{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:53:14Z","timestamp":1777891994198,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643303","type":"print"},{"value":"9783662643310","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_12","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T19:16:12Z","timestamp":1634930172000},"page":"233-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Ignore the Extra Zeroes: Variance-Optimal Mining Pools"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7163-8306","authenticated-orcid":false,"given":"Tim","family":"Roughgarden","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0587-7181","authenticated-orcid":false,"given":"Clara","family":"Shikhelman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"12_CR1","unstructured":"Arnosti, N., Weinberg, S.M: Bitcoin: a natural oligopoly. arXiv preprint arXiv:1811.08572 (2018)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Azouvi, S., Hicks, A.: Sok: tools for game theoretic models of security for cryptocurrencies. arXiv preprint arXiv:1905.08595 (2019)","DOI":"10.21428\/58320208.8e7f4fab"},{"key":"12_CR3","unstructured":"Buterin, V., et al.: Ethereum: a next-generation smart contract and decentralized application platform (2014). https:\/\/github.com\/ethereum\/wiki\/wiki\/%5BEnglish%5D-White-Paper"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., Papadimitriou, C., Roughgarden, T.: An axiomatic approach to block rewards. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 124\u2013131 (2019)","DOI":"10.1145\/3318041.3355470"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Eyal, I.: The miner\u2019s dilemma. In: 2015 IEEE Symposium on Security and Privacy, pp. 89\u2013103. IEEE (2015)","DOI":"10.1109\/SP.2015.13"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_28"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-319-71924-5_15","volume-title":"Web and Internet Economics","author":"B Fisch","year":"2017","unstructured":"Fisch, B., Pass, R., Shelat, A.: Socially optimal mining pools. In: Devanur, N.R., Lu, P. (eds.) WINE 2017. LNCS, vol. 10660, pp. 205\u2013218. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71924-5_15"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-662-44774-1_6","volume-title":"Financial Cryptography and Data Security","author":"B Johnson","year":"2014","unstructured":"Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against bitcoin mining pools. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 72\u201386. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_6"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Koutsoupias, E., Kyropoulou, M., Tselekounis, Y.: Blockchain mining games. In: Proceedings of the 2016 ACM Conference on Economics and Computation, pp. 365\u2013382 (2016)","DOI":"10.1145\/2940716.2940773"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-48051-9_5","volume-title":"Financial Cryptography and Data Security","author":"A Laszka","year":"2015","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: When bitcoin mining pools run dry. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 63\u201377. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_5"},{"key":"12_CR11","series-title":"Springer Proceedings in Business and Economics","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-030-37110-4_13","volume-title":"Mathematical Research for Blockchain Economy","author":"N Leonardos","year":"2020","unstructured":"Leonardos, N., Leonardos, S., Piliouras, G.: Oceanic games: centralization risks and incentives in blockchain mining. In: Pardalos, P., Kotsireas, I., Guo, Y., Knottenbelt, W. (eds.) Mathematical Research for Blockchain Economy. SPBE, pp. 183\u2013199. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-37110-4_13"},{"key":"12_CR12","unstructured":"Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., Rosenschein, J.S.: Bitcoin mining pools: a cooperative game theoretic analysis. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 919\u2013927. Citeseer (2015)"},{"key":"12_CR13","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report, Manubot (2019)"},{"key":"12_CR14","unstructured":"Paszek, E.: Introduction to statistics (2007)"},{"key":"12_CR15","unstructured":"Romiti, M., Judmayer, A., Zamyatin, A., Haslhofer, B.: A deep dive into bitcoin mining pools: an empirical analysis of mining shares. arXiv preprint arXiv:1905.05999 (2019)"},{"key":"12_CR16","unstructured":"Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)"},{"key":"12_CR17","unstructured":"Rosenfeld, M., et al.: A short note about variance and pool payouts (2011). https:\/\/bitcointalk.org\/index.php?topic=5264.0"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-662-54970-4_28","volume-title":"Financial Cryptography and Data Security","author":"O Schrijvers","year":"2017","unstructured":"Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 477\u2013498. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_28"},{"key":"12_CR19","unstructured":"Shashua, A.: Introduction to machine learning: class notes 67577 (2009)"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang, W., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328\u201322370 (2019)","journal-title":"IEEE Access"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Zamyatin, A., Wolter, K., Werner, S., Harrison, P.G., Mulligan, C.E.A., Knottenbelt, W.J.: Swimming with fishes and sharks: beneath the surface of queue-based Ethereum mining pools. In: 2017 IEEE 25th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 99\u2013109. IEEE (2017)","DOI":"10.1109\/MASCOTS.2017.22"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T20:00:54Z","timestamp":1634932854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}