메뉴 건너뛰기




Volumn 104, Issue , 2016, Pages 23-41

Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay

Author keywords

Bitcoin; Block hiding strategies; Blockchain; Honest mining; Selfish mine

Indexed keywords

DISCRETE EVENT SIMULATION; MARKOV PROCESSES; MINERS;

EID: 84990222522     PISSN: 01665316     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.peva.2016.07.001     Document Type: Article
Times cited : (223)

References (17)
  • 2
    • 84916608111 scopus 로고    scopus 로고
    • Majority is not enough: Bitcoin mining is vulnerable
    • Springer Berlin, Heidelberg
    • [2] Eyal, I., Sirer, E.G., Majority is not enough: Bitcoin mining is vulnerable. Financial Cryptography and Data Security, 2013, Springer, Berlin, Heidelberg, 436–454.
    • (2013) Financial Cryptography and Data Security , pp. 436-454
    • Eyal, I.1    Sirer, E.G.2
  • 3
    • 84990238333 scopus 로고    scopus 로고
    • Bitcoin protocol rules. URL.
    • [3] Bitcoin protocol rules. URL http://en.bitcoin.it/wiki/Protocol_rules.
  • 4
    • 84990246267 scopus 로고    scopus 로고
    • Bitcoin orphan blocks. URL.
    • [4] Bitcoin orphan blocks. URL http://blockchain.info/charts/n-orphaned-blocks.
  • 5
    • 84990246482 scopus 로고    scopus 로고
    • Bitcoin: A peer-to-peer electronic cash system. URL.
    • [5] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system. URL http://bitcoins.info/bitcoin-a-peer-to-peer-electroniccash-system-satoshi-nakamoto/.
    • Nakamoto, S.1
  • 6
    • 84990211451 scopus 로고    scopus 로고
    • Analysis of hashrate-based double-spending URL.
    • [6] M. Rosenfeld, Analysis of hashrate-based double-spending, 2014. URL http://arxiv.org/abs/1402.2009.
    • (2014)
    • Rosenfeld, M.1
  • 7
    • 84990247274 scopus 로고    scopus 로고
    • On subversive miner strategies and block withholding attack in bitcoin digital currency. URL.
    • [7] N. Courtois, L. Bahack, On subversive miner strategies and block withholding attack in bitcoin digital currency. URL http://arxiv.org/abs/1402.1718v5.
    • Courtois, N.1    Bahack, L.2
  • 8
    • 84945225920 scopus 로고    scopus 로고
    • Theoretical bitcoin attacks with less than half of the computational power,
    • [8] L. Bahack, Theoretical bitcoin attacks with less than half of the computational power, in: print.iacr.org/2013/868 2013.
    • (2013)
    • Bahack, L.1
  • 9
    • 0001720563 scopus 로고    scopus 로고
    • Dyck path enumeration
    • [9] Deutsch, E., Dyck path enumeration. Discrete Math. 204 (1999), 167–202.
    • (1999) Discrete Math. , vol.204 , pp. 167-202
    • Deutsch, E.1
  • 10
    • 84990175804 scopus 로고    scopus 로고
    • The on-line encyclopedia of integer sequences. URL.
    • [10] The on-line encyclopedia of integer sequences. URL https://oeis.org/.
  • 11
    • 84990184427 scopus 로고    scopus 로고
    • private communication.
    • [11] T. Welsh, private communication.
    • Welsh, T.1
  • 12
    • 77955679798 scopus 로고    scopus 로고
    • Stochastic Geometry and Wireless Networks: Volume 1: Theory, Vol. 1
    • Now Publishers Inc.
    • [12] Baccelli, F., Błaszczyszyn, B., Stochastic Geometry and Wireless Networks: Volume 1: Theory, Vol. 1. 2009, Now Publishers Inc.
    • (2009)
    • Baccelli, F.1    Błaszczyszyn, B.2
  • 13
    • 84990201702 scopus 로고    scopus 로고
    • Spatial interactions of peers and performance of file sharing systems. URL.
    • [13] F. Baccelli, F. Mathieu, I. Norros, Spatial interactions of peers and performance of file sharing systems. URL http://hal.inria.fr/inria-00615523v2.
    • Baccelli, F.1    Mathieu, F.2    Norros, I.3
  • 14
    • 84883121620 scopus 로고    scopus 로고
    • Can p2p networks be super-scalable?
    • IEEE
    • [14] Baccelli, F., Mathieu, F., Norros, I., Varloot, R., Can p2p networks be super-scalable?. INFOCOM, 2013, IEEE, 1753–1761.
    • (2013) INFOCOM , pp. 1753-1761
    • Baccelli, F.1    Mathieu, F.2    Norros, I.3    Varloot, R.4
  • 15
  • 16
    • 0003523893 scopus 로고
    • Poisson Processes
    • Oxford University Press
    • [16] Kingman, J., Poisson Processes. 1993, Oxford University Press.
    • (1993)
    • Kingman, J.1
  • 17
    • 33746605420 scopus 로고    scopus 로고
    • The Java Simulation Handbook–Simulating Discrete Event Systems with UML and Java
    • Shaker Aachen
    • [17] Page, B., Kreutzer, W., The Java Simulation Handbook–Simulating Discrete Event Systems with UML and Java. 2005, Shaker, Aachen.
    • (2005)
    • Page, B.1    Kreutzer, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.