-
Model-based Analysis of Mining Fairness in a Blockchain
Authors:
Akira Sakurai,
Kazuyuki Shudo
Abstract:
Mining fairness in blockchain refers to the equality between the computational resources invested in mining and the block rewards received. There exists a dilemma where increasing the blockchain's transaction processing capacity damages mining fairness, consequently undermining its decentralization. This dilemma remains unresolved even with methods such as GHOST, indicating that mining fairness is…
▽ More
Mining fairness in blockchain refers to the equality between the computational resources invested in mining and the block rewards received. There exists a dilemma where increasing the blockchain's transaction processing capacity damages mining fairness, consequently undermining its decentralization. This dilemma remains unresolved even with methods such as GHOST, indicating that mining fairness is an inherent bottleneck to the system's transaction processing capacity. Despite its significance, there have been insufficient studies quantitatively analyzing mining fairness.
In this paper, we propose a method to calculate mining fairness. Initially, we approximate a complex blockchain network using a simple mathematical model, assuming that no more than two blocks are generated per round. Within this model, we quantitatively determine local mining fairness and derive several measures of global mining fairness based on local mining fairness.
We validated that our calculation method accurately computes mining fairness in networks with a small number of miners. Furthermore, we analyzed various networks from the perspective of mining fairness.
△ Less
Submitted 1 June, 2024;
originally announced June 2024.
-
Tie-Breaking Rule Based on Partial Proof of Work in a Blockchain
Authors:
Akira Sakurai,
Kazuyuki Shudo
Abstract:
In the area of blockchain, numerous methods have been proposed for suppressing intentional forks by attackers more effectively than the random rule. However, all of them, except for the random rule, require major updates, rely on a trusted third party, or assume strong synchrony. Hence, it is challenging to apply these methods to existing systems such as Bitcoin.
To address these issues, we prop…
▽ More
In the area of blockchain, numerous methods have been proposed for suppressing intentional forks by attackers more effectively than the random rule. However, all of them, except for the random rule, require major updates, rely on a trusted third party, or assume strong synchrony. Hence, it is challenging to apply these methods to existing systems such as Bitcoin.
To address these issues, we propose another countermeasure that can be easily applied to existing proof of work blockchain systems. Our method is a tie-breaking rule that uses partial proof of work, which does not function as a block, as a time standard with finer granularity. By using the characteristic of partial proof of work, the proposed method enables miners to choose the last-generated block in a chain tie, which suppresses intentional forks by attackers. Only weak synchrony, which is already met by existing systems such as Bitcoin, is required for effective functioning.
We evaluated the proposed method through a detailed analysis that is lacking in existing works. In networks that adopt our method, the proportion of the attacker hashrate necessary for selfish mining was approximately 0.31479 or higher, regardless of the block propagation capability of the attacker. Furthermore, we demonstrated through extended selfish mining that the impact of Match against pre-generated block, which is a concern in all last-generated rules, can be mitigated with appropriate parameter settings.
△ Less
Submitted 7 June, 2024; v1 submitted 22 March, 2024;
originally announced March 2024.
-
Random Walk Sampling in Social Networks Involving Private Nodes
Authors:
Kazuki Nakajima,
Kazuyuki Shudo
Abstract:
Analysis of social networks with limited data access is challenging for third parties. To address this challenge, a number of studies have developed algorithms that estimate properties of social networks via a simple random walk. However, most existing algorithms do not assume private nodes that do not publish their neighbors' data when they are queried in empirical social networks. Here we propos…
▽ More
Analysis of social networks with limited data access is challenging for third parties. To address this challenge, a number of studies have developed algorithms that estimate properties of social networks via a simple random walk. However, most existing algorithms do not assume private nodes that do not publish their neighbors' data when they are queried in empirical social networks. Here we propose a practical framework for estimating properties via random walk-based sampling in social networks involving private nodes. First, we develop a sampling algorithm by extending a simple random walk to the case of social networks involving private nodes. Then, we propose estimators with reduced biases induced by private nodes for the network size, average degree, and density of the node label. Our results show that the proposed estimators reduce biases induced by private nodes in the existing estimators by up to 92.6% on social network datasets involving private nodes.
△ Less
Submitted 20 May, 2023;
originally announced May 2023.
-
Quantifying gender imbalance in East Asian academia: Research career and citation practice
Authors:
Kazuki Nakajima,
Ruodan Liu,
Kazuyuki Shudo,
Naoki Masuda
Abstract:
Gender imbalance in academia has been confirmed in terms of a variety of indicators, and its magnitude often varies from country to country. Europe and North America, which cover a large fraction of research workforce in the world, have been the main geographical regions for research on gender imbalance in academia. However, the academia in East Asia, which accounts for a substantial fraction of r…
▽ More
Gender imbalance in academia has been confirmed in terms of a variety of indicators, and its magnitude often varies from country to country. Europe and North America, which cover a large fraction of research workforce in the world, have been the main geographical regions for research on gender imbalance in academia. However, the academia in East Asia, which accounts for a substantial fraction of research, may be exposed to strong gender imbalance because Asia has been facing persistent and stronger gender imbalance in society at large than Europe and North America. Here we use publication data between 1950 and 2020 to analyze gender imbalance in academia in China, Japan, and South Korea in terms of the number of researchers, their career, and citation practice. We found that, compared to the average of the other countries, gender imbalance is larger in these three East Asian countries in terms of the number of researchers and their citation practice and additionally in Japan in terms of research career. Moreover, we found that Japan has been exposed to the larger gender imbalance than China and South Korea in terms of research career and citation practice.
△ Less
Submitted 22 November, 2023; v1 submitted 15 February, 2023;
originally announced February 2023.
-
Higher-order rich-club phenomenon in collaborative research grants
Authors:
Kazuki Nakajima,
Kazuyuki Shudo,
Naoki Masuda
Abstract:
Modern scientific work, including writing papers and submitting research grant proposals, increasingly involves researchers from different institutions. In grant collaborations, it is known that institutions involved in many collaborations tend to densely collaborate with each other, forming rich clubs. Here we investigate higher-order rich-club phenomena in collaborative research grants among ins…
▽ More
Modern scientific work, including writing papers and submitting research grant proposals, increasingly involves researchers from different institutions. In grant collaborations, it is known that institutions involved in many collaborations tend to densely collaborate with each other, forming rich clubs. Here we investigate higher-order rich-club phenomena in collaborative research grants among institutions and their associations with research productivity. Using publicly available data from the National Science Foundation in the US, we construct a bipartite network of institutions and collaborative grants, which distinguishes among the collaboration with different numbers of institutions. By extending the concept and algorithms of the rich club for dyadic networks to the case of bipartite networks, we find rich clubs both in the entire bipartite network and the bipartite subnetwork induced by the collaborative grants involving a given number of institutions up to five. We also find that the collaborative grants within rich clubs tend to be more productive in a per-dollar sense than the control. Our results highlight advantages of collaborative grants among the institutions in the rich clubs.
△ Less
Submitted 20 May, 2023; v1 submitted 22 June, 2022;
originally announced June 2022.
-
Social Graph Restoration via Random Walk Sampling
Authors:
Kazuki Nakajima,
Kazuyuki Shudo
Abstract:
Analyzing social graphs with limited data access is challenging for third-party researchers. To address this challenge, a number of algorithms that estimate structural properties via a random walk have been developed. However, most existing algorithms are limited to the estimation of local structural properties. Here we propose a method for restoring the original social graph from the small sample…
▽ More
Analyzing social graphs with limited data access is challenging for third-party researchers. To address this challenge, a number of algorithms that estimate structural properties via a random walk have been developed. However, most existing algorithms are limited to the estimation of local structural properties. Here we propose a method for restoring the original social graph from the small sample obtained by a random walk. The proposed method generates a graph that preserves the estimates of local structural properties and the structure of the subgraph sampled by a random walk. We compare the proposed method with subgraph sampling using a crawling method and the existing method for generating a graph that structurally resembles the original graph via a random walk. Our experimental results show that the proposed method more accurately reproduces the local and global structural properties on average and the visual representation of the original graph than the compared methods. We expect that our method will lead to exhaustive analyses of social graphs with limited data access.
△ Less
Submitted 19 January, 2022; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Randomizing hypergraphs preserving degree correlation and local clustering
Authors:
Kazuki Nakajima,
Kazuyuki Shudo,
Naoki Masuda
Abstract:
Many complex systems involve direct interactions among more than two entities and can be represented by hypergraphs, in which hyperedges encode higher-order interactions among an arbitrary number of nodes. To analyze structures and dynamics of given hypergraphs, a solid practice is to compare them with those for randomized hypergraphs that preserve some specific properties of the original hypergra…
▽ More
Many complex systems involve direct interactions among more than two entities and can be represented by hypergraphs, in which hyperedges encode higher-order interactions among an arbitrary number of nodes. To analyze structures and dynamics of given hypergraphs, a solid practice is to compare them with those for randomized hypergraphs that preserve some specific properties of the original hypergraphs. In the present study, we propose a family of such reference models for hypergraphs, called the hyper dK-series, by extending the so-called dK-series for dyadic networks to the case of hypergraphs. The hyper dK-series preserves up to the individual node's degree, node's degree correlation, node's redundancy coefficient, and/or the hyperedge's size depending on the parameter values. We also apply the hyper dK-series to numerical simulations of epidemic spreading and evolutionary game dynamics on empirical hypergraphs.
△ Less
Submitted 20 May, 2023; v1 submitted 23 June, 2021;
originally announced June 2021.
-
Trail: A Blockchain Architecture for Light Nodes
Authors:
Ryunosuke Nagayama,
Ryohei Banno,
Kazuyuki Shudo
Abstract:
In Bitcoin and Ethereum, nodes require large storage capacity to maintain all the blockchain data, such as transactions, UTXOs, and account states. As of May 2020, the storage size of the Bitcoin blockchain has expanded to 270 GB, and it will continue to increase. This storage requirement is a major hurdle to becoming a block proposer or validator. Although many studies have attempted to reduce th…
▽ More
In Bitcoin and Ethereum, nodes require large storage capacity to maintain all the blockchain data, such as transactions, UTXOs, and account states. As of May 2020, the storage size of the Bitcoin blockchain has expanded to 270 GB, and it will continue to increase. This storage requirement is a major hurdle to becoming a block proposer or validator. Although many studies have attempted to reduce the storage size, in the proposed methods, a node cannot keep all blocks or cannot generate a block. We propose an architecture called Trail that allows nodes to hold all blocks in a small storage and to generate and validate blocks and transactions. Trail does not depend on a consensus algorithm or fork choice rule. In this architecture, a client who issues transactions has the data to prove its own balances and can generate a transaction containing the proof of balances. The nodes in Trail do not store transactions, UTXOs and account balances: they keep only blocks. The blocksize is approximately 8 KB, which is 100 times smaller than that of Bitcoin. Further, the block size is constant regardless of the number of accounts and the number of transactions. Compared to traditional blockchains, clients who issue transactions must store additional data. However, we show that proper data archiving can keep the account device storage size small. Trail allows more users to be block proposers and validators and improves the decentralization of the blockchain.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
Estimating Properties of Social Networks via Random Walk considering Private Nodes
Authors:
Kazuki Nakajima,
Kazuyuki Shudo
Abstract:
Accurately analyzing graph properties of social networks is a challenging task because of access limitations to the graph data. To address this challenge, several algorithms to obtain unbiased estimates of properties from few samples via a random walk have been studied. However, existing algorithms do not consider private nodes who hide their neighbors in real social networks, leading to some prac…
▽ More
Accurately analyzing graph properties of social networks is a challenging task because of access limitations to the graph data. To address this challenge, several algorithms to obtain unbiased estimates of properties from few samples via a random walk have been studied. However, existing algorithms do not consider private nodes who hide their neighbors in real social networks, leading to some practical problems. Here we design random walk-based algorithms to accurately estimate properties without any problems caused by private nodes. First, we design a random walk-based sampling algorithm that comprises the neighbor selection to obtain samples having the Markov property and the calculation of weights for each sample to correct the sampling bias. Further, for two graph property estimators, we propose the weighting methods to reduce not only the sampling bias but also estimation errors due to private nodes. The proposed algorithms improve the estimation accuracy of the existing algorithms by up to 92.6% on real-world datasets.
△ Less
Submitted 12 July, 2020; v1 submitted 22 June, 2020;
originally announced June 2020.
-
Identifying Impacts of Protocol and Internet Development on the Bitcoin Network
Authors:
Ryunosuke Nagayama,
Kazuyuki Shudo,
Ryohei Banno
Abstract:
Improving transaction throughput is an important challenge for Bitcoin. However, shortening the block generation interval or increasing the block size to improve throughput makes it sharing blocks within the network slower and increases the number of orphan blocks. Consequently, the security of the blockchain is sacrificed. To mitigate this, it is necessary to reduce the block propagation delay. B…
▽ More
Improving transaction throughput is an important challenge for Bitcoin. However, shortening the block generation interval or increasing the block size to improve throughput makes it sharing blocks within the network slower and increases the number of orphan blocks. Consequently, the security of the blockchain is sacrificed. To mitigate this, it is necessary to reduce the block propagation delay. Because of the contribution of new Bitcoin protocols and the improvements of the Internet, the block propagation delay in the Bitcoin network has been shortened in recent years. In this study, we identify impacts of compact block relay---an up-to-date Bitcoin protocol---and Internet improvement on the block propagation delay and fork rate in the Bitcoin network from 2015 to 2019. Existing measurement studies could not identify them but our simulation enables it. The experimental results reveal that compact block relay contributes to shortening the block propagation delay more than Internet improvements. The block propagation delay is reduced by 64.5% for the 50th percentile and 63.7% for the 90th percentile due to Internet improvements, and by 90.1% for the 50th percentile and by 87.6% for the 90th percentile due to compact block relay.
△ Less
Submitted 3 June, 2020; v1 submitted 11 December, 2019;
originally announced December 2019.
-
A Framework for Model Search Across Multiple Machine Learning Implementations
Authors:
Yoshiki Takahashi,
Masato Asahara,
Kazuyuki Shudo
Abstract:
Several recently devised machine learning (ML) algorithms have shown improved accuracy for various predictive problems. Model searches, which explore to find an optimal ML algorithm and hyperparameter values for the target problem, play a critical role in such improvements. During a model search, data scientists typically use multiple ML implementations to construct several predictive models; howe…
▽ More
Several recently devised machine learning (ML) algorithms have shown improved accuracy for various predictive problems. Model searches, which explore to find an optimal ML algorithm and hyperparameter values for the target problem, play a critical role in such improvements. During a model search, data scientists typically use multiple ML implementations to construct several predictive models; however, it takes significant time and effort to employ multiple ML implementations due to the need to learn how to use them, prepare input data in several different formats, and compare their outputs. Our proposed framework addresses these issues by providing simple and unified coding method. It has been designed with the following two attractive features: i) new machine learning implementations can be added easily via common interfaces between the framework and ML implementations and ii) it can be scaled to handle large model configuration search spaces via profile-based scheduling. The results of our evaluation indicate that, with our framework, implementers need only write 55-144 lines of code to add a new ML implementation. They also show that ours was the fastest framework for the HIGGS dataset, and the second-fastest for the SECOM dataset.
△ Less
Submitted 27 August, 2019;
originally announced August 2019.
-
Proximity Neighbor Selection in Blockchain Networks
Authors:
Yusuke Aoki,
Kazuyuki Shudo
Abstract:
Blockchains have attracted a great deal of attention as a technology for the distributed management of register information at multiple nodes without a centralized system. However, they possess the drawbacks of low transaction throughput and long approval time. These problems can be addressed by shortening the block generation interval; however, shortening this interval alone has the effect of inc…
▽ More
Blockchains have attracted a great deal of attention as a technology for the distributed management of register information at multiple nodes without a centralized system. However, they possess the drawbacks of low transaction throughput and long approval time. These problems can be addressed by shortening the block generation interval; however, shortening this interval alone has the effect of increasing the frequency of forks. In this study, we aim to shorten the block generation interval without increasing the fork generation rate by improving the network topology of the nodes and shortening the propagation time. We propose a neighbor node selection method forming a network topology with a short block propagation time. A blockchain simulator is used to demonstrate the effect of the proposed neighbor node selection method on the propagation delay of the network. This result indicates that the proposed method improves block propagation time.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
SimBlock: A Blockchain Network Simulator
Authors:
Yusuke Aoki,
Kai Otsuki,
Takeshi Kaneko,
Ryohei Banno,
Kazuyuki Shudo
Abstract:
Blockchain, which is a technology for distributedly managing ledger information over multiple nodes without a centralized system, has elicited increasing attention. Performing experiments on actual blockchains are difficult because a large number of nodes in wide areas are necessary. In this study, we developed a blockchain network simulator SimBlock for such experiments. Unlike the existing simul…
▽ More
Blockchain, which is a technology for distributedly managing ledger information over multiple nodes without a centralized system, has elicited increasing attention. Performing experiments on actual blockchains are difficult because a large number of nodes in wide areas are necessary. In this study, we developed a blockchain network simulator SimBlock for such experiments. Unlike the existing simulators, SimBlock can easily change behavior of node, so that it enables to investigate the influence of nodes' behavior on blockchains. We compared some simulation results with the measured values in actual blockchains to demonstrate the validity of this simulator. Furthermore, to show practical usage, we conducted two experiments which clarify the influence of neighbor node selection algorithms and relay networks on the block propagation time. The simulator could depict the effects of the two techniques on block propagation time. The simulator will be publicly available in a few months.
△ Less
Submitted 19 March, 2019; v1 submitted 28 January, 2019;
originally announced January 2019.
-
Towards Application Portability on Blockchains
Authors:
Kazuyuki Shudo,
Reiki Kanda,
Kenji Saito
Abstract:
We discuss the issue of what we call {\em incentive mismatch}, a fundamental problem with public blockchains supported by economic incentives. This is an open problem, but one potential solution is to make application portable. Portability is desirable for applications on private blockchains. Then, we present examples of middleware designs that enable application portability and, in particular, su…
▽ More
We discuss the issue of what we call {\em incentive mismatch}, a fundamental problem with public blockchains supported by economic incentives. This is an open problem, but one potential solution is to make application portable. Portability is desirable for applications on private blockchains. Then, we present examples of middleware designs that enable application portability and, in particular, support migration between blockchains.
△ Less
Submitted 26 June, 2018; v1 submitted 4 January, 2018;
originally announced January 2018.
-
Breakdown of a Benchmark Score Without Internal Analysis of Benchmarking Program
Authors:
Naoki Matagawa,
Kazuyuki Shudo
Abstract:
A breakdown of a benchmark score is how much each aspect of the system performance affects the score. Existing methods require internal analysis on the benchmarking program and then involve the following problems: (1) require a certain amount of labor for code analysis, profiling, simulation, and so on and (2) require the benchmarking program itself. In this paper, we present a method for breaking…
▽ More
A breakdown of a benchmark score is how much each aspect of the system performance affects the score. Existing methods require internal analysis on the benchmarking program and then involve the following problems: (1) require a certain amount of labor for code analysis, profiling, simulation, and so on and (2) require the benchmarking program itself. In this paper, we present a method for breaking down a benchmark score without internal analysis of the benchmarking program. The method utilizes regression analysis of benchmark scores on a number of systems. Experimental results with 3 benchmarks on 15 Android smartphones showed that our method could break down those benchmark scores even though there is room for improvement in accuracy.
△ Less
Submitted 20 October, 2016;
originally announced October 2016.
-
Electroweak bremsstrahlung in bino-like dark matter annihilations
Authors:
Kenta Shudo,
Takeshi Nihei
Abstract:
We investigate the effects of electroweak bremsstrahlung on bino-like neutralino dark matter pair annihilations in the minimal supersymmetric standard model (MSSM). We calculate the nonrelativistic pair annihilation cross sections via $W$-strahlung from leptonic final states, $χχ$ $\to$ $W\ell\barν$, and compare them with the contributions of the relevant two-body final states. We explore the case…
▽ More
We investigate the effects of electroweak bremsstrahlung on bino-like neutralino dark matter pair annihilations in the minimal supersymmetric standard model (MSSM). We calculate the nonrelativistic pair annihilation cross sections via $W$-strahlung from leptonic final states, $χχ$ $\to$ $W\ell\barν$, and compare them with the contributions of the relevant two-body final states. We explore the case that sleptons lie below the TeV scale, while squarks are extremely heavy. It is found that the electroweak bremsstrahlung can give a dominant contribution to the cross section for some parameter regions which include slepton coannihilation regions with the observed relic abundance. We also evaluate the neutrino spectra at injection in the Sun. It is shown that energetic neutrinos via weak bremsstrahlung processes can be dominant over contributions of the two-body final states.
△ Less
Submitted 17 September, 2013; v1 submitted 25 June, 2013;
originally announced June 2013.
-
Molecular Motion on Semiconductor Surface via Tip-enhanced Multiple Excitation
Authors:
Tatsuya Momose,
Ken-ichi Shudo,
Hannes Raebiger,
Shin-ya Ohno,
Takeshi Kitajima,
Masanobu Uchiyama,
Takanori Suzuki,
Masatoshi Tanaka
Abstract:
In a low-temperature study with a scanning tunneling microscope (STM), the irreducible lateral motion of a CO molecule adsorbed on a Si(001) surface showed a hyperlinear dependence on the tunneling current. This dependence implies that the adsorbate displacement is caused by multiple excitations of adsorbate vibration modes, a situation thus far observed only at metal surfaces. The local vibronic…
▽ More
In a low-temperature study with a scanning tunneling microscope (STM), the irreducible lateral motion of a CO molecule adsorbed on a Si(001) surface showed a hyperlinear dependence on the tunneling current. This dependence implies that the adsorbate displacement is caused by multiple excitations of adsorbate vibration modes, a situation thus far observed only at metal surfaces. The local vibronic temperature at the atomic scale on the surface heated by ohmic inelastic scattering of tunneling electrons indicates that there is an activation barrier of 0.11 eV for the irreversible motion of CO, in agreement with the adiabatic potential obtained from first-principles calculation. The highly efficient local heating is caused by a mid-gap state at the surface induced by the electric field of the STM tip.
△ Less
Submitted 2 October, 2012;
originally announced October 2012.