Profit of a single honest and malicious miner network power based on varying adversarial mining power κ, while λ = 20.

Profit of a single honest and malicious miner network power based on varying adversarial mining power κ, while λ = 20.

Source publication
Preprint
Full-text available
In response to the bottleneck of processing throughput inherent to single chain PoW blockchains, several proposals have substituted a single chain for Directed Acyclic Graphs (DAGs). In this work, we investigate two notable DAG-oriented designs. We focus on PHANTOM (and its optimization GHOSTDAG), which proposes a custom transaction selection strat...

Context in source publication

Context 1
... to supplement our observations, we performed another related experiment, in which we used the topology of one malicious and one honest miner, and we experimented with different adversarial mining power settings. The results are depicted in Fig. 7, and they demonstrate that under such a setting, the malicious miner's relative earned profit (as compared to honest miner) grows proportionally to ...