{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:32:30Z","timestamp":1760239950399,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032079008","type":"print"},{"value":"9783032079015","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07901-5_22","type":"book-chapter","created":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:29:44Z","timestamp":1760185784000},"page":"433-451","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Premining in\u00a0the\u00a0Shadows: How Hidden Blocks Weaken the\u00a0Security of\u00a0Proof-of-Work Chains"],"prefix":"10.1007","author":[{"given":"Wanying","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Lijia","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,12]]},"reference":[{"issue":"8","key":"22_CR1","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1073\/pnas.38.8.716","volume":"38","author":"R Bellman","year":"1952","unstructured":"Bellman, R.: On the theory of dynamic programming. Proc. Natl. Acad. Sci. 38(8), 716\u2013719 (1952)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"6","key":"22_CR2","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1090\/S0002-9904-1954-09848-8","volume":"60","author":"R Bellman","year":"1954","unstructured":"Bellman, R.: The theory of dynamic programming. Bull. Am. Math. Soc. 60(6), 503\u2013515 (1954)","journal-title":"Bull. Am. Math. Soc."},{"issue":"3731","key":"22_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1126\/science.153.3731.34","volume":"153","author":"R Bellman","year":"1966","unstructured":"Bellman, R.: Dynamic programming. Science 153(3731), 34\u201337 (1966)","journal-title":"Science"},{"key":"22_CR4","unstructured":"Cash, B.: Bitcoin cash. Development 2 (2019)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Chen, W., Wu, J., Zheng, Z., Chen, C., Zhou, Y.: Market manipulation of bitcoin: Evidence from mining the Mt. Gox transaction network. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 964\u2013972. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737364"},{"key":"22_CR6","unstructured":"Coinbase: Coinbase\u2019s perspective on the recent ethereum classic (etc) double spend (2020). https:\/\/www.coinbase.com\/blog\/coinbases-perspective-on-the-recent-ethereum-classic-etc-double-spend"},{"key":"22_CR7","unstructured":"coindesk.com: Coindesk (2025). https:\/\/www.coindesk.com"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"issue":"3","key":"22_CR9","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1017\/S026996482100005X","volume":"36","author":"C Grunspan","year":"2022","unstructured":"Grunspan, C., P\u00e9rez-Marco, R.: On profitability of nakamoto double spend. Probab. Eng. Inf. Sci. 36(3), 732\u2013746 (2022)","journal-title":"Probab. Eng. Inf. Sci."},{"issue":"1","key":"22_CR10","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/asi3010007","volume":"3","author":"J Hinz","year":"2020","unstructured":"Hinz, J.: Resilience analysis for double spending via sequential decision optimization. Appl. Syst. Innov. 3(1), 7 (2020)","journal-title":"Appl. Syst. Innov."},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Hinz, J., Taylor, P.: A note on optimal double spending attacks. In: de Gier, J., Praeger, C., Tao, T. (eds) 2017 MATRIX Annals. MBS, vol. 2, pp. 545\u2013551. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-04161-8_47","DOI":"10.1007\/978-3-030-04161-8_47"},{"issue":"2","key":"22_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3441692","volume":"54","author":"H Huang","year":"2021","unstructured":"Huang, H., Kong, W., Zhou, S., Zheng, Z., Guo, S.: A survey of state-of-the-art on blockchains: theories, modelings, and tools. ACM Comput. Surv. (CSUR) 54(2), 1\u201342 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"22_CR13","unstructured":"Jang, J., Lee, H.: Profitable double-spending attacks. CoRR abs\/1903.01711 (2019). http:\/\/arxiv.org\/abs\/1903.01711"},{"key":"22_CR14","unstructured":"Liao, K., Katz, J.: Incentivizing double-spend collusion in bitcoin. In: Financial Cryptography Bitcoin Workshop (2017)"},{"key":"22_CR15","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decent. Bus. Rev. 21260 (2008)"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.entcs.2016.12.006","volume":"329","author":"C Pinz\u00f3n","year":"2016","unstructured":"Pinz\u00f3n, C., Rocha, C.: Double-spend attack models with time advantange for bitcoin. Electron. Notes Theor. Comput. Sci. 329, 79\u2013103 (2016)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"22_CR17","first-page":"331","volume":"2","author":"ML Puterman","year":"1990","unstructured":"Puterman, M.L.: Markov decision processes. Handb. Oper. Res. Manage. Sci. 2, 331\u2013434 (1990)","journal-title":"Handb. Oper. Res. Manage. Sci."},{"key":"22_CR18","unstructured":"Reed, J.: Litecoin: an introduction to litecoin cryptocurrency and litecoin mining (2017)"},{"key":"22_CR19","unstructured":"Rosenfeld, M.: Analysis of hashrate-based double spending. CoRR abs\/1402.2009 (2014). http:\/\/arxiv.org\/abs\/1402.2009"},{"key":"22_CR20","unstructured":"Ross, S.M.: Introduction to Stochastic Dynamic Programming. Academic Press (2014)"},{"key":"22_CR21","unstructured":"Sompolinsky, Y., Zohar, A.: Bitcoin\u2019s security model revisited. arXiv preprint arXiv:1605.09193 (2016)"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Zheng, J., Huang, H., Li, C., Zheng, Z., Guo, S.: Revisiting double-spending attacks on the bitcoin blockchain: New findings. In: 2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/IWQOS52092.2021.9521306"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Zheng, J., Huang, H., Zheng, Z., Guo, S.: Adaptive double-spending attacks on pow-based blockchains. IEEE Trans. Dependable Secure Comput. (2023)","DOI":"10.1109\/TDSC.2023.3268668"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07901-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:29:48Z","timestamp":1760185788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07901-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"ISBN":["9783032079008","9783032079015"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07901-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"12 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}