{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:41:44Z","timestamp":1743028904650,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319996592"},{"type":"electronic","value":"9783319996608"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99660-8_20","type":"book-chapter","created":{"date-parts":[[2018,8,26]],"date-time":"2018-08-26T18:19:21Z","timestamp":1535307561000},"page":"226-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Hashing Power Allocation Game in Cryptocurrencies"],"prefix":"10.1007","author":[{"given":"Yukun","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Donglei","family":"Du","sequence":"additional","affiliation":[]},{"given":"Qiaoming","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Ahmadinejad, A.M., Dehghani, S., Hajiaghayi, M.T., Lucier, B., Mahini, H., Seddighin, S.: Computing equilibria of blotto and other games, from duels to battefields (2016)","DOI":"10.1609\/aaai.v30i1.10036"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1287\/opre.2017.1635","volume":"65","author":"S Alpern","year":"2017","unstructured":"Alpern, S., Howard, J.V.: Winner-take-all games: the strategic optimisation of rank. Oper. Res. 65, 1165\u20131176 (2017)","journal-title":"Oper. Res."},{"key":"20_CR3","unstructured":"AntPool. https:\/\/www.antpool.com\/"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Biais, B., Bisiere, C., Bouvard, M., Casamatta, C.: The Blockchain Folk Theorem. In: Social Science Electronic Publishing (2017)","DOI":"10.2139\/ssrn.3108601"},{"key":"20_CR5","unstructured":"Bitcoin. https:\/\/bitcoin.org\/en\/"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives and challenges for bitcoin and cryptocurrencies to appear. pp. 104\u2013121 (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"20_CR7","unstructured":"BTC.com. https:\/\/btc.com\/"},{"key":"20_CR8","unstructured":"BTC.TOP. http:\/\/btc.top\/"},{"key":"20_CR9","unstructured":"Ethereum. https:\/\/www.ethereum.org\/"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Eyal, I.: The Miner\u2019s Dilemma, pp. 89\u2013103. Computer Science (2015)","DOI":"10.1109\/SP.2015.13"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Eprint Arxiv 8437, 436\u2013454 (2013)","DOI":"10.1007\/978-3-662-45472-5_28"},{"issue":"8","key":"20_CR12","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/TPDS.2008.168","volume":"20","author":"M Feldman","year":"2009","unstructured":"Feldman, M., Lai, K., Zhang, L.: The proportional-share allocation market for computational resources. IEEE Trans. Parallel Distrib. Syst. 20(8), 1075\u20131088 (2009)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Fisch, B., Pass, R., Shelat, A.: Socially optimal mining pools. In: International Conference on Web and Internet Economics, pp. 205\u2013218 (2017)","DOI":"10.1007\/978-3-319-71924-5_15"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"G\u00f6bel, J., Keeler, H.P., Krzesinski, A.E., Taylor, P.G.: Bitcoin blockchain dynamics: the selfish-mine strategy in the presence of propagation delay. Perform. Eval. 104, 23\u201341 (2016)","DOI":"10.1016\/j.peva.2016.07.001"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Goldberg, L.A., Goldberg, P.W., Krysta, P., Ventre, C.: Ranking games that have competitiveness-based strategies. In: ACM Conference on Electronic Commerce, pp. 335\u2013344 (2010)","DOI":"10.1145\/1807342.1807396"},{"issue":"3\u20134","key":"20_CR16","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s00182-007-0099-9","volume":"36","author":"S Hart","year":"2008","unstructured":"Hart, S.: Discrete colonel blotto and general lotto games. Int. J. Game Theory 36(3\u20134), 441\u2013460 (2008)","journal-title":"Int. J. Game Theory"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Koutsoupias, E., Kyropoulou, M., Tselekounis ,Y.: Blockchain mining games. In: ACM Conference on Economics and Computation, pp. 365\u2013382 (2016)","DOI":"10.1145\/2940716.2940773"},{"issue":"1","key":"20_CR18","first-page":"77","volume":"7","author":"H Markowitz","year":"1952","unstructured":"Markowitz, H.: Portfolio selection. J. Financ. 7(1), 77\u201391 (1952)","journal-title":"J. Financ."},{"key":"20_CR19","volume-title":"Microeconomic Theory","author":"A Mas-Colell","year":"1995","unstructured":"Mas-Colell, A., Whinston, M.D., Green, J.R.: Microeconomic Theory. Oxford University Press, Oxford (1995)"},{"key":"20_CR20","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: ACM Sigsac Conference on Computer and Communications Security, pp. 154\u2013167 (2016)","DOI":"10.1145\/2976749.2978408"},{"key":"20_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481","volume-title":"Algorithmic Game Theory","author":"N Nisan","year":"2007","unstructured":"Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)"},{"key":"20_CR23","unstructured":"Proof of burn. https:\/\/en.bitcoin.it\/wiki\/proofofburn"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Parham, R.: The predictable cost of bitcoin. Social Science Electronic Publishing (2017)","DOI":"10.2139\/ssrn.3080586"},{"key":"20_CR25","unstructured":"Slush Pool. https:\/\/slushpool.com\/home\/"},{"key":"20_CR26","unstructured":"Ripple. https:\/\/ripple.com\/"},{"issue":"1","key":"20_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00199-005-0071-5","volume":"29","author":"B Roberson","year":"2006","unstructured":"Roberson, B.: The colonel blotto game. Econ. Theory 29(1), 1\u201324 (2006)","journal-title":"Econ. Theory"},{"issue":"3","key":"20_CR28","doi-asserted-by":"publisher","first-page":"520","DOI":"10.2307\/1911749","volume":"33","author":"JB Rosen","year":"1965","unstructured":"Rosen, J.B.: Existence and uniqueness of equilibrium points for concave n-person games. Econometrica 33(3), 520\u2013534 (1965)","journal-title":"Econometrica"},{"key":"20_CR29","unstructured":"Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. Computer Science, December (2011)"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Saleh, F.: Blockchain without waste: proof-of-stake (2017)","DOI":"10.2139\/ssrn.3183935"},{"issue":"5","key":"20_CR31","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1086\/260616","volume":"85","author":"L Shapley","year":"1977","unstructured":"Shapley, L., Shubik, M.: Trade using one commodity as a means of payment. J. Polit. Econ. 85(5), 937\u2013968 (1977)","journal-title":"J. Polit. Econ."},{"key":"20_CR32","unstructured":"ViaBTC. https:\/\/viabtc.com\/"},{"key":"20_CR33","volume-title":"The Science of the Blockchain","author":"R Wattenhofer","year":"2016","unstructured":"Wattenhofer, R.: The Science of the Blockchain. CreateSpace Independent Publishing Platform, Charleston (2016)"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Game Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99660-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:41:50Z","timestamp":1709833310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99660-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319996592","9783319996608"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99660-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"27 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAGT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Algorithmic Game Theory","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sagt2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/aims.sjtu.edu.cn\/SAGT_2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}