The game among bribers in a smart contract system

Lin Chen, Lei Xu, Zhimin Gao, Nolan Shah, Ton Chanh Le, Yang Lu, Weidong Shi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations


Blockchain has been used to build various applications, and the introduction of smart contracts further extends its impacts. Most of existing works consider the positive usage of smart contracts but ignore the other side of it: smart contracts can be used in a destructive way, particularly, they can be utilized to carry out bribery. The hardness of tracing a briber in a blockchain system may even motivate bribers. Furthermore, an adversary can utilize bribery smart contracts to influence the execution results of other smart contracts in the same system. To better understand this threat, we propose a formal framework to analyze bribery in the smart contract system using game theory. We give a full characterization on how the bribery budget of a briber may influence the execution of a smart contract if the briber tries to manipulate its execution result by bribing users in the system.

Original languageEnglish
Title of host publicationFinancial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Revised Selected Papers
EditorsFederico Pintore, Andrea Bracciali, Vanessa Teague, Aviv Zohar, Massimiliano Sala, Jeremy Clark, Ittay Eyal
Number of pages14
ISBN (Print)9783662588192
StatePublished - 2019
Event22nd International Conference on Financial Cryptography and Data Security, FC 2018 - Nieuwpoort, Netherlands
Duration: Feb 26 2018Mar 2 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10958 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference22nd International Conference on Financial Cryptography and Data Security, FC 2018


Dive into the research topics of 'The game among bribers in a smart contract system'. Together they form a unique fingerprint.

Cite this