Majority Is Not Enough: Bitcoin Mining Is Vulnerable

From MaRDI portal
Publication:2949240

DOI10.1007/978-3-662-45472-5_28zbMath1381.68017arXiv1311.0243OpenAlexW2886706106MaRDI QIDQ2949240

Emin Gün Sirer, Ittay Eyal

Publication date: 8 October 2015

Published in: Financial Cryptography and Data Security (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1311.0243




Related Items (54)

A rational protocol treatment of 51\% attacksSTRATEGIC ALLIANCE FOR BLOCKCHAIN GOVERNANCE GAMEBuilding quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructionsBLOCKCHAIN DOUBLE-SPEND ATTACK DURATIONDesigning Proof of Human-Work Puzzles for Cryptocurrency and BeyondSoK: communication across distributed ledgersIgnore the extra zeroes: variance-optimal mining poolsSensitivity-based optimization for blockchain selfish miningMaximal information propagation via lotteriesOperations research in the blockchain technologyPayments on digital platforms: resiliency, interoperability and welfareStoring and Retrieving Secrets on a BlockchainA discrete-event simulation model for the Bitcoin blockchain network with strategic miners and mining pool managersSoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrenciesInclusive Block Chain ProtocolsMajority Is Not Enough: Bitcoin Mining Is VulnerableDecentralisation conscious players and system reliabilityArbitrage attack: Miners of the world, unite!Achieving almost all blockchain functionalities with polylogarithmic storageDistributed sequential consensus in networks: analysis of partially connected blockchains with uncertaintyDelayed packing attack and countermeasure against transaction information based applicationsMulti-stage proof-of-works: properties and vulnerabilitiesStrategic behaviour and manipulation resistance in peer-to-peer, crowdsourced information gatheringInsightful mining equilibriaInvited paper: Cross-chain state machine replicationBetter incentives for proof-of-workDecentralizing information technology: the advent of resource based systemsSluggish Mining: Profiting from the Verifier’s DilemmaCryptocurrency is accounting coordination: selfish mining and double spending in a simple mining gamePractical settlement bounds for longest-chain consensusThe impact of network delay on Nakamoto consensus mechanismPublish or Perish: A Backward-Compatible Defense Against Selfish Mining in BitcoinSecurity of the blockchain against long delay attackOn classes of Bitcoin-inspired infinite-server queueing systemsOceanic Games: Centralization Risks and Incentives in Blockchain MiningA further study of some Markovian Bitcoin models from Göbel et al.Minting mechanism for proof of stake blockchainsSelfish Mining in EthereumErgodic Mean-Payoff Games for the Analysis of Attacks in Crypto-CurrenciesSELFISH MINING STRATEGY ELABORATIONA novel keyed parallel hashing scheme based on a new chaotic systemUnnamed ItemCan we predict the winner in a market with network effects? Competition in cryptocurrency marketHow to build time-lock encryptionFraud risk assessment within blockchain transactionsThe mathematics of BitcoinModeling and analysis of block arrival times in the Bitcoin blockchainOptimal dynamic mining policy of blockchain selfish mining through sensitivity-based optimizationA Smart Contract for Boardroom Voting with Maximum Voter PrivacyOn reward sharing in blockchain mining poolsOrder-fairness for Byzantine consensusPractical quantum Byzantine protocol via nearly optimal entanglement resourcesSmart Contract Execution - the (+-)-Biased Ballot Problem.Analysis of the Blockchain Protocol in Asynchronous Networks




Cites Work




This page was built for publication: Majority Is Not Enough: Bitcoin Mining Is Vulnerable