nakamoto Consensus (NC), the foundational mechanism of Bitcoin, secures permissionless blockchains through Proof-of-Work (PoW) and the longest-chain rule. Although classical analyses suggest exponentially low success probabilities for attackers with less than 50% hash power, real-world double-spending attacks (DSAs) persist, especially when pre-mining is involved. However, existing models either neglect pre-mining or inadequately capture its trade-offs with post-transaction mining. In this paper, we first develop a pre-mining DSA model with fixed cost constraints, deriving closed-form expressions for success probability and expected revenue. Next, we propose an Adaptive Pre-mining DSA strategy that dynamically optimizes attack timing for profit maximization using Stochastic Dynamic Programming (SDP). Through comprehensive simulations, we evaluate the effectiveness of our attack strategies, demonstrating their superior performance over existing models. Based on transaction values, we propose optimal confirmation block thresholds. These insights contribute to both theoretical and practical security improvements for decentralized system protocols.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2025 - 30th European Symposium on Research in Computer Security, Proceedings
EditorsVincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
PublisherSpringer Science and Business Media Deutschland GmbH
Pages433-451
Number of pages19
ISBN (Print)9783032079008
DOIs
StatePublished - 2026
Event30th European Symposium on Research in Computer Security, ESORICS 2025 - Toulouse, France
Duration: 22 Sep 202524 Sep 2025

Publication series

NameLecture Notes in Computer Science
Volume16056 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference30th European Symposium on Research in Computer Security, ESORICS 2025
Country/TerritoryFrance
CityToulouse
Period22/09/2524/09/25

Keywords

  • Blockchain Security
  • Double-Spending Attack
  • Nakamoto Consensus
  • Pre-Mining Strategy
  • Stochastic Dynamic Programming

Fingerprint

Dive into the research topics of 'Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains'. Together they form a unique fingerprint.

Cite this