Majority Is Not Enough: Bitcoin Mining Is Vulnerable
From MaRDI portal
Publication:2949240
DOI10.1007/978-3-662-45472-5_28zbMath1381.68017arXiv1311.0243OpenAlexW2886706106MaRDI QIDQ2949240
Publication date: 8 October 2015
Published in: Financial Cryptography and Data Security (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1311.0243
Related Items (54)
A rational protocol treatment of 51\% attacks ⋮ STRATEGIC ALLIANCE FOR BLOCKCHAIN GOVERNANCE GAME ⋮ Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions ⋮ BLOCKCHAIN DOUBLE-SPEND ATTACK DURATION ⋮ Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond ⋮ SoK: communication across distributed ledgers ⋮ Ignore the extra zeroes: variance-optimal mining pools ⋮ Sensitivity-based optimization for blockchain selfish mining ⋮ Maximal information propagation via lotteries ⋮ Operations research in the blockchain technology ⋮ Payments on digital platforms: resiliency, interoperability and welfare ⋮ Storing and Retrieving Secrets on a Blockchain ⋮ A discrete-event simulation model for the Bitcoin blockchain network with strategic miners and mining pool managers ⋮ SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies ⋮ Inclusive Block Chain Protocols ⋮ Majority Is Not Enough: Bitcoin Mining Is Vulnerable ⋮ Decentralisation conscious players and system reliability ⋮ Arbitrage attack: Miners of the world, unite! ⋮ Achieving almost all blockchain functionalities with polylogarithmic storage ⋮ Distributed sequential consensus in networks: analysis of partially connected blockchains with uncertainty ⋮ Delayed packing attack and countermeasure against transaction information based applications ⋮ Multi-stage proof-of-works: properties and vulnerabilities ⋮ Strategic behaviour and manipulation resistance in peer-to-peer, crowdsourced information gathering ⋮ Insightful mining equilibria ⋮ Invited paper: Cross-chain state machine replication ⋮ Better incentives for proof-of-work ⋮ Decentralizing information technology: the advent of resource based systems ⋮ Sluggish Mining: Profiting from the Verifier’s Dilemma ⋮ Cryptocurrency is accounting coordination: selfish mining and double spending in a simple mining game ⋮ Practical settlement bounds for longest-chain consensus ⋮ The impact of network delay on Nakamoto consensus mechanism ⋮ Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin ⋮ Security of the blockchain against long delay attack ⋮ On classes of Bitcoin-inspired infinite-server queueing systems ⋮ Oceanic Games: Centralization Risks and Incentives in Blockchain Mining ⋮ A further study of some Markovian Bitcoin models from Göbel et al. ⋮ Minting mechanism for proof of stake blockchains ⋮ Selfish Mining in Ethereum ⋮ Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies ⋮ SELFISH MINING STRATEGY ELABORATION ⋮ A novel keyed parallel hashing scheme based on a new chaotic system ⋮ Unnamed Item ⋮ Can we predict the winner in a market with network effects? Competition in cryptocurrency market ⋮ How to build time-lock encryption ⋮ Fraud risk assessment within blockchain transactions ⋮ The mathematics of Bitcoin ⋮ Modeling and analysis of block arrival times in the Bitcoin blockchain ⋮ Optimal dynamic mining policy of blockchain selfish mining through sensitivity-based optimization ⋮ A Smart Contract for Boardroom Voting with Maximum Voter Privacy ⋮ On reward sharing in blockchain mining pools ⋮ Order-fairness for Byzantine consensus ⋮ Practical quantum Byzantine protocol via nearly optimal entanglement resources ⋮ Smart Contract Execution - the (+-)-Biased Ballot Problem. ⋮ Analysis of the Blockchain Protocol in Asynchronous Networks
Cites Work
This page was built for publication: Majority Is Not Enough: Bitcoin Mining Is Vulnerable