{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:32:42Z","timestamp":1767339162768,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_18","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"316-333","source":"Crossref","is-referenced-by-count":24,"title":["Merged Mining: Curse or Cure?"],"prefix":"10.1007","author":[{"given":"Aljosha","family":"Judmayer","sequence":"first","affiliation":[]},{"given":"Alexei","family":"Zamyatin","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Stifter","sequence":"additional","affiliation":[]},{"given":"Artemios G.","family":"Voyiatzis","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"18_CR1","unstructured":"Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchains. In: 2016 USENIX Annual Technical Conference (USENIX ATC 2016), pp. 181\u2013194. USENIX Association, Denver (2016)"},{"key":"18_CR2","unstructured":"Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains (2016). \nhttp:\/\/arxiv.org\/pdf\/1606.06530.pdf\n\n. Accessed 10 Nov 2016"},{"key":"18_CR3","unstructured":"Androulaki, E., Capkun, S., Karame, G.O.: Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin. In: CCS (2012)"},{"key":"18_CR4","unstructured":"Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., Poelstra, A., Tim\u00f3n, J., Wuille, P.: Enabling blockchain innovations with pegged sidechains (2014). \nhttp:\/\/newspaper23.com\/ripped\/2014\/11\/http:www-blockstream-com-sidechains.pdf\n\n. Accessed 10 Nov 2016"},{"key":"18_CR5","unstructured":"Bentov, I., Pass, R., Shi, E.: Snow white: provably secure proofs of stake (2016). \nhttps:\/\/eprint.iacr.org\/2016\/919.pdf"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/P2P.2013.6688704"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-319-11212-1_18","volume-title":"Computer Security - ESORICS 2014","author":"C Decker","year":"2014","unstructured":"Decker, C., Wattenhofer, R.: Bitcoin transaction malleability and MtGox. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 313\u2013326. Springer, Cham (2014). doi:\n10.1007\/978-3-319-11212-1_18"},{"key":"18_CR8","unstructured":"Dogecoin community. Dogecoin reference implementation. \ngithub.com\/dogecoin\/dogecoin\n\n. Accessed 10 Nov 2016"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Eyal, I.: The miner\u2019s dilemma. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 89\u2013103. IEEE (2015)","DOI":"10.1109\/SP.2015.13"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-45472-5_28"},{"key":"18_CR11","volume-title":"Cryptography, Engineering and Economics","author":"P Franco","year":"2014","unstructured":"Franco, P., Bitcoin, U.: Cryptography, Engineering and Economics. Wiley, New York (2014)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 3\u201316. ACM, New York (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"18_CR13","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 129\u2013144 (2015)"},{"key":"18_CR14","unstructured":"Huntercoin developers. Huntercoin reference implementation. \nhttps:\/\/github.com\/chronokings\/huntercoin\n\n. Accessed 05 Jun 2017"},{"key":"18_CR15","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-0-387-35568-9_18","volume-title":"Secure Information Networks","author":"M Jakobsson","year":"1999","unstructured":"Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols (extended abstract). In: Preneel, B. (ed.) Secure Information Networks. IFIP, vol. 23, pp. 258\u2013272. Springer, Boston (1999). doi:\n10.1007\/978-0-387-35568-9_18"},{"key":"18_CR16","unstructured":"Kalodner, H., Carlsten, M., Ellenbogen, P., Bonneau, J., Narayanan, A.: An empirical study of namecoin and lessons for decentralized namespace design. In: WEIS (2015)"},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"2:1","DOI":"10.1145\/2732196","volume":"18","author":"GO Karame","year":"2015","unstructured":"Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., \u010capkun, S.: Misbehavior in bitcoin: a study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1), 2:1\u20132:32 (2015). doi:\n10.1145\/2732196\n\n. Article no 2","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"18_CR18","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol (2016). \nhttps:\/\/pdfs.semanticscholar.org\/1c14\/549f7ba7d6a000d79a7d12255eb11113e6fa.pdf\n\n. Accessed 20 Feb 2017"},{"key":"18_CR19","unstructured":"Lerner, S.D.: Rootstock platform. \nhttp:\/\/www.the-blockchain.com\/docs\/Rootstock-WhitePaper-Overview.pdf\n\n. Accessed 5 Jun 2017"},{"key":"18_CR20","unstructured":"Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., Rosenschein, J.S.: Bitcoin mining pools: a cooperative game theoretic analysis. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 919\u2013927. International Foundation for Autonomous Agents and Multiagent Systems (2015)"},{"key":"18_CR21","unstructured":"Litecoin community. Litecoin reference implementation. \ngithub.com\/litecoin-project\/litecoin\n\n. Accessed 10 Nov 2016"},{"key":"18_CR22","unstructured":"Micali, S.: Algorand: The efficient and democratic ledger (2016). \nhttp:\/\/arxiv.org\/abs\/1607.01341\n\n. Accessed 9 Feb 2017"},{"key":"18_CR23","unstructured":"Myriad core developers. Myriadcoin reference implementation. \nhttps:\/\/github.com\/myriadcoin\/myriadcoin\n\n. Accessed 05 Jun 2017"},{"key":"18_CR24","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, December 2008. \nhttps:\/\/bitcoin.org\/bitcoin.pdf\n\n. Accessed 10 Nov 2016"},{"key":"18_CR25","unstructured":"Nakamoto, S.: Merged mining specification, April 2011. \nen.bitcoin.it\/wiki\/Merged_mining_specification\n\n. Accessed 10 Nov 2016"},{"key":"18_CR26","unstructured":"Namecoin community. Namecoin reference implementation. \nhttps:\/\/github.com\/namecoin\/namecoin\n\n. Accessed 10 Nov 2016"},{"key":"18_CR27","volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 1st IEEE European Symposium on Security and Privacy. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.32"},{"key":"18_CR29","unstructured":"Pass, R., Shi, E.: Hybrid consensus: Scalable permissionless consensus, September 2016. \nhttps:\/\/eprint.iacr.org\/2016\/917.pdf\n\n. Accessed 10 Nov 2016"},{"key":"18_CR30","unstructured":"Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint \narXiv:1112.4980\n\n (2011)"},{"key":"18_CR31","unstructured":"Rosenfeld, M.: Analysis of hashrate-based double spending (2014). \nhttp:\/\/arxiv.org\/abs\/1402.2009\n\n. Accessed 10 Nov 2016"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-662-54970-4_30","volume-title":"Financial Cryptography and Data Security","author":"A Sapirshtein","year":"2017","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515\u2013532. Springer, Heidelberg (2017). doi:\n10.1007\/978-3-662-54970-4_30"},{"key":"18_CR33","unstructured":"Nakamoto, S.: Comment in \u201cbitdns and generalizing bitcoin\u201d bitcointalk thread. \nhttps:\/\/bitcointalk.org\/index.php?topic=1790.msg28696#msg28696\n\n. Accessed 05 Jun 2017"},{"key":"18_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-662-54970-4_28","volume-title":"Financial Cryptography and Data Security","author":"O Schrijvers","year":"2017","unstructured":"Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 477\u2013498. Springer, Heidelberg (2017). doi:\n10.1007\/978-3-662-54970-4_28"},{"key":"18_CR35","unstructured":"Taylor, M.B.: Bitcoin and the age of bespoke silicon. In: Proceedings of the 2013 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, p. 16. IEEE Press (2013)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T19:16:10Z","timestamp":1534878970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}