{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:31:10Z","timestamp":1774539070572,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"crossref","award":["grant 682\/18"],"award-info":[{"award-number":["grant 682\/18"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"crossref"}]},{"name":"European Research Council"},{"name":"Cyber Security Research Center at Ben-Gurion University"},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"crossref","award":["2137\/19"],"award-info":[{"award-number":["2137\/19"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10207-020-00493-9","type":"journal-article","created":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T10:02:54Z","timestamp":1584180174000},"page":"291-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["On the insecurity of quantum Bitcoin mining"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7567-3822","authenticated-orcid":false,"given":"Or","family":"Sattath","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,14]]},"reference":[{"key":"493_CR1","unstructured":"Aggarwal, D.,\u00a0Brennen, G.,\u00a0Lee, T.,\u00a0Santha, M.,\u00a0Tomamichel, M.: Quantum attacks on bitcoin, and how to protect against them. Ledger 3 (2018). arXiv:1710.10377"},{"key":"493_CR2","unstructured":"Bahack, L.: Theoretical Bitcoin attacks with less than half of the computational power (draft) (2013). arXiv:1312.7013"},{"issue":"5","key":"493_CR3","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1137\/S0097539796300933","volume":"26","author":"CH Bennett","year":"1997","unstructured":"Bennett, C.H., Bernstein, E., Brassard, G., Vazirani, U.V.: Strengths and weaknesses of quantum computing. SIAM J. Comput. 26(5), 1510\u20131523 (1997). arXiv:quant-ph\/9701001","journal-title":"SIAM J. Comput."},{"issue":"4\u20135","key":"493_CR4","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1002\/(SICI)1521-3978(199806)46:4\/5<493::AID-PROP493>3.0.CO;2-P","volume":"46","author":"M Boyer","year":"1998","unstructured":"Boyer, M., Brassard, G., H\u00f8yer, P., Tapp, A.: Tight bounds on quantum searching. Fortschr. Phys. 46(4\u20135), 493\u2013505 (1998). arXiv:quant-ph\/9605034","journal-title":"Fortschr. Phys."},{"key":"493_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5195\/ledger.2017.48","volume":"2","author":"A Biryukov","year":"2017","unstructured":"Biryukov, A., Khovratovich, D.: Equihash: asymmetric proof-of-work based on the generalized birthday problem. Ledger 2, 1\u201330 (2017)","journal-title":"Ledger"},{"key":"493_CR6","unstructured":"Buterin, V.: Bitcoin is not quantum-safe, and how we can fix it when needed. https:\/\/bitcoinmagazine.com\/articles\/bitcoin-is-not-quantum-safe-and-how-we-can-fix-1375242150. http:\/\/www.webcitation.org\/6wDiIPU3l (2013)"},{"key":"493_CR7","unstructured":"Dwork, C.,\u00a0Naor, M.: Pricing via processing or combatting junk mail. In: Proceedings of Advances in Cryptology\u2014CRYPTO\u201992, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16\u201320, 1992, pp. 139\u2013147 (1992)"},{"key":"493_CR8","unstructured":"Decker, C.,\u00a0Wattenhofer, R.: Information propagation in the Bitcoin network. In: Proceedings of 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013, Trento, Italy, September 9-11, 2013, pp. 1\u201310 (2013)"},{"key":"493_CR9","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G.,\u00a0van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016, pp. 45\u201359 (2016). arXiv:1510.02037"},{"key":"493_CR10","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Financial Cryptography and Data Security\u201418th International Conference, FC 2014, Christ Church, Barbados, March 3\u20137, 2014, Revised Selected Papers, pp. 436\u2013454 (2014). arXiv:1311.0243"},{"key":"493_CR11","unstructured":"Eyal, I.: The miner\u2019s dilemma. In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17\u201321, 2015, pp. 89\u2013103 (2015). arXiv:1411.7099"},{"issue":"2","key":"493_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"493_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography. Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)"},{"key":"493_CR14","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22\u201324, 1996, pp. 212\u2013219 (1996). arXiv:quant-ph\/9605043"},{"key":"493_CR15","unstructured":"Heilman, E.: One weird trick to stop selfish miners: fresh bitcoins, a solution for the honest miner (poster abstract). In: B\u00f6hme, R.,\u00a0Brenner, M.,\u00a0Moore, T.,\u00a0Smith, M. (eds.) Financial Cryptography and Data Security\u2014FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers, volume 8438 of Lecture Notes in Computer Science. Springer, pp. 161\u2013162 (2014). IACR Cryptogoly ePrint Archive: report 2014\/007"},{"key":"493_CR16","doi-asserted-by":"publisher","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)","edition":"2"},{"key":"493_CR17","unstructured":"Kiayias, A.,\u00a0Russell, A.,\u00a0David, B.,\u00a0Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Advances in Cryptology\u2014CRYPTO 2017, Part I, volume 10401 of Lecture Notes in Computer Science. Springer, pp. 357\u2013388 (2017). Cryptology ePrint Archive: report 2016\/889"},{"key":"493_CR18","unstructured":"Lee, T.,\u00a0Ray, M.,\u00a0Santha, M.: Strategies for quantum races. In:\u00a0Blum, A. (ed.) 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, volume 124 of LIPIcs. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, pp. 51:1\u201351:21 (2019). arXiv:1809.03671"},{"key":"493_CR19","unstructured":"Lewenberg, Y.,\u00a0Sompolinsky, Y.,\u00a0Zohar, A.: Inclusive block chain protocols. In: Financial Cryptography and Data Security\u201419th International Conference, FC 2015, San Juan, Puerto Rico, January 26\u201330, 2015, Revised Selected Papers, pp. 528\u2013547 (2015)"},{"key":"493_CR20","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"issue":"1","key":"493_CR21","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash","year":"1950","unstructured":"Nash, J.F.: Equilibrium points in n-person games. Proc. Natl. Acad. Sci. 36(1), 48\u201349 (1950)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"493_CR22","volume-title":"Bitcoin and Cryptocurrency Technologies\u2014A Comprehensive Introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., Felten, E.W., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies\u2014A Comprehensive Introduction. Princeton University Press, Princeton (2016)"},{"key":"493_CR23","volume-title":"Quantum Computation and Quantum Information: 10th Anniversary Edition","author":"MA Nielsen","year":"2011","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information: 10th Anniversary Edition, 10th edn. Cambridge University Press, New York (2011)","edition":"10"},{"key":"493_CR24","unstructured":"Nayak, K.,\u00a0Kumar, S.,\u00a0Miller, A.,\u00a0Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, pp. 305\u2013320 (2016). Cryptology ePrint Archive: report 2015\/796"},{"key":"493_CR25","unstructured":"Roetteler, M.,\u00a0Naehrig, M., Svore, K.M., Lauter, K.E.: Quantum resource estimates for computing elliptic curve discrete logarithms. In: Advances in Cryptology\u2014ASIACRYPT 2017, Part II, pp. 241\u2013270 (2017). arXiv:1706.06752"},{"key":"493_CR26","unstructured":"Rosenfeld, M.: Analysis of Bitcoin pooled mining reward systems (2011). arXiv:1112.4980"},{"key":"493_CR27","doi-asserted-by":"crossref","unstructured":"Schrijvers, O.,\u00a0Bonneau, J.,\u00a0Boneh, D.,\u00a0Roughgarden, T.: Incentive compatibility of Bitcoin mining pool reward functions. In: Financial Cryptography and Data Security\u201420th International Conference, FC 2016, Revised Selected Papers, volume 9603 of Lecture Notes in Computer Science. Springer, pp. 477\u2013498 (2016)","DOI":"10.1007\/978-3-662-54970-4_28"},{"issue":"5","key":"493_CR28","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). arXiv:quant-ph\/9508027","journal-title":"SIAM J. Comput."},{"key":"493_CR29","unstructured":"Sompolinsky, Y., Lewenberg, Y., Zohar, A.: SPECTRE: a fast and scalable cryptocurrency protocol. IACR Cryptology ePrint Archive, vol. 2016, p. 1159 (2016)"},{"key":"493_CR30","unstructured":"Solat, S.,\u00a0Potop-Butucaru, M.: Brief announcement: ZeroBlockd: timestamp-free prevention of block-withholding attack in Bitcoin. In: Lecture Notes in Computer Science. Springer International Publishing, pp. 356\u2013360 (2017). arXiv:1605.02435"},{"key":"493_CR31","doi-asserted-by":"crossref","unstructured":"Stifter, N., Schindler, P., Judmayer, A., Zamyatin, A., Kern, A., Weippl, E.R.: Echoes of the past: recovering blockchain metrics from merged mining. IACR Cryptology ePrint Archive, vol. 2018, p. 1134 (2018)","DOI":"10.1007\/978-3-030-32101-7_31"},{"key":"493_CR32","unstructured":"Sapirshtein, A.,\u00a0Sompolinsky, Y.,\u00a0Zohar, A.: Optimal selfish mining strategies in Bitcoin. In:\u00a0Grossklags, J.,\u00a0Preneel, B. (eds.) Financial Cryptography and Data Security, volume 9603 of Lecture Notes in Computer Science. Springer, pp. 515\u2013532 (2016). arXiv:1507.06183"},{"key":"493_CR33","unstructured":"Sompolinsky, Y.,\u00a0Zohar, A.: Secure high-rate transaction processing in Bitcoin. In: Financial Cryptography and Data Security\u201419th International Conference, FC 2015, Revised Selected Papers, pp. 507\u2013527 (2015). Cryptology ePrint Archive: report 2013\/881"},{"key":"493_CR34","unstructured":"Sompolinsky, Y., Zohar, A.: PHANTOM: a scalable BlockDAG protocol. IACR Cryptology ePrint Archive, vol. 2018, p. 104 (2018)"},{"key":"493_CR35","unstructured":"Tessler, L.,\u00a0Byrnes, T.: Bitcoin and quantum computing (2017). arXiv:1711.04235"},{"key":"493_CR36","unstructured":"Tschorsch, F.,\u00a0Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084\u20132123 (2016). Cryptology ePrint Archive: report 2015\/464"},{"key":"493_CR37","unstructured":"Unruh, D.: Formal verification of quantum cryptography [Youtube video] (2016). https:\/\/kodu.ut.ee\/~unruh\/publications\/2016-09-15%20-%20Verification%20of%20Quantum%20Cryptography%20-%20QCrypt%20invited%20talk.pptx"},{"issue":"9","key":"493_CR38","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1145\/2701411","volume":"58","author":"A Zohar","year":"2015","unstructured":"Zohar, A.: Bitcoin: under the hood. Commun. ACM 58(9), 104\u2013113 (2015)","journal-title":"Commun. ACM"},{"key":"493_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, R.,\u00a0Preneel, B.: Publish or perish: a backward-compatible defense against selfish mining in Bitcoin. In:\u00a0Handschuh, H. (ed.) Topics in Cryptology\u2014CT-RSA 2017\u2014The Cryptographers\u2019 Track at the RSA Conference 2017, San Francisco, CA, USA, February 14\u201317, 2017, Proceedings, volume 10159 of Lecture Notes in Computer Science. Springer, pp. 277\u2013292 (2017)","DOI":"10.1007\/978-3-319-52153-4_16"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-020-00493-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-020-00493-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-020-00493-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,14]],"date-time":"2021-03-14T00:27:23Z","timestamp":1615681643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-020-00493-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,14]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["493"],"URL":"https:\/\/doi.org\/10.1007\/s10207-020-00493-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,14]]},"assertion":[{"value":"14 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by the author.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}