{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:07:40Z","timestamp":1758586060322,"version":"3.44.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032061751","type":"print"},{"value":"9783032061768","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06176-8_10","type":"book-chapter","created":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T15:57:54Z","timestamp":1758470274000},"page":"149-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Why is it Challenging to\u00a0Overcome, Minimize or\u00a0Regulate MEV?"],"prefix":"10.1007","author":[{"given":"R. K.","family":"Shyamasundar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,22]]},"reference":[{"key":"10_CR1","unstructured":"Alpos, O., Amores-Sesar, I., Cachin, C., Yeo, M.: Eating sandwiches: modular and lightweight elimination of transaction reordering attacks (2023). https:\/\/arxiv.org\/abs\/2307.02954"},{"key":"10_CR2","unstructured":"Baird, L., Harmon, M., Madsen, P.: Hedera: a public hashgraph network & governing council. White paper, V2.1, 15 August 2020"},{"key":"10_CR3","first-page":"87","volume":"1","author":"R Bellman","year":"1958","unstructured":"Bellman, R.: On a routing problem. Qly. Appl. Math. 1, 87\u201390 (1958)","journal-title":"Qly. Appl. Math."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.5750\/jpm.v3i1.451","volume":"3","author":"H Berg","year":"2009","unstructured":"Berg, H., Proebsting, T.A.: Hanson\u2019s automated market maker. J. Pred. Markets 3, 45\u201359 (2009)","journal-title":"J. Pred. Markets"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-319-96884-1_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Gennaro, R., Goldfeder, S., Jain, A., Kim, S., Rasmussen, P.M.R., Sahai, A.: Threshold cryptosystems from threshold fully homomorphic encryption. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 565\u2013596. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_19"},{"key":"10_CR6","unstructured":"Choudhuri, A.R., Garg, S., Piet, J., Policharla, G.V.: Mempool privacy via batched threshold encryption: attacks and defenses. In: Proceedings of the 33rd USENIX Security Symposium. SEC \u201924, USENIX Association, USA (2024)"},{"key":"10_CR7","unstructured":"Daian, P., et al.: Flash boys 2.0: frontrunning, transaction reordering, and consensus instability in decentralized exchanges. CoRR abs\/1904.05234 (2019). http:\/\/arxiv.org\/abs\/1904.05234"},{"key":"10_CR8","first-page":"429","volume":"15","author":"T Dalenius","year":"1977","unstructured":"Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429\u2013444 (1977)","journal-title":"Statistik Tidskrift"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"Y Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307\u2013315. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_28"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Dwork, C., Hardt, M., Pitassi, T., Reingold, O., Zemel, R.: Fairness through awareness. In: ACM Proceedings 3rd Innovations in TCS, pp. 214\u2013226 (2012)","DOI":"10.1145\/2090236.2090255"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Dwork, C., Naor, M.: On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Privacy Confident. 2(1) (2010). https:\/\/doi.org\/10.29012\/jpc.v2i1.585","DOI":"10.29012\/jpc.v2i1.585"},{"key":"10_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-43725-1_13","volume-title":"Financial Cryptography and Data Security","author":"S Eskandari","year":"2020","unstructured":"Eskandari, S., Moosavi, S., Clark, J.: SOK: transparent dishonesty: front-running attacks on blockchain. In: Bracciali, A., Clark, J., Pintore, F., R\u00f8nne, P.B., Sala, M. (eds.) Financial Cryptography and Data Security. LNCS, pp. 170\u2013189. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43725-1_13"},{"key":"10_CR13","unstructured":"Kelkar, M., Deb, S., Long, S., Juels, A., Kannan, S.: Themis: fast, strong order-fairness in byzantine consensus. Cryptology ePrint Archive, Paper 2021\/1465 (2021). https:\/\/eprint.iacr.org\/2021\/1465"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858 (2016). https:\/\/doi.org\/10.1109\/SP.2016.55","DOI":"10.1109\/SP.2016.55"},{"key":"10_CR15","unstructured":"Lin, T.C.: The new market manipulation. Emory L. J. 1253 66 (2017). https:\/\/scholarlycommons.law.emory.edu\/elj\/vol66\/iss6\/1"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Peduzzi, G., James, J., Xu, J.: Jack the rippler: arbitrage on the decentralized exchange of the xrp ledger. In: 2021 3rd Conference on Blockchain Research Applications for Innovative Networks and Services(BRAINS). pp.\u00a01\u20132 (2021). https:\/\/doi.org\/10.1109\/BRAINS52497.2021.9569833","DOI":"10.1109\/BRAINS52497.2021.9569833"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Pillai, B.: Blockchain mev minimisation solution with price guarantee reward. TechRxiv (2022)","DOI":"10.36227\/techrxiv.21345306"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Santis, A.D., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function securely. In: Leighton, F.T., Goodrich, M.T. (eds.) Proceedings of the 26th Annual ACM Symp. on Theory of Computing, 23-25 May 1994, Montr\u00e9al, Qu\u00e9bec,. pp. 522\u2013533 (1994)","DOI":"10.1145\/195058.195405"},{"key":"10_CR19","unstructured":"Schwartz, D., Youngs, N., Britto, A.: The ripple protocol consensus algorithm. In: Ripple Inc., White Paper (2014)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Shyamasundar, R.K.: Characterization of consensus correctness in ripple (XRP) networks. In: Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024, Dijon, France, July 8-10, 2024, pp. 103\u2013113. SCITEPRESS (2024)","DOI":"10.5220\/0012759300003767"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Tumas, V., Pontiveros, B.B.F., Torres, C.F., State, R.: A ripple for change: analysis of frontrunning in the XRP ledger. In: 2023 IEEE International Conference ICBC, pp.\u00a01\u20139 (2023)","DOI":"10.1109\/ICBC56567.2023.10174999"},{"key":"10_CR22","volume-title":"Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery","author":"G Weikum","year":"2001","unstructured":"Weikum, G., Vossen, G.: Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery. Morgan Kaufmann Publishers Inc., San Francisco (2001)"},{"key":"10_CR23","unstructured":"Xu, J., Livshits, B.: The anatomy of a cryptocurrency pump-and-dump scheme. In: Proceedings of the 28th USENIX Conference on Security Symposium, pp. 1609\u20131625. USENIX Association, USA (2019)"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-030-59638-5_8","volume-title":"Blockchain \u2013 ICBC 2020","author":"X Xu","year":"2020","unstructured":"Xu, X., Bandara, H.M.N.D., Lu, Q., Zhang, D., Zhu, L.: Understanding and handling blockchain uncertainties. In: Chen, Z., Cui, L., Palanisamy, B., Zhang, L.-J. (eds.) ICBC 2020. LNCS, vol. 12404, pp. 108\u2013124. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59638-5_8"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Zarbafian, P., Gramoli, V.: Lyra: fast and scalable resilience to reordering attacks in blockchains. In: 2023 IEEE IPDPS, pp. 929\u2013939 (2023)","DOI":"10.1109\/IPDPS54959.2023.00097"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, W., Luo, S., Gong, T., Hong, Z., Kate, A.: Front-running attack in sharded blockchains and fair cross-shard consensus. In: 31st NDSS San Diego (2024)","DOI":"10.14722\/ndss.2024.23197"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Zhou, L., Qin, K., Torres, C., Le, D., Gervais, A.: High-frequency trading on decentralized on-chain exchanges, pp. 428\u2013445 (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00027","DOI":"10.1109\/SP40001.2021.00027"}],"container-title":["Lecture Notes in Computer Science","Blockchain \u2013 ICBC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06176-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T22:03:19Z","timestamp":1758492199000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06176-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,22]]},"ISBN":["9783032061751","9783032061768"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06176-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,22]]},"assertion":[{"value":"22 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icbc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}