{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:20:46Z","timestamp":1740122446764,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T00:00:00Z","timestamp":1627516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T00:00:00Z","timestamp":1627516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"973 Program of China","award":["2016YFB1000201"],"award-info":[{"award-number":["2016YFB1000201"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61832003, 61761136014, 61872334"],"award-info":[{"award-number":["61832003, 61761136014, 61872334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Strategic Priority Research Program of Chinese Academy of Sciences","award":["XDA27000000"],"award-info":[{"award-number":["XDA27000000"]}]},{"DOI":"10.13039\/501100004377","name":"Hong Kong Polytechnic University","doi-asserted-by":"publisher","award":["P0034420"],"award-info":[{"award-number":["P0034420"]}],"id":[{"id":"10.13039\/501100004377","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10878-021-00768-4","type":"journal-article","created":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T23:04:12Z","timestamp":1627513452000},"page":"444-459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Discouraging pool block withholding attacks in Bitcoin"],"prefix":"10.1007","volume":"43","author":[{"given":"Zhihuai","family":"Chen","sequence":"first","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5538-5572","authenticated-orcid":false,"given":"Xiaohan","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jialin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,29]]},"reference":[{"key":"768_CR1","doi-asserted-by":"crossref","unstructured":"Alkalay-Houlihan C, Shah N (2019) The pure price of anarchy of pool block withholding attacks in bitcoin mining. In: The Thirty-Third AAAI Conference on Artificial Intelligence. pages 1724\u20131731. AAAI Press","DOI":"10.1609\/aaai.v33i01.33011724"},{"key":"768_CR2","doi-asserted-by":"crossref","unstructured":"Babaioff M , Dobzinski S, Oren S, Zohar A (2012) On bitcoin and red balloons. In: Proceedings of the 13th ACM conference on electronic commerce. pages 56\u201373. ACM, 2012","DOI":"10.1145\/2229012.2229022"},{"issue":"8","key":"768_CR3","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.1109\/TIFS.2016.2623588","volume":"12","author":"S Bag","year":"2017","unstructured":"Bag S, Ruj S, Sakurai K (2017) Bitcoin block withholding attack: analysis and mitigation. IEEE Trans Inf Forensics Secur 12(8):1967\u20131978","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"768_CR4","doi-asserted-by":"crossref","unstructured":"Bag S, Sakurai K (2016) Yet another note on block withholding attack on bitcoin mining pools. In: Information security: 19th international conference. 9866: 167\u2013180","DOI":"10.1007\/978-3-319-45871-7_11"},{"key":"768_CR5","doi-asserted-by":"crossref","unstructured":"Carlsten M, Kalodner HA, Matthew-Weinberg S, Narayanan A (2016) On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. pages 154\u2013167","DOI":"10.1145\/2976749.2978408"},{"key":"768_CR6","doi-asserted-by":"crossref","unstructured":"Chen X , Papadimitriou CH, Roughgarden T (2019) An axiomatic approach to block rewards. In: Proceedings of the 1st ACM conference on advances in financial technologies. pages 124\u2013131","DOI":"10.1145\/3318041.3355470"},{"key":"768_CR7","unstructured":"Courtois NT, Bahack L (2014) On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR"},{"key":"768_CR8","doi-asserted-by":"crossref","unstructured":"Eyal I (2015) The miner\u2019s dilemma. In: Symposium on security and privacy. 89\u2013103","DOI":"10.1109\/SP.2015.13"},{"issue":"7","key":"768_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2014","unstructured":"Eyal I, Sirer EG (2014) Bitcoin mining is vulnerable. Commun ACM 61(7):95\u2013102","journal-title":"Commun ACM"},{"key":"768_CR10","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.future.2019.03.002","volume":"97","author":"AT Haghighat","year":"2019","unstructured":"Haghighat AT, Shajari M (2019) Block withholding game among bitcoin mining pools. Future Gener 97:482\u2013491","journal-title":"Future Gener"},{"key":"768_CR11","unstructured":"Heilman E, Kendler A, Zohar A, Goldberg S (2015) Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th USENIX security symposium. pages 129\u2013144. USENIX Association"},{"key":"768_CR12","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-662-44774-1_6","volume":"8438","author":"B Johnson","year":"2014","unstructured":"Johnson B, Laszka A, Grossklags J, Vasek M, Moore T (2014) Game-theoretic analysis of ddos attacks against bitcoin mining pools. Financl Cryptograph Data Secur FC 8438:72\u201386","journal-title":"Financl Cryptograph Data Secur FC"},{"key":"768_CR13","unstructured":"Lewenberg Y, Bachrach Y, Sompolinsky Y, Zohar A, Rosenschein JS (2015) Bitcoin mining pools: a cooperative game theoretic analysis. In: Proceedings of the 2015 international conference on autonomous agents and multiagent systems. pages 919\u2013927. ACM"},{"key":"768_CR14","first-page":"155","volume":"2015","author":"L Luu","year":"2015","unstructured":"Luu L, Saha R, Parameshwaran I, Saxena P, Hobor A (2015) On power splitting games in distributed computation: the case of bitcoin pooled mining. IACR Cryptol ePrint Arch 2015:155","journal-title":"IACR Cryptol ePrint Arch"},{"issue":"11","key":"768_CR15","doi-asserted-by":"publisher","first-page":"3254","DOI":"10.1109\/TCYB.2018.2843358","volume":"48","author":"IE Mousavinejad","year":"2018","unstructured":"Mousavinejad IE, Yang F, Han Q-L, Vlacic Ljubo B (2018) A novel cyber attack detection method in networked control systems. Trans Cybernd 48(11):3254\u20133264","journal-title":"Trans Cybernd"},{"key":"768_CR16","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system"},{"key":"768_CR17","unstructured":"Rosenfeld M (2011) Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, abs\/1112.4980"},{"key":"768_CR18","doi-asserted-by":"crossref","unstructured":"Schrijvers O, Bonneau J, Boneh D, Roughgarden T (2016) Incentive compatibility of bitcoin mining pool reward functions. In: Financial cryptography and data security: 20th international conference. 9603: 477\u2013498","DOI":"10.1007\/978-3-662-54970-4_28"},{"key":"768_CR19","doi-asserted-by":"crossref","unstructured":"Tosh DK, Shetty S, Liang X, Kamhoua CA, Kwiat KA, Njilla L (2017) Security implications of blockchain cloud with analysis of block withholding attack. In: Proceedings of the 17th IEEE\/ACM international symposium on cluster, cloud and grid computing. 458\u2013467. IEEE Computer Society\/ACM","DOI":"10.1109\/CCGRID.2017.111"},{"key":"768_CR20","unstructured":"Wang Q, Chen Y (2021) The tight bound for pure price of anarchy in an extended miner\u2019s dilemma game. CoRR"},{"key":"768_CR21","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.ress.2018.12.026","volume":"185","author":"D Wu","year":"2019","unstructured":"Wu D, Liu X-D, Yan X, Peng R, Li G (2019) Equilibrium analysis of bitcoin block withholding attack: a generalized model. Reliab Eng Syst Saf 185:318\u2013328","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"768_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-019-9916-5","volume":"63","author":"Q Yuan","year":"2020","unstructured":"Yuan Q, Wei P, Jia K, Xue H (2020) Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. Sci China Inf Sci 63(3):1","journal-title":"Sci China Inf Sci"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-021-00768-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-021-00768-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-021-00768-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T16:20:17Z","timestamp":1699287617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-021-00768-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,29]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["768"],"URL":"https:\/\/doi.org\/10.1007\/s10878-021-00768-4","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[2021,7,29]]},"assertion":[{"value":"8 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Code sharing not applicable to this article as no experiments were simulated by code\/program during the current study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"Yes.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}