Hello, 

Please see below our BIP for raising the selfish mining threshold. 
Looking forward to your comments. 

Best, 
Ittay 

--- 

Bitcoin Improvement Proposal 

Owners: Ittay Eyal and Emin Gun Sirer 

We suggest a change in the propagation and mining algorithm for chains of the same difficulty, to raise the threshold on Selfish Mining attacks. 

* Current situation: 
When a miner is notified of a new chain of the same difficulty as the one it is mining on, it will ignore it. 

* Background: 
The selfish mining attack and its implications were described in detail in the following research paper: 
http://arxiv.org/abs/1311.0243v1

* Proposal: 
To thwart selfish mining attacks launched by less than 25% of the mining power, we propose the following change to the protocol: 
When a miner learns of more than one chain of the same difficulty, it should propagate all of them, and choose one of them to mine on uniformly at random among all chains of the same difficulty. 

When hearing of a chain of maximal difficulty that it did not know of before: 
1. Add it to a local list of maximal difficulty chains. 
2. Propagate it to its neighbors. 
3. Choose a branch uniformly at random from the local list, and mine on it. 

* Example: 
t0: learn of chain A of difficulty x. 
    propagate A to neighbors. 
    start mining on A. 
t1: learn of chain B of difficulty x. 
    propagate B to neighbors. 
    toss a coin between A and B; if B wins, switch to mining on B. 
t2: learn of chain C of difficulty x. 
    propagate C to neighbors. 
    toss a 3 faced coin among A, B, and C; switch to mining on the winning chain. 

* Concerns and answers: 
1. No harm to miners when all are honest. 
Mining blocks is a random Poisson process, which is memoryless. Having mined on the block in the past does not provide an advantage in locating a solution in the future. Therefore, a miner is not harmed by switching the chain on which it mines. 

2. No new vulnerabilities introduced: 
Currently the choice among equal-length chains is done arbitrarily, depending on network topology. This arbitrariness is a source of vulnerability. We replace it with explicit randomness, which is at the control of the protocol. The change does not introduce executions that were not possible with the old protocol. 

3. Complete backward compatibility: 
Any subset of the miners can switch to the proposed protocol. 

4. Progressive improvement: 
Each miner that adopts the change raises the threshold a little bit. The threshold will reach 25% with universal adoption.