Select Language

Interdependencies between Mining Costs, Mining Rewards and Blockchain Security

Analysis of the intrinsic link between cryptocurrency price, mining rewards, costs, and Proof-of-Work blockchain security, with empirical evidence from 2014-2021 data.
hashpowercurrency.com | PDF Size: 0.4 MB
Rating: 4.5/5
Your Rating
You have already rated this document
PDF Document Cover - Interdependencies between Mining Costs, Mining Rewards and Blockchain Security

1 Introduction

This paper investigates the fundamental economic interdependencies within Proof-of-Work (PoW) blockchain systems. It posits that the cost of operating the blockchain (mining costs) is intrinsically linked to the cost of securing it against attacks. The core research questions examine the relationship between cryptocurrency market outcomes (price), the incentives for miners (rewards), and the resulting security level of the distributed ledger.

The trustless nature of PoW blockchains relies on miners expending computational resources to validate transactions and create new blocks. Their incentives are primarily driven by block rewards, denominated in the native cryptocurrency. Therefore, shocks to the cryptocurrency's fiat price directly impact mining profitability and, consequently, the amount of hashing power (and thus security) dedicated to the network. This creates a potential feedback loop between market valuation and network security.

2 Theoretical Framework & Equilibrium Model

The authors develop a theoretical model to derive the equilibrium relationship between key variables.

2.1 Core Economic Model

The model conceptualizes miners as rational actors. The decision to allocate hash power $H_t$ to a specific blockchain at time $t$ is a function of the expected reward $R_t$ (block reward + transaction fees, in fiat value) and the associated cost $C_t$, which is largely driven by electricity expenditure. In equilibrium, marginal cost equals marginal reward: $MC(H_t) = MR(H_t)$.

2.2 Security Budget & Attack Cost

A critical metric is the "security budget," which can be proxied by the total fiat value of mining rewards per unit time. The cost of a 51% attack is directly related to this budget. The model suggests that the blockchain's immutability is underpinned by the economic infeasibility of acquiring sufficient hash power to overwhelm the honest network, which is a function of $R_t$ and the hash rate market.

3 Methodology & Data

3.1 Autoregressive Distributed Lag (ARDL) Approach

To empirically test the theoretical relationships, the paper employs the Autoregressive Distributed Lag (ARDL) cointegration approach. This method is chosen because it can handle variables with different orders of integration (e.g., I(0) and I(1)) and allows all relevant blockchain and market series (price, hash rate, difficulty, transaction fees) to be treated as potentially endogenous, capturing the complex feedback loops.

3.2 Dataset (2014-2021)

The analysis uses daily data spanning from 2014 to 2021, covering major PoW cryptocurrencies like Bitcoin. Key variables include:

  • Cryptocurrency Price (USD)
  • Network Hash Rate
  • Mining Difficulty
  • Block Reward (coinbase + fees)
  • Transaction Count/Fees

4 Empirical Results & Analysis

4.1 Price-Security Elasticity

The results provide strong empirical evidence that cryptocurrency price and mining rewards are intrinsically linked to blockchain security outcomes. A positive shock to price leads to a statistically significant increase in network hash rate (security) with a lag, confirming the incentive mechanism.

4.2 Mining Reward vs. Cost Elasticity

A key finding is that the elasticity of mining rewards with respect to network security is higher than the elasticity of mining costs. This implies that miners are more responsive to changes in potential revenue (price-driven rewards) than to changes in operational costs (e.g., electricity price fluctuations) when deciding on hash power allocation, at least within the observed ranges.

4.3 Key Statistical Findings

The ARDL models show stable long-run relationships between the variables. The error correction terms are significant, indicating that deviations from the equilibrium (e.g., hash rate being too low for a given price level) are corrected over time, supporting the dynamic adjustment process described in the theoretical model.

5 Discussion & Implications

5.1 Network Security Feedback Loop

The findings validate the existence of a feedback loop: Higher crypto prices → Higher fiat mining rewards → Increased mining/hash rate → Enhanced perceived security → Increased user adoption/demand → Upward pressure on price. This loop is a fundamental driver of PoW blockchain economics but also a source of potential fragility if the price declines sharply.

5.2 Volatility Implications

The paper suggests these interdependencies contribute to the extreme volatility of cryptocurrency returns. Security is not an exogenous, fixed property but is dynamically and endogenously determined by market sentiment and miner economics, creating a new dimension of risk for investors and users.

6 Conclusion & Future Research

The study concludes that the security of a PoW blockchain is not just a technical feature but a deeply economic one. The cost of preventing attacks is intrinsically linked to the market-driven rewards for mining. Future research could extend this framework to analyze the security economics of alternative consensus mechanisms like Proof-of-Stake (PoS) and how their security budgets correlate with different market variables.

7 Original Analysis: A Critical Industry Perspective

Core Insight: This paper delivers a crucial, yet often overlooked, truth: Proof-of-Work security is a derivative of market sentiment. It's not secured by mathematics alone, but by the economic incentive for miners to be honest, which is pegged directly to a wildly volatile asset price. The authors empirically nail down what many in the industry feel intuitively – the hash rate follows the price, not the other way around. This turns the common narrative of "Bitcoin is secure because of its hash power" on its head; it's more accurate to say "Bitcoin's hash power is high because its price makes it profitable to be secure." This aligns with concerns raised by researchers like Pagnotta (2018) regarding the endogenous nature of blockchain security.

Logical Flow: The paper's strength is its clean, causal logic: Price → Reward (in fiat) → Miner Incentive → Hash Rate Allocation → Security Equilibrium. The use of the ARDL model is apt, as it's designed to handle the endogenous, feedback-driven nature of these time series. It smartly avoids claiming one-way causality and instead maps the equilibrium relationship, which is the correct approach for a complex adaptive system like a cryptocurrency network.

Strengths & Flaws: The major strength is providing rigorous, long-term empirical validation (2014-2021) for a theoretical model. The finding about reward elasticity exceeding cost elasticity is profound; it suggests miners are profit-maximizers first, and efficiency experts second. However, a flaw is the limited discussion of the "death spiral" risk. If price falls sharply and persistently, the model implies hash rate and security will drop, potentially lowering confidence and further depressing price – a vicious cycle. The paper touches on volatility but doesn't fully grapple with this systemic fragility, a topic explored in depth by the Bank for International Settlements. Furthermore, the analysis is inherently retrospective; it doesn't model the impact of future shocks like the Bitcoin halving or a global energy price crisis.

Actionable Insights: For investors, this research is a mandate to analyze security budgets (total fiat value of block rewards) as a key metric, not just hash rate in a vacuum. A chain with high hash rate but a low, declining security budget is potentially at greater risk. For developers and protocol designers, it underscores the non-negotiable link between tokenomics and security. Any change to issuance (halving) or fee market dynamics must be modeled for its second-order security impacts. For regulators, it highlights that attacking the economics (e.g., via energy regulations) can directly impact the security of these networks, a double-edged sword that requires careful consideration.

8 Technical Details & Mathematical Framework

The core equilibrium can be represented by a simplified miner profit function:

$\Pi_t = \frac{H_t}{H_{total,t}} \cdot R_t - C(H_t)$

Where:

  • $\Pi_t$: Profit at time $t$.
  • $H_t$: Hash rate contributed by an individual miner.
  • $H_{total,t}$: Total network hash rate.
  • $R_t$: Total fiat block reward = $P_t \cdot (B + F_t)$, with $P_t$ as crypto price, $B$ as fixed block subsidy, and $F_t$ as fees.
  • $C(H_t)$: Cost function, typically $C(H_t) = \gamma \cdot E \cdot H_t$, where $\gamma$ is energy cost per unit and $E$ is energy efficiency (Joules/hash).

The security against a 51% attack is often modeled by the cost to acquire majority hash power. A simple approximation is that the attack cost $AC_t$ is proportional to the security budget over a time window $\tau$: $AC_t \propto \sum_{i=t-\tau}^{t} R_i$. The paper's ARDL model tests for cointegration between $P_t$, $H_{total,t}$, and $R_t$.

9 Experimental Results & Chart Descriptions

Figure 2 (Conceptual): Feedback Loop Diagram. A flowchart illustrating the dynamic interdependence: "Cryptocurrency Price Shock" leads to "Change in Mining Reward (Fiat)" which affects "Miner Incentives & Hash Rate Allocation," resulting in a "Change in Perceived Blockchain Security." This then influences "User Demand & Portfolio Adjustment," applying upward or downward pressure on the "Cryptocurrency Price," closing the loop.

Figure 3 (Empirical): Time Series & Cointegration Plots. Likely contains multiple panels: (a) Co-movement of Bitcoin price (log scale) and network hash rate (log scale) from 2014-2021, showing clear visual correlation. (b) Results from the bounds test for cointegration, showing the F-statistic exceeding the upper critical value, confirming a long-run relationship. (c) Plot of the error correction term (ECT) from the ARDL model, demonstrating mean-reversion to zero, which validates the equilibrium correction mechanism.

Table of Results: ARDL Long-Run Coefficients. A table presenting estimated elasticities. For example, it would show that a 1% increase in cryptocurrency price is associated with an X% increase in network hash rate in the long run (statistically significant at the 1% level). Another row would show the elasticity of hash rate with respect to mining cost is Y%, where Y < X, supporting the key finding about differential elasticities.

10 Analysis Framework: A Simplified Case Example

Scenario: Analyzing the security trajectory of a hypothetical PoW cryptocurrency, "ChainX," after a 50% price crash.

Framework Application:

  1. Initial State: ChainX price = $100. Block reward = 10 X-coins. Security budget = $1000/block. Hash rate = 10 EH/s. Attack cost (est.) = $500,000.
  2. Shock: Market crash. Price drops to $50.
  3. Immediate Impact: Security budget halves to $500/block. Miner revenue in fiat drops 50%.
  4. Miners' Response (Short-term): According to the paper's elasticity finding, miners are highly responsive to reward changes. Less efficient miners ($C(H_t) > revenue) shut down machines. Network hash rate begins to decline.
  5. Dynamic Adjustment: Difficulty adjustment lags (e.g., every 2 weeks). During this period, remaining miners have higher chance of winning blocks, partially offsetting revenue drop. The ARDL model's error correction mechanism would capture this adjustment towards a new equilibrium hash rate.
  6. New Equilibrium (Long-term): Hash rate settles at a lower level, say 6 EH/s. Attack cost re-calculates based on new, lower security budget and potentially lower hash rate acquisition cost, now estimated at $200,000. The security of ChainX has fundamentally decreased due to a market event.
  7. Feedback: The lower hash rate and heightened security concerns may be reported, reducing user/developer confidence, potentially applying further downward pressure on price, illustrating the volatile feedback loop.

11 Future Applications & Research Directions

  • Proof-of-Stake (PoS) Security Economics: Applying a similar framework to PoS networks. Here, the "security budget" is the fiat value of staked assets (and staking rewards). The interdependencies likely involve validator yields, token price, and slashing risks. Research could compare the elasticity and stability of PoS vs. PoS security models.
  • Multi-Chain Analysis & Security Competition: Extending the model to a world where miners can dynamically switch hash power between multiple PoW chains (e.g., Bitcoin, Litecoin, Bitcoin Cash). This creates a cross-chain security market. How do price movements in one chain affect the security of another?
  • Regulatory Impact Modeling: Using the framework to simulate the effect of potential regulations (e.g., carbon taxes on mining, transaction taxes) on the equilibrium security levels of major blockchains.
  • Forecasting Security Budgets: Developing predictive models for security budgets based on macroeconomic indicators, energy prices, and on-chain metrics, aiding in risk assessment for institutional adoption.
  • Hybrid Consensus Models: Investigating the security economics of emerging hybrid models that combine PoW and PoS, aiming to create more stable security budgets less dependent on pure asset price volatility.

12 References

  1. Ciaian, P., Kancs, d'A., & Rajcaniova, M. (2021). Interdependencies between Mining Costs, Mining Rewards and Blockchain Security. (Working Paper).
  2. Pagnotta, E. (2021). Decentralizing Money: Bitcoin Prices and Blockchain Security. The Review of Financial Studies.
  3. Lee, J. (2019). Blockchain Security: A Survey of Techniques and Research Directions. IEEE Transactions on Services Computing.
  4. Bank for International Settlements. (2019). Annual Economic Report. Chapter III: Big tech in finance: opportunities and risks.
  5. Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
  6. Budish, E. (2018). The Economic Limits of Bitcoin and the Blockchain. National Bureau of Economic Research (NBER) Working Paper No. 24717.