{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:20:22Z","timestamp":1759332022237},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030371098"},{"type":"electronic","value":"9783030371104"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37110-4_13","type":"book-chapter","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T14:04:03Z","timestamp":1581602643000},"page":"183-199","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Oceanic Games: Centralization Risks and Incentives in Blockchain Mining"],"prefix":"10.1007","author":[{"given":"Nikos","family":"Leonardos","sequence":"first","affiliation":[]},{"given":"Stefanos","family":"Leonardos","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Piliouras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","unstructured":"Arnosti, N., Weinberg, S.M.: Bitcoin: A natural oligopoly. In: 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, pp. 5:1\u20135:1. San Diego, USA (2019). \nhttps:\/\/doi.org\/10.4230\/LIPIcs.ITCS.2019.5","DOI":"10.4230\/LIPIcs.ITCS.2019.5"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Aumann, R.J.: Markets with a continuum of traders. Econometrica 32(1\/2), 39\u201350 (1964)","DOI":"10.2307\/1913732"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Badertscher, C., Garay, J., Maurer, U., Tschudi, D., Zikas, V.: But why does it work? a rational protocol design treatment of bitcoin. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology\u2014EUROCRYPT 2018, pp. 34\u201365. Springer International Publishing, Cham (2018)","DOI":"10.1007\/978-3-319-78375-8_2"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Badertscher, C., Ga\u017ei, P., Kiayias, A., Russell, A., Zikas, V.: Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 913\u2013930. CCS \u201918, ACM, USA (2018). \nhttps:\/\/doi.org\/10.1145\/3243734.3243848","DOI":"10.1145\/3243734.3243848"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Bentov, I., Gabizon, A., Mizrahi, A.: Cryptocurrencies Without Proof of Work. In: Clark, J., Meiklejohn, S., Ryan, P.Y., Wallach, D., Brenner, M., Rohloff, K. (eds.) Financial Cryptography and Data Security, pp. 142\u2013157. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: Hostile blockchain takeovers (short paper). In: Proceedings of the 5th IFCA Workshop on Bitcoin and Blockchain Research (2018)","DOI":"10.1007\/978-3-662-58820-8_7"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Felten, E., Goldfeder, S., Kroll, J., Narayanan, A.: Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus. In: Financial Cryptography Workshops (2016)","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104\u2013121 (2015). \nhttps:\/\/doi.org\/10.1109\/SP.2015.14","DOI":"10.1109\/SP.2015.14"},{"key":"13_CR9","unstructured":"Br\u00fcnjes, L., Kiayias, A., Koutsoupias, E., Stouka, A.P.: Reward Sharing Schemes for Stake Pools (2018). \narXiv:1807.11218"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Buterin, V., Reijsbergen, D., Leonardos, S., Piliouras, G.: Incentives in Ethereum\u2019s hybrid casper protocol. In: ICBC 2019. Seoul, Korea (2019). \nhttps:\/\/doi.org\/10.1109\/BLOC.2019.8751241","DOI":"10.1109\/BLOC.2019.8751241"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) Financial Cryptography and Data Security, pp. 436\u2013454. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Eyal, I.: The Miner\u2019s Dilemma. In: Proceedings of the 2015 IEEE Symposium on Security and Privacy. SP \u201915, pp. 89\u2013103. IEEE Computer Society, USA (2015). \nhttps:\/\/doi.org\/10.1109\/SP.2015.13","DOI":"10.1109\/SP.2015.13"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Fanti, G., Kogan, L., Oh, S., Ruan, K., Viswanath, P., Wang, G.: Compounding of Wealth in Proof-of-Stake Cryptocurrencies (2018). ArXiv e-prints","DOI":"10.1007\/978-3-030-32101-7_3"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Fisch, B., Pass, R., Shelat, A.: Socially optimal mining pools. In: R. Devanur, N., Lu, P. (eds.) Web and Internet Economics, pp. 205\u2013218. Springer International Publishing, Cham (2017)","DOI":"10.1007\/978-3-319-71924-5_15"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The Bitcoin backbone protocol: analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 281\u2013310. Springer, Berlin (2015)","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The Bitcoin backbone protocol with chains of variable difficulty. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology - CRYPTO 2017, pp. 291\u2013323. Springer International Publishing, Cham (2017)","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"13_CR17","unstructured":"Garay, J.A., Kiayias, A., Leonardos, N., Panagiotakos, G.: Bootstrapping the blockchain, with applications to consensus and fast PKI setup. In: Public Key Cryptography (2018). \nhttps:\/\/eprint.iacr.org\/2016\/991"},{"key":"13_CR18","doi-asserted-by":"publisher","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: Scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles. SOSP \u201917, pp. 51\u201368. ACM, USA (2017). \nhttps:\/\/doi.org\/10.1145\/3132747.3132757","DOI":"10.1145\/3132747.3132757"},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Hauert, C., De Monte, S., Hofbauer, J., Sigmund, K.: Volunteering as Red Queen Mechanism for Cooperation in Public Goods Games. Science 296(5570), 1129\u20131132 (2002). \nhttps:\/\/doi.org\/10.1126\/science.1070582","DOI":"10.1126\/science.1070582"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against bitcoin mining pools. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) Financial Cryptography and Data Security, pp. 72\u201386. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: ouroboros: A provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology \u2013CRYPTO 2017. pp. 357\u2013388. Springer International Publishing, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-63688-7_12","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Koutsoupias, E., Kyropoulou, M., Tselekounis, Y.: Blockchain mining games. In: Proceedings of the 2016 ACM Conference on Economics and Computation, pp. 365\u2013382. ACM, USA (2016)","DOI":"10.1145\/2940716.2940773"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Kleinberg, R., Piliouras, G., Tardos, E.: Multiplicative updates outperform generic no-regret learning in congestion games: extended abstract. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. STOC \u201909, pp. 533\u2013542. ACM, USA (2009). \nhttps:\/\/doi.org\/10.1145\/1536414.1536487","DOI":"10.1145\/1536414.1536487"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: When Bitcoin mining pools run dry. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) Financial Cryptography and Data Security, pp. 63\u201377. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-662-48051-9_5"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Leonardos, S., Reijsbergen, D., Piliouras, G.: Weighted voting on the blockchain: Improving consensus in proof of stake protocols. In: ICBC 2019. Seoul, Korea (2019). \nhttps:\/\/doi.org\/10.1109\/BLOC.2019.8751290","DOI":"10.1109\/BLOC.2019.8751290"},{"key":"13_CR26","unstructured":"Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., Rosenschein, J.S.: Bitcoin mining pools: a cooperative game theoretic analysis. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. AAMAS \u201915, pp. 919\u2013927. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC (2015)"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Milnor, J.W., Shapley, L.S.: Values of Large Games II: Oceanic Games. Mathematics of Operations Research 3(4), 290\u2013307 (1978). \nhttps:\/\/doi.org\/10.1287\/moor.3.4.290","DOI":"10.1287\/moor.3.4.290"},{"key":"13_CR28","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). \nhttps:\/\/bitcoin.org\/bitcoin.pdf\n\n. [Accessed: 14 Nov 2018]"},{"key":"13_CR29","doi-asserted-by":"publisher","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS P), pp. 305\u2013320 (2016). \nhttps:\/\/doi.org\/10.1109\/EuroSP.2016.32","DOI":"10.1109\/EuroSP.2016.32"},{"key":"13_CR30","doi-asserted-by":"publisher","unstructured":"Pass, R., Shi, E.: Thunderella: blockchains with optimistic instant confirmation. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology\u2014EUROCRYPT 2018, pp. 3\u201333. Springer International Publishing, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-78375-8_1","DOI":"10.1007\/978-3-319-78375-8_1"},{"key":"13_CR31","doi-asserted-by":"publisher","unstructured":"Shapiro, N.Z., Shapley, L.S.: Values of large games, I: a limit theorem. Math. Oper. Res. 3(1), 1\u20139 (1978). \nhttps:\/\/doi.org\/10.1287\/moor.3.1.1","DOI":"10.1287\/moor.3.1.1"},{"key":"13_CR32","doi-asserted-by":"publisher","unstructured":"Shapley, L.S.: A value for n-person games. In: Roth, A.E. (ed.) The shapley value: essays in Honor of Lloyd S. Shapley, pp. 31\u201340. Cambridge University Press, Cambridge (1988). \nhttps:\/\/doi.org\/10.1017\/CBO9780511528446.003","DOI":"10.1017\/CBO9780511528446.003"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Shitovitz, B.: Oligopoly in markets with a continuum of traders. Econometrica 41(3), 467\u2013501 (1973)","DOI":"10.2307\/1913371"},{"key":"13_CR34","doi-asserted-by":"publisher","unstructured":"Sompolinsky, Y., Zohar, A.: Bitcoin\u2019s Underlying Incentives. Commun. ACM 61(3), 46\u201353 (2018). \nhttps:\/\/doi.org\/10.1145\/3152481","DOI":"10.1145\/3152481"},{"key":"13_CR35","doi-asserted-by":"publisher","unstructured":"Wong, T.: An application of game theory to corporate governance. Omega 17(1), 59\u201367 (1989). \nhttps:\/\/doi.org\/10.1016\/0305-0483(89)90021-2","DOI":"10.1016\/0305-0483(89)90021-2"},{"key":"13_CR36","unstructured":"Zeigler, B., Praehofer, H., Kim, T.: Theory of Modeling and Simulation: Integrating Discrete Event and Continuous Complex Dynamic Systems, 2nd edn. Academic Press (2000)"}],"container-title":["Springer Proceedings in Business and Economics","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37110-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T14:06:00Z","timestamp":1581602760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37110-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030371098","9783030371104"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37110-4_13","relation":{},"ISSN":["2198-7246","2198-7254"],"issn-type":[{"type":"print","value":"2198-7246"},{"type":"electronic","value":"2198-7254"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}