Home A Hashing Power Allocation Game with and without Risk-free Asset
Article Open Access

A Hashing Power Allocation Game with and without Risk-free Asset

  • Yukun Cheng , Donglei Du and Qiaoming Han EMAIL logo
Published/Copyright: July 27, 2021
Become an author with De Gruyter Brill

Abstract

Miners in various blockchain-backed cryptocurrency networks compete to maintain the validity of the underlying distributed ledgers to earn the bootstrapped cryptocurrencies. With limited hashing power, each miner needs to decide how to allocate their resource to different cryptocurrencies so as to achieve the best overall payoff. Together all the miners form a hashing power allocation game. We consider two settings of the game, depending on whether each miner can allocate their fund to a risk-free asset or not. We show that this game admits unique pure Nash equilibrium in closed-form for both settings.

1 Introduction

With the advancement of the blockchain technologies (a.k.a., distributed ledger technology), distributed applications (DApps) are burgeoning. Starting from the bitcoin, many altcoins have been proposed to achieve different goals. At the time of this writing, there are almost 1,600 cryptocurrencies with market capitalization totaling approximate $456 billion[1], and among them Bitcoin, Ethereum and Ripple are the top three market-caped crypto-currencies.

Miners in these peer-to-peer networks play the important role of maintaining the integrity of the underlying blockchains, incentivized to earn digital currencies and transaction fees. Mining involves executing a distributed consensus protocol on how to achieve agreement of the underlying ledger when there is no central authority in presence. Among them, proof-of-work (PoW)[1] and proof-of-stake (PoS)[2] are the widely adopted consensus protocols by existing crypto-currencies.

For example, in the PoW framework, during a given average time period (e.g., every 10 minutes for Bitcoin), miners participate in a winner-take-all competition to extend the next block on the longest block chain by solving some cryptographic hashing proof-of-work, a mathematical puzzle. As a concrete case, in Bitcoin network, the puzzle goes as follows[3]: Given a difficulty d > 0, a challenge c and a nonce x (usually bit-strings), a function

Fd(c,x){ TRUE , FALSE }

is called a Proof-of-Work (PoW) function if it has the following two properties: (i) Fd(c, x) is fast to compute, given d, c, and x; and (ii) for fixed parameters d and c, finding x such that Fd(c; x) = TRUE is computationally difficult but feasible. The difficulty d is used to adjust the time to find such an x.

With miners equipped with certain computing power (a.k.a., hashing power in Bitcoin network) and a large number of different cryptocurrencies to mine, they are facing the challenge on how to allocate their computing power to compete in mining each cryptocurrency to maximize their expected payoffs. Due to the competitive nature of the mining protocol, all miners together form a non-cooperative allocation game. This work aims to answer the following questions associated with the aforementioned game:

  1. Does Nash Equilibrium (NE) exist?

  2. Is NE unique?

  3. Can the NE be computed efficiently?

We offer affirmative answers to all three questions for our game. We show that the NE allocation is unique and follows a proportional rule (Theorem 1) where each miner allocates his total computing power to a given cryptocurrency proportional to the percentage of the award among all currencies, while his expected revenue is proportional to the percentage of the hashing power possessed and the total award.

The equilibrium analysis of the allocation game is of both theoretical and practical relevance. On the theoretical side, we set up a succinct backbone model which admits a closed-form solution via non-trivial technical analysis. On the practical side, we provide insights which can help mining pool managers or individual miners in making the most important operational/ tactical decisions, namely how to allocate the hashing power when facing under reward and peer competition.

To filter out the most salient factors that are of managerial relevance, we made some simplifications in the modelling, such as the the assumption that the cost to purchase certain hashing power is independent from the price of the currencies. However, this type of deviations from the realism on one hand may be a good approximation to reality and on the other hand is to be expected in an early attempt to apprehend an otherwise complex problem. Also, this work focuses on static games, and leave the discussion of dynamic games to future research.

2 Relevant Literature

Our computing power allocation game is relevant to several areas, including game theory, portfolio management, and market equilibrium models.

Several blockchain games (mainly non-cooperative in nature) are proposed in the recent literature to address and improve upon the limitations of existing distributed consensus mechanism in various crypt-currencies[4, 5, 6, 7, 8], while some other games (mainly non-cooperative in nature) focus on the application layer without invoking any protocol technicality, such as the mining pool games[7, 9, 10, 11, 12]. Our computing power allocation game is non-cooperative and focuses on the application layer; namely the allocation of mining resource. Furthermore, these games all deal with a single currency, which is a major difference from the game investigated in this work. Dimitri[13] studied a special case of our game where there is only one currency available for mining. [14] is a survey on this line of research.

Our computing power allocation game is similar to the extensively-studied general blotto game in the game theory literature[15, 16, 17, 18], but the two models have completely different utility functions to suit different applications in mind.

The resource allocation nature is also relevant to the large literature on portfolio management[19], and the market equilibrium model, in particular the Fisher market[20, 21]. However, the portfolio management literature usually assume that the supply of assets is independent from the allocation decision. And the Fisher market models focus on finding market-clearing prices and the allocation rule at market equilibrium.

The readers are referred to the survey[22] for research perspectives and challenges for Bitcoin and cryptocurrencies.

We describe the the hashing power allocation game in Section 3. We consider games without and with a risk-free asset in Sections 4 and 5, respectively.

3 The Hashing Power Allocation Game

There are n miners N = {1, 2, · · · , n} with computing powers h = (h1, h2, · · · , hn)TR+n(the cost to possess such a computing power, expressed in fiat currency such as US dollar) and there are m cryptocurrencies M = {1, 2, · · · ,m} available for mining. When there is a risk-free asset with return r, we introduce a dummy labeled as currency 0.

Miner i ∈ N allocates xij 0 of his computing power to mine cryptocurrency j ∈ M. Let xi0 be the hashing power allocated to the dummy risk-free asset whose return is known as r for any amount allocated. Evidently, we have

jMxij+xi0=hi,iN.

For each cryptocurrency j ∈ M, the n miners play a winner-take-all game and the winner is rewarded with uncertain reward vector R = (R1,R2, · · · ,Rm)T (expressed in fiat currency such as US dollar) with mean vector E[R] = μT = (μ1, μ2, · · · , μm)T. Miner i ∈ N wins cryptocurrency j ∈ M with probability proportional to its allocated computing power

(1)pij=xijNxj,

and his profit for mining cryptocurrency j ∈ M is given by

πij(x)=Rjxij, w.p. pij,xij, w.p. 1pij.

Moreover the profit obtained with the risk-free asset is given by

πi0=rxi0.

Therefore miner i’s total profit is given by

πi(x)=jMπij(x)+πi0=jMRjpijjMxij+rxi0=jMRjxijNxjhi+(1+r)xi0=RTyi(x)hi+(1+r)xi0,

where x=x1x2xnT=xijn×mR+n×mand

(2)yi(x)=xi1x11++xn1ximx1m++xnm,iN.

The mean profit of miner i is given by

(3)ERπi(x)=μTyi(x)hi+(1+r)xi0.

4 Game without Risk-free Asset

We recall the result without a risk-free asset. When miners allocate all their funds to mining, the NE for the miners game can be obtained by solving the following n optimization problems based on (3): For any given i ∈ N,

(4)maxxiR+mμTyi(x):jMxij=hi.

Theorem 1 (see [23]) Assume that 1mμ1nh.The hashing power game with risk-neutral miners (4) admits the following unique NE

xij=μj1mμhi,iN,jM,

along with each miner i’s expected profit

ERπix=hi1nh1mμhi=hi1mμ1nh1nh,iN.

This result was obtained in our conference proceedings[23]. However the proof therein contains some errors. In this journal version we corrected all errors and include the full proof of Theorem 1 in the appendix.

5 Game with a Risk-free Asset

The main contribution of this work is to include a risk-free asset. When miners have the option to allocate their funds to both mining and the risk-free asset, the NE for the miners game can be obtained by solving the following n optimization problems based on (3): For any given i ∈ N,

(5)maxxiR+mμTyi(x)hi+(1+r)xi0:jMxij+xi0=hi.

Let ¯hi = hi − xi0. This problem is equivalent to the following parametric problem:

(6)max0hihimaxxiR+mμTyi(x)(1+r)h¯i+rhi:jMxij=h¯i.

Using Theorem 1, the last problem is reduced to the following optimization problem

(7)max0h¯ihih¯i1mμ1nh¯(1+r)h¯i.

Theorem 2 Assume that h1≤ h2≤ · · · ≤ hn. The solution to problem (7) is as follows.

  1.  If 1n1h1muj1nh21+r,then ¯hi = hi for i = 1, 2, · · · , n. This case includes all thoseminers who spend their entire cash.

  2.  If n1n21muj<(1+r)h1, then h¯i=h^=n1(1+r)n21muj,i=1,2,,n.This caseincludes all those miners who invest the same amount on the cryptocurrencies and invest the remaining amounts into the bond, earning an interest of r, respectively.

  3. Otherwise, there exists an index 1 ≤ k ≤ n − 1 such that

1+r1muj>1kh+(nk1)hk+11kh+(nk)hk+121k1h+(nk)hk1k1h+(nk+1)hk21+r1muj.

Find hk ˆh < hk+1 such that

1kh+(nk1)h^1kh+(nk)h^2=1+r1muj,

then

h¯i=hi,i=1,2,,kh^,i=k+1,k+2,,n.

In this case, miners are divided into two classes: The first class {1, 2, · · · , k} contain those miners who spend their entire cash; and the second class {k+1, k+2, · · · , n} contains all those miners who invest the same amount on the cryptocurrencies and invest the remaining amounts into the bond, earning an interest of r, respectively.

The hashing power game with a risk-free asset (5) admits the following unique NE

xij=μj1mμh¯i,iN,jM,hih¯i,iN,j=0.

along with each miner i’s expected payoff

ERπix=h¯i1nh¯1mμ(1+r)h¯i+rhi=h¯i1mμ(1+r)1nh¯1nh¯+rhi,iN.

Proof Let fih¯i=h¯i1mμ1nh(1+r)h¯i, then fih¯i=1nh¯h¯i1nh21mμ(1+r).If 1n1h1muj1nh21+r , then fih¯i0 at h¯i=hi for i=1,2,,n,so the solution to (7) is i = hi for i = 1, 2, · · · , n. Otherwise, some or all ¯hih at the solution (7) so that fih¯i0for i = 1, 2, · · · , n. The conclusion is obtained.

We make the following observations based on Theorem 2:

  1. At the NE, the return keeps the same for all miners, that 1mμ1nh(1+r).

  2. At the NE, the marginal profit fih¯i=1nh¯h¯i1nh¯21mμ(1+r)is larger for miner i with smaller h¯i.

  3. Miner i’s expected profit h¯i1nh¯1mμ(1+r)h¯i+rhiincludes two parts. Part rhi is the risk-free return for hi. Part h¯i1nh¯1mμ(1+r)h¯iis the excess return.

  4. The total social welfare is increasing. The rate of increasing is larger than r.

6 Conclusion

Many future research problems are worth pursuing, such as the risk-averse miners and dynamic versions of the game.


The first author’s research is supported by the National Nature Science Foundation of China (11871366), USTS Think Tank for Urban Development, Qin Lan Project for Young Academic Leaders and Qin Lan Project for Key Teachers. The second author’s research is supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) (06446), and NSFC (11771386 and 11728104). The third author’s research is supported by NSFC (11771386 and 11728104)


References

[1] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system, 2008.Search in Google Scholar

[2] Saleh F. Blockchain without waste: Proof-of-stake, 2017.10.2139/ssrn.3183935Search in Google Scholar

[3] Roger W. The Science of the Blockchain. Inverted Forest Publishing, 2016.Search in Google Scholar

[4] Biais B, Bisiere C, Bouvard M, et al. The blockchain folk theorem. The Review of Financial Studies, 2019, 32(5): 1662–1715.10.1093/rfs/hhy095Search in Google Scholar

[5] Carlsten M, Kalodner H, Weinberg S M, et al. On the instability of bitcoin without the block reward. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016: 154–167.10.1145/2976749.2978408Search in Google Scholar

[6] Eyal I, Sirer E G. Majority is not enough: Bitcoin mining is vulnerable. Christin N, Safavi-Naini R. Financial Cryptography and Data Security. Berlin, Heidelberg: Springer, 2014: 436–454.Search in Google Scholar

[7] Göbel J, Keeler H P, Krzesinski A E, et al. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Performance Evaluation, 2016, 104: 23–41.10.1016/j.peva.2016.07.001Search in Google Scholar

[8] Kiayias A, Koutsoupias E, Kyropoulou M, et al. Blockchain mining games. Proceedings of the 2016 ACM Conference on Economics and Computation, 2016: 365–382.10.1145/2940716.2940773Search in Google Scholar

[9] Eyal I. The miner’s dilemma. 2015 IEEE Symposium on Security and Privacy (SP), 2015: 89–103.Search in Google Scholar

[10] Fisch B A, Pass R, Shelat A. Socially optimal mining pools. arXiv preprint arXiv: 1703.03846, 2017.10.1007/978-3-319-71924-5_15Search in Google Scholar

[11] Parham R. The predictable cost of bitcoin. SSRN Electronic Journal, 2017.10.2139/ssrn.3080586Search in Google Scholar

[12] Rosenfeld M. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv: 1112.4980, 2011.Search in Google Scholar

[13] Dimitri N. Bitcoin mining as a contest. Ledger, 2017, 2(1): 31–37.10.5195/ledger.2017.96Search in Google Scholar

[14] Liu Z, Luong N C, Wang W, et al. A survey on applications of game theory in blockchain. arXiv preprint arXiv: 1902.10865, 2019.Search in Google Scholar

[15] Alpern S, Howard J. Winner-take-all games: The strategic optimisation of rank. Operations Research, 2017, 65(5): 1165–1176.10.1287/opre.2017.1635Search in Google Scholar

[16] Hart S. Discrete colonel blotto and general lotto games. Int J Game Theory, 2008, 36: 441–460.10.1007/s00182-007-0099-9Search in Google Scholar

[17] Goldberg L A, Goldberg P W, Krysta P, et al. Ranking games that have competitiveness-based strategies. Theoret. Comput. Sci., 2013, 476: 24–37.10.1145/1807342.1807396Search in Google Scholar

[18] Roberson B. The colonel blotto game. Economic Theory, 2006, 29: 1–24.10.1007/s00199-005-0071-5Search in Google Scholar

[19] Markowitz H. Portfolio selection: Efficient diversification of investments. Cowles Foundation monograph NO. 16. New York: John Wiley & Sons, Inc, 1959.Search in Google Scholar

[20] Mas-Colell A, Whinston M D, Green J R, et al. Microeconomic Theory, volume 1. Oxford University Press, New York, 1995.Search in Google Scholar

[21] Nisan N, Roughgarden T, Tardos E, et al. Algorithmic Game Theory Cambridge University Press. Cambridge, UK: Cambridge University Press, 2007.10.1017/CBO9780511800481Search in Google Scholar

[22] Bonneau J, Miller A, Clark J, et al. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. 2015 IEEE Symposium on Security and Privacy (SP), 2015: 104–121.Search in Google Scholar

[23] Cheng Y, Du D, Han Q. A hashing power allocation game in cryptocurrencies. International Symposium on Algorithmic Game Theory, 2018: 226–238.10.1007/978-3-319-99660-8_20Search in Google Scholar

[24] Rosen J. Existence and uniqueness of equilibrium points for concave n-person games. Econometrica, 1965, 3(3): 520–534.10.2307/1911749Search in Google Scholar

Appendix

Proof of Theorem 1

By the definition of Nash equilibrium, the computing power allocation profile x = (x1, x2, · · · , xn) is an NE if and only if each miner’s allocation is the best response to the others. Let us denote yij=lixlj.Then the best response of miner i is just the solution of the following optimization problem:

(8)maxUixi1,xi2,,xim=jMxijxij+yijμj
 s.t. jMxij=hi,xij0.

However, there is one difficulty, that is at the point where for some cryptocurrency j ∈ M, xij = 0 for each i ∈ N, Ui is discontinuous. So we cannot apply the standard method directly in [24] to study Nash equilibrium. We first propose the following lemma to characterize an Nashequilibrium by pointing out that any Nash equilibrium could not be the discontinuous points.

Lemma 1 If allocation x is an NE, then iNxij>0for each cryptocurrency j ∈ M.

Proof To obtain this characterization of NE, it is sufficient for us to prove that any allocation profile x, in which there is a cryptocurrency j ∈ M such that xij = 0 for each i ∈ N, cannot be a Nash equilibrium.

W.l.o.g. we assume that xk1 = 0 for each k ∈ N. Then there must exist another cryptocurrency, say j = 2, with xi2> 0 for miner i. That is, the allocation of miner i is

xi = (0, xi2, xi3, · · · , xim). Let us consider another allocation xi, with xi1=ϵ,xi2=xi2ϵand xij=xijfor each j = 3, 4, · · · ,m, in which

0<ϵ<minxi2,μ1hNxh22μ1hNxh2+μ2hixh2.

On one hand, allocation xiis feasible if 0 < l < xi2. On the other hand, if other miners remain their allocations unchanged and miner i reallocate his computing power as xiunilaterally, then miner i will obtain the whole reward from cryptocurrency 1 and his utility shall be

Ui=μ1+xi2ϵhNxh2ϵμ2+j=3xijhNxhjμj.

The difference of utility is

ΔUi=UiUi=μ1+xi2ϵhNxh2ϵμ2xi2hNxh2μ2=μ1hN,hixh2μ2ϵhNxh2hNxh2ϵ=μ1hNxh22μ1hNxh2+μ2hixh2ϵhNxh2hNxh2ϵ>μ1hNxh22μ1hNxh2+μ2hixh2ϵhNxh22>0.

The last inequality is from the definition of . Thus we can conclude that the allocation x in which for some j ∈ M, xij = 0 for each i ∈ N, is not a Nash equilibrium.

Obviously, given the other miners’ allocation profile x−i, utility function Ui is concave and the domain xi1,xi2,,xim1mxij=hi,xij0is convex and compact. Therefore, the optimal solution of (8) is the KKT point. By the first-order optimality condition, there exists a Lagrange multiplier αi such that

(9)Uixij=hixhjh=1nxhj2μj=αi, if xij>0,αi, if xij=0.

Intuitively, at an equilibrium, each miner has the same marginal value on cryptocurrencies which they place positive allocation to and has lower marginal values on those cryptocurrencies that they do not assign computing power.

We first prove that each element of the Nash equilibrium solution which satisfies KKT condition (9) is positive. Given an allocation, let Yj=i=1nxij,1,2,,m,for convenience.

Lemma 2 If x is the NE solution of (8) which satisfies KKT condition (9), then xij > 0 for each i ∈ N and j ∈ M.

Proof We will prove the correctness of this lemma by supposing to the contrary that there is at least one zero element in x. Then we try to drive the contradiction by distinguishing following two cases.

Case 1 There is only one miner, say miner 1, whose allocation profile has at least one element equal to zero.

Without loss of generality, assume x11 = 0. Of course, his allocation profile must has at least one positive element, say x12> 0. At this time, the number of miners must be greater than or equal to 3. Otherwise, if there are only two miners, then miner 2 can obtain the whole reward of cryptocurrency 1, even though he only allocates arbitrarily small and positive computing power. Therefore the fact of no lower limit to his allocation, results in the nonexistence of the NE. So there are at least 3 miners in the game.

Based on the condition that there is only one miner having zero element, it is obvious that xi1> 0 and xi2> 0 for each i = 2, 3 · · · , n. Obviously, Y1=i=2nxi1 and Y2=i=1nxi2.Since x11 = 0 and x12> 0, the KKT condition (9) promises

(10)μ1Y1=U1x11xU1x12x=μ2Y2x12Y22.

For each miner i = 2, 3, · · · , n, the following equations are right by the conditions of xi1> 0 and xi2> 0 and the KKT condition (9),

(11)μ1Y1xi1Y12=Uixi1x=Uixi2x=μ2Y2xi2Y22.

From (10) and (11), we have

(12)μ1μ2Y2x12Y1Y1Y22,
(13)μ1μ2=Y2xi2Y1xi1Y1Y22.

By combining (12) and (13),

(14)μ1μ2=(n1)Y2i=2nxi2(n1)Y1i=2nxi1Y1Y22Y2x12Y1Y1Y22.

In addition, since Y1=i=2nxi1+x11=i=2nxi1 and Y2=i=1nxi2,(14) can be rewritten as

(15)(n2)Y2+x12(n2)Y1Y2x12Y1.

However, the condition of x12> 0 shows the inequality in (15) can not hold. It is a contradiction. Case 2 There are at least two miners in the game, whose allocations have elements equal to zero.

For this case, we first discuss the subcase that there are two miners, say miner 1 and 2, and two crptocurrencies, say crptocurrency 1 and 2, such that x11 = 0, x12> 0 and x21> 0, x22 = 0.

Therefore, by the KKT condition (9), we have

(16)μ1Y1μ2Y2x12Y22,
(17)μ2Y2μ1Y1x21Y12.

Hence, by (16) and (17),

μ2Y2x12Y22μ1Y1>μ1Y1x21Y12μ2Y2,

which is not right, since x12> 0 by assumption.

Next, we will discuss the rest case, in which there are more than be two miners whose allocations have some elements equal to zero. Without loss of generality, assume x11 = 0. At the same time, miner 1 must also have at least one positive element, say x12> 0. Now let us define the miner set as N = {i ∈ N|xi1> 0}. Clearly, xi2> 0 for each i ∈ N. If there is one miner i ∈ N having xi2 = 0, then the previous subcase happens. Thus we have Y1=iNxi1.Similar to the analysis for Case 1, we can get the followings by KKT condition (9).

(18)μ1Y1μ2Y2x12Y22,
(19)μ1Y1xi1Y12=μ2Y2xi2Y22, for each iN.

Therefore,

Y2x12Y1Y1Y22μ1μ2=NY2iNxi2NY1iNxi1Y1Y22.

In addition, by the condition of Y1 = Σ i∈Nxi1, we have

(20)Y2x12Y1N1Y2+iNxi2N1Y1.

Obviously, (20) is not right, because x12> 0.

Conveniently, the following corollary can be derived directly from Lemma 2.

Corollary 1 An allocation x in the hash power allocation game is a Nash equilibrium, if and only if for each miner i ∈ N and any cryptocurrency j, there is a constant αi satisfying

(21)hixhjh=1nxhj2μj=αi.

Proof Since each element of a Nash equilibrium solution is positive by Lemma 2, then KKT condition (9) promises (21) directly.

Based on the sufficient and necessary condition for a Nash equilibrium in Corollary 1, we will prove Theorem 1.

Proof of Theorem 1 We first prove that a hash power allocation profile x = (xij) is a Nash equilibrium, if and only if it has the form as xij=μj=1mμhi,for any i ∈ N and j ∈ M.

It is not hard to see that once each xij has the form as xij=μj=1mμhi,then for any j ∈ M,

hixhjh=1nxhj2μj=h=1nhhhih=1nhh21mμ,

which is irrelevant to the cyprocurrency j and such a ratio can be defined as αi. Then the allocation x = (xij) with xij=μj=1mμhi,is a Nash equilibrium by Corollary 1.

On the other hand, Corollary 1 shows for any jM,hixhjh=1nxhj2μj=αi.It implies

(22)i=1nαi=i=1nhixhjh=1nxhj2μj=(n1)h=1nxhjh=1nxhj2μj=n1h=1nxhjμj.

From Equation (22), we continue to have

i=1nαi=(n1)μ1h=1nxh1==(n1)μmh=1nxhm.

Then

μ1h=1nxh1==μmh=1nxhm=1mμj1mi=1nxij=1mμji=1nhi.

So i=1nαi=(n1)1mμji=1nhi,which is a constant. In addition, from Equation (22), we can get

(23)h=1nxhjμj=n1i=1nαi,jM.

Then for any j ∈ M,

(24)αi=hixhjh=1nxhj2μj=hixhjμjμjh=1nxhj2=hixhjμji=1nαin12,

where the last equality is from (23). Also Equation (24) guarantees

(25)hixhjμj=(n1)2αii=1nαi2.

Furthermore, the difference between (23) and (25) is

(26)xijμj=n1i=1nαi(n1)2αii=1nαi2.

Since i=1nαi=(n1)1mμji=1nhiis a constant, the right side of (26) is only related to index i, denote it by γi. Then xij = γiμj . By the condition of j=1mxij=hi,we have

j=1mxij=j=1mγiμj=γij=1mμj=hi.

Therefore, γi=hi1nμj and xij=μj1mμhi.It concludes this claim.

Based on the necessary and sufficient condition of NE, and the formation of each miner’s expected payoff without a risk-free asset (3), we can get each miner i’s expected payoff which is hi1mμ1nhhi.

Received: 2020-08-12
Accepted: 2021-01-18
Published Online: 2021-07-27

© 2021 Walter de Gruyter GmbH, Berlin/Boston

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 25.9.2025 from https://www.degruyterbrill.com/document/doi/10.21078/JSSI-2021-255-11/html
Scroll to top button