{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:53:02Z","timestamp":1743083582144,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662643303"},{"type":"electronic","value":"9783662643310"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_13","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T23:16:12Z","timestamp":1634944572000},"page":"250-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["HaPPY-Mine: Designing a Mining Reward Function"],"prefix":"10.1007","author":[{"given":"Lucianna","family":"Kiffer","sequence":"first","affiliation":[]},{"given":"Rajmohan","family":"Rajaraman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"13_CR1","unstructured":"Here\u2019s how much it costs to mine a single bitcoin in your country. https:\/\/www.marketwatch.com\/story\/heres-how-much-it-costs-to-mine-a-single-bitcoin-in-your-country-2018-03-06"},{"key":"13_CR2","unstructured":"Pool distribution. https:\/\/btc.com\/stats\/pool?pool_mode=month3"},{"key":"13_CR3","unstructured":"Top 25 miners by blocks. https:\/\/etherscan.io\/stat\/miner?blocktype=blocks"},{"key":"13_CR4","unstructured":"Arnosti, N., Matthew Weinberg, S.: Bitcoin: a natural oligopoly. In 10th Innovations in Theoretical Computer Science Conference (ITCS 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2018)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-78375-8_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"C Badertscher","year":"2018","unstructured":"Badertscher, C., Garay, J., Maurer, U., Tschudi, D., Zikas, V.: But why does it work? A rational protocol design treatment of bitcoin. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 34\u201365. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_2"},{"key":"13_CR6","unstructured":"Beccuti, J., Jaag, C., et al.: The bitcoin mining game: on the optimality of honesty in proof-of-work consensus mechanism. Swiss Economics Working Paper 0060 (2017)"},{"issue":"5","key":"13_CR7","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1093\/rfs\/hhy095","volume":"32","author":"B Biais","year":"2019","unstructured":"Biais, B., Bisiere, C., Bouvard, M., Casamatta, C.: The blockchain folk theorem. Rev. Fin. Stud. 32(5), 1662\u20131715 (2019)","journal-title":"Rev. Fin. Stud."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Carlsten, M., Kalodner, H., Matthew Weinberg, S., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154\u2013167 (2016)","DOI":"10.1145\/2976749.2978408"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Chen, X., Papadimitriou, C., Roughgarden, T.: An axiomatic approach to block rewards. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 124\u2013131 (2019)","DOI":"10.1145\/3318041.3355470"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Garay, J., Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Rational protocol design: cryptography against incentive-driven adversaries. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 648\u2013657. IEEE (2013)","DOI":"10.1109\/FOCS.2013.75"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency?. IEEE Secur. Privacy 12(3), 54\u201360 (2014)","DOI":"10.1109\/MSP.2014.49"},{"key":"13_CR12","unstructured":"Iyidogan, E.: An equilibrium model of blockchain-based cryptocurrencies. Available at SSRN 3152803 (2019)"},{"key":"13_CR13","unstructured":"Kenton, W.: Satoshi Nakamoto. https:\/\/www.investopedia.com\/terms\/s\/satoshi-nakamoto.asp"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Kiffer, L., Rajaraman, R.: Happy-mine: designing a mining reward function. arXiv e-prints, pages arXiv-2103 (2021)","DOI":"10.1007\/978-3-662-64331-0_13"},{"key":"13_CR15","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013, p. 11 (2013)"},{"key":"13_CR16","series-title":"Springer Proceedings in Business and Economics","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-030-37110-4_13","volume-title":"Mathematical Research for Blockchain Economy","author":"N Leonardos","year":"2020","unstructured":"Leonardos, N., Leonardos, S., Piliouras, G.: Oceanic games: centralization risks and incentives in blockchain mining. In: Pardalos, P., Kotsireas, I., Guo, Y., Knottenbelt, W. (eds.) Mathematical Research for Blockchain Economy. SPBE, pp. 183\u2013199. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-37110-4_13"},{"key":"13_CR17","unstructured":"Li, Z.: A Max Reppen, and Ronnie Sircar. A mean field games model for cryptocurrency mining. arXiv preprint arXiv:1912.01952 (2019)"},{"key":"13_CR18","unstructured":"Redman, J.: Bitcoin\u2019s early days: how crypto\u2019s past is much different than the present. https:\/\/news.bitcoin.com\/bitcoins-early-days-how-cryptos-past-is-much-different-than-the-present\/"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-662-54970-4_30","volume-title":"Financial Cryptography and Data Security","author":"A Sapirshtein","year":"2017","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515\u2013532. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-662-54970-4_28","volume-title":"Financial Cryptography and Data Security","author":"O Schrijvers","year":"2017","unstructured":"Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T.: Incentive compatibility of bitcoin mining pool reward functions. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 477\u2013498. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_28"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Tsabary, I., Eyal, I.: The gap game. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 713\u2013728 (2018)","DOI":"10.1145\/3243734.3243737"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T12:55:30Z","timestamp":1673614530000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}