{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:19:17Z","timestamp":1743031157876,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031514784"},{"type":"electronic","value":"9783031514791"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51479-1_15","type":"book-chapter","created":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:02:33Z","timestamp":1704956553000},"page":"285-305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["When is Slower Block Propagation More Profitable for\u00a0Large Miners?"],"prefix":"10.1007","author":[{"given":"Zhichun","family":"Lu","sequence":"first","affiliation":[]},{"given":"Ren","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: 13th ACM Conference on Electronic Commerce, pp. 56\u201373. ACM (2012)","DOI":"10.1145\/2229012.2229022"},{"key":"15_CR2","unstructured":"Bahack, L.: Theoretical Bitcoin attacks with less than half of the computational power (draft). arXiv preprint arXiv:1312.7013 (2013).http:\/\/arxiv.org\/pdf\/1312.7013.pdf"},{"key":"15_CR3","unstructured":"Blockchain: Bitcoin block explorer (2017). http:\/\/blockchain.info\/"},{"key":"15_CR4","unstructured":"Blockchain Luxembourg S.A.: Orphaned blocks - blockchain.info (2019). http:\/\/www.blockchain.com\/btc\/orphaned-blocks"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for Bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy (S &P), pp. 104\u2013121. IEEE (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"15_CR6","unstructured":"Buterin, V.: The limits to blockchain scalability (2021). http:\/\/vitalik.ca\/general\/2021\/05\/23\/scaling.html"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Cao, T., Decouchant, J., Yu, J., Esteves-Verissimo, P.: Characterizing the impact of network delay on bitcoin mining. In: 2021 40th International Symposium on Reliable Distributed Systems (SRDS), pp. 109\u2013119. IEEE (2021)","DOI":"10.1109\/SRDS53918.2021.00020"},{"issue":"9","key":"15_CR8","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1111\/ecog.00888","volume":"37","author":"I Chad\u00e8s","year":"2014","unstructured":"Chad\u00e8s, I., Chapron, G., Cros, M.J., Garcia, F., Sabbadin, R.: Mdptoolbox: a multi-platform toolbox to solve stochastic dynamic programming problems. Ecography 37(9), 916\u2013920 (2014)","journal-title":"Ecography"},{"key":"15_CR9","unstructured":"Corallo, M.: Compact block relay (2016). http:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki"},{"key":"15_CR10","unstructured":"Corallo, M.: Public highly optimized fibre network (2019). http:\/\/bitcoinfibre.org\/public-network.html"},{"key":"15_CR11","unstructured":"DNS Research Group, KASTEL @ KIT: Bitcoin network monitor (2019). http:\/\/dsn.tm.kit.edu\/bitcoin\/"},{"key":"15_CR12","unstructured":"Etherscan: Ethereum ETH blockchain explorer (2019). http:\/\/etherscan.io\/"},{"key":"15_CR13","unstructured":"Ethstats: Ethereum network status (2020). http:\/\/ethstats.net\/"},{"key":"15_CR14","unstructured":"Eyal, I., Sirer, E.G.: How to detect selfish miners (2014). http:\/\/hackingdistributed.com\/2014\/01\/15\/detecting-selfish-mining\/"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Financial Cryptography and Data Security, pp. 436\u2013454. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"15_CR16","unstructured":"Fry, S.: Mandatory activation of segwit deployment. http:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0148.mediawiki. Accessed 01 Sept 2022"},{"key":"15_CR17","unstructured":"IntoTheBlock: intotheblock. http:\/\/www.intotheblock.com. Accessed 01 Sept 2022"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Mao, Y., Venkatakrishnan, S.B.: Less is more: fairness in wide-area proof-of-work blockchain networks (2022). https:\/\/doi.org\/10.48550\/ARXIV.2204.02461. http:\/\/arxiv.org\/abs\/2204.02461","DOI":"10.48550\/ARXIV.2204.02461"},{"key":"15_CR19","unstructured":"mapofcoins: Map of coins: BTC map (2018). http:\/\/mapofcoins.com\/bitcoin"},{"key":"15_CR20","unstructured":"Maxwell, G.: Advances in block propagation (2017). http:\/\/www.youtube.com\/watch?v=EHIuuKCm53o"},{"key":"15_CR21","unstructured":"Miller, A., et al.: Discovering bitcoin\u2019s public topology and influential nodes (2015). http:\/\/www.cs.umd.edu\/projects\/coinscope\/coinscope.pdf"},{"key":"15_CR22","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: IEEE European Symposium on Security and Privacy (EuroS &P), pp. 305\u2013320. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.32"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-030-32101-7_6","volume-title":"Financial Cryptography and Data Security","author":"T Neudecker","year":"2019","unstructured":"Neudecker, T., Hartenstein, H.: Short paper: an empirical analysis of blockchain forks in bitcoin. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 84\u201392. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_6"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-662-54970-4_30","volume-title":"Financial Cryptography and Data Security","author":"A Sapirshtein","year":"2017","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515\u2013532. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30"},{"key":"15_CR26","unstructured":"Voight, F.: P2Pool. http:\/\/p2pool.in. Accessed 09 Sept 2022"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: Modeling the impact of network connectivity on consensus security of proof-of-work blockchain. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 1648\u20131657. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155451"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, R., Preneel, B.: Lay down the common metrics: evaluating proof-of-work consensus protocols\u2019 security. In: 40th IEEE Symposium on Security and Privacy (S &P), pp. 1190\u20131207. IEEE (2019)","DOI":"10.1109\/SP.2019.00086"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, D., Wang, Q., Wu, S., Xie, J., Preneel, B.: NC-Max: breaking the security-performance tradeoff in Nakamoto consensus. In: The Network and Distributed System Security (NDSS) Symposium (2022)","DOI":"10.14722\/ndss.2022.24370"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51479-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:07:19Z","timestamp":1704956839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51479-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514784","9783031514791"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51479-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}