Submitted:
28 March 2025
Posted:
31 March 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
- represents the set of players (miners, pools, users).
- is the strategy set of player i, where .
- is the utility function of player i, which they seek to maximize.
Non-Cooperative Game for Selfish Mining
- Players: (miners).
- Strategies: for each miner i.
- Utility Function:
Extensive-Form Game for Fork Chain Selection
- State Space: (current blockchain state).
- Action Space: (choose chain 1 or chain 2).
- Transition Probability: governs state evolution.
Stackelberg Game for Transaction Fee Optimization
- Leader (User): Sets transaction fee x.
- Follower (Miner): Allocates mining power y.
Stochastic Game for Majority Attack Prevention
- State Space: (blockchain state).
- Action Space: (honest mining or attack).
- Transition Function:
- Security: Zero-Determinant (ZD) strategies [11] can enforce cooperative mining equilibria, deterring selfish attacks.
- Mining Management: Repeated games and evolutionary dynamics help stabilize pool selection, preventing centralization.
- Consensus: Proof-of-Stake (PoS) protocols use stochastic games to penalize deviations, ensuring honest validation.
- Integrating mean-field games for large-scale miner interactions.
- Designing mechanism-aware blockchains via Bayesian games under incomplete information.
- Expanding Stackelberg frameworks to edge computing and IoT-blockchain ecosystems.
| Algorithm 1 Block Addition |
|
Require: Two blockchains and and a block b Ensure: Append b to the longest blockchain
|
- Definition of Security: This specifies the goals achieved by a cryptographic scheme.
- Assumptions: These are the intractable computational problems (e.g., the difficulty of factoring large numbers or the discrete logarithm problem) upon which the security of the scheme relies.
- Proofs: These demonstrate that the scheme achieves the defined security if the assumptions hold.
2. The Blockchain
2.1. The Cryptographic Building Blocks
- It is computationally efficient.
- It is one-way (its inverse is practically impossible to compute).

- S computes and encrypts it using an asymmetric encryption scheme: ; then S sends to R.
- Upon receipt, R decrypts s using the public key: , and compares d with .
- If d matches , then R is authenticated, since only S possesses the private key required for encryption.
2.2. The Blockchain

- Decentralization: There is no central authority controlling Bitcoin. Unlike traditional monetary systems where an account is managed by a central entity, Bitcoin uses the Unspent Transaction Output (UTXO) model to compute user balances.
- Unforgeability: Illegitimate claims of Bitcoin ownership are prevented through digital signatures.
- Double-Spending Resistance: Bitcoin was the first major digital currency to solve the double-spending problem [5]. Double spending refers to the ability of an owner to spend the same coins more than once. This is prevented by recording each transaction on the public blockchain, which is immutable due to the Proof-of-Work (PoW) mechanism explained below.
- Pseudonymity: Accounts are identified through public keys, providing a degree of anonymity for users.
2.2.1. The Blocks
- An index.
- The hash of the previous block.
- A timestamp indicating the block’s creation time.
- A set of transactions.
2.2.2. The Transactions
- The public key of the sender.
- The public key of the recipient.
- The signature.

2.2.3. Bitcoin Mining
- Transactions are broadcast to all nodes in the network.
- Nodes specialized in mining, called miners, listen to the network and collect broadcast transactions into blocks.
- A miner solves a puzzle (Proof of Work, PoW), as explained below. If successful, other miners confirm the correctness of the solution.
- The block is added to the blockchain, and the miner receives Bitcoin as a reward.
- Increment a Nonce.
- If , then accept the nonce and broadcast the solution for confirmation.
2.3. An Algorithmic Description
2.3.1. Proof of Work
| Algorithm 2 Proof of Work |
|
2.3.2. Transaction Validation
| Algorithm 3 Transaction Validation |
|
2.3.3. Technical Issues
- Storage Requirements: The blockchain requires a significant amount of storage capacity.
- Scalability: The number of transactions per second is much lower than in traditional payment systems.
- Energy Consumption: The PoW mechanism requires significant power consumption, prompting researchers to explore alternative consensus mechanisms.
- Fees: The current implementation of Bitcoin imposes high fees for sending money through the blockchain network compared to traditional payment systems.
3. The Relational Model
3.1. Algebraic Query Language
- Projection : The result is a relation with only the attributes .
- Selection : Let C be a condition on the tuples of R that evaluates to true or false. The result is a relation that contains the same attributes as R but only the tuples satisfying C.
- Cartesian Product : The relation contains the attributes of both R and S. Its tuples are obtained by taking the Cartesian product of the tuples of R and S.
- Natural Join : If R and S share a set of attributes , then consists of the tuples from the Cartesian product of R and S that agree on these attributes.
- Intersection and Union: The intersection () and union () of two relations are obtained by respectively taking the common tuples or the combined set of tuples from R and S.
3.2. Constraints
- Let E be an expression in relational algebra. Then the expression is a constraint, indicating that no tuple satisfies E.
- If E and S are expressions in relational algebra, then means that every tuple in the result of E must also appear in the result of S.
3.3. Referential Integrity Constraints
4. A Schema for the Blockchain
5. AQDL for Blockchain
5.1. Transaction Validation
5.2. Balance
5.3. Double Spending
- .
- .
- and .
- .
5.4. Selfish Mining
- The selfish miner (SM) mines on his private blockchain priBC.
- Honest miners (HM) mine on the public blockchain pubBC.
- SM releases the priBC when .
- The hash power of the HMs is split since the two chains are of the same length.
- SM add a block to the priBC making it longer than the pubBC.
- This result in the validation of the longest chain, discarding the pubBC, SM get rewards for his mined blocks, wast of mining power for HMs.
6. Conclusion
Informed Consent Statement
Conflicts of Interest
Abbreviations
| MDPI | Multidisciplinary Digital Publishing Institute |
| DOAJ | Directory of open access journals |
| TLA | Three letter acronym |
| LD | Linear dichroism |
References
- H. Cohen,G. Frey,R. Avanzi, Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, 2012.
- National Institute of Standards and Technology (NIST), Secure Hash Standard (SHS), 2002, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.
- C. Gonçalves, Cryptographie avancée, courbes elliptiques, Université of Paris-Est, M2-SSI, 2015.
- Milojicic, Dejan S. and Kalogeraki, Vana and Lukose, Rajmohan and Nagaraja, Kiran and Pruyne, Jim and Richard, Bruno and Rollins, Sami and Xu, Zhichenr, Peer-to-Peer Computing, 2002.
- How does a block chain prevent double-spending of Bitcoins?, https://www.investopedia.com/ask/answers/061915/how-does-block-chain-prevent-doublespending-bitcoins.asp, Accessed on June 2, 2022.
- Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, and Yixian Yang, Cryptographic primitives in blockchains. Journal of Network and Computer Applications 2019, 127, 43–58.
- Gervais, A. , Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S., On the Security and Performance of Proof of Work Blockchains, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.
- Katz, J. and Lindell, Y., Introduction to Modern Cryptography, 2nd ed., Chapman & Hall/CRC, 2014.
- Huaqun Guo and Xingjie Yu, A survey on blockchain technology and its security, 2022, Blockchain: Research and Applications.
- Nash, J. , Equilibrium Points in n-Person Games. Proceedings of the National Academy of Sciences 1950, 36, 48–49. [Google Scholar] [CrossRef] [PubMed]
- Eyal, I. and Sirer, E. G., Majority is not Enough: Bitcoin Mining is Vulnerable, in Financial Cryptography and Data Security, 2014.
- Osborne, M. J. and Rubinstein, A., A Course in Game Theory, MIT Press, 1994.
- Ziyao Liu, Nguyen Cong Luong, Wenbo Wang, Dusit Niyato, Ping Wang, Ying-Chang Liang, and Dong In Kim A Survey on Blockchain: A Game Theoretical Perspective. IEEE Access 2019, 7, 47615–47643.
- Jeffrey D. Ullman,Jennifer Widom, A first course in database systems, Prentice-Hall, Inc., 1997.


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).