{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:00:59Z","timestamp":1764784859246,"version":"3.41.2"},"reference-count":30,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,3,19]],"date-time":"2022-03-19T00:00:00Z","timestamp":1647648000000},"content-version":"vor","delay-in-days":77,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"George Mason Multidisciplinary Research (MDR) Initiative"},{"name":"DHS\/CINA","award":["205187"],"award-info":[{"award-number":["205187"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Mining is a central operation of all proof-of-work (PoW)-based cryptocurrencies. The vast majority of miners today participate in \u201cmining pools\u201d instead of \u201csolo mining\u201d in order to lower risk and achieve a more steady income. However, this rise of participation in mining pools negatively affects the decentralization levels of most cryptocurrencies. In this work, we look into mining pools from the point of view of a miner: We present an analytical model and implement a computational tool that allows miners to optimally distribute their computational power over multiple pools and PoW cryptocurrencies (i.e. build a mining portfolio), taking into account their risk aversion levels. Our tool allows miners to maximize their risk-adjusted earnings by diversifying across multiple mining pools. Our underlying techniques are drawn from both the areas of financial economy and computer science since we use computer science-based approaches (i.e. optimization techniques) to experimentally prove how parties (and in particular miners) interact with cryptocurrencies in a way of increasing their Sharpe ratio. To showcase our model, we run an experiment in Bitcoin historical data and demonstrate that a miner diversifying over multiple pools, as instructed by our model\/tool, receives a higher overall Sharpe ratio (i.e. average excess reward over its standard deviation\/volatility).<\/jats:p>","DOI":"10.1093\/cybsec\/tyab027","type":"journal-article","created":{"date-parts":[[2022,3,19]],"date-time":"2022-03-19T08:40:52Z","timestamp":1647679252000},"source":"Crossref","is-referenced-by-count":13,"title":["Diversification across mining pools: optimal mining strategies under PoW"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5970-0664","authenticated-orcid":false,"given":"Panagiotis","family":"Chatzigiannis","sequence":"first","affiliation":[{"name":"Department of Computer Science George Mason University , 4400 University Drive MSN 4A5 Fairfax, VA 22030 , USA"}]},{"given":"Foteini","family":"Baldimtsi","sequence":"additional","affiliation":[{"name":"Department of Computer Science George Mason University , 4400 University Drive MSN 4A5 Fairfax, VA 22030 , USA"}]},{"given":"Igor","family":"Griva","sequence":"additional","affiliation":[{"name":"Department of Computer Science George Mason University , 4400 University Drive MSN 4A5 Fairfax, VA 22030 , USA"}]},{"given":"Jiasun","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science George Mason University , 4400 University Drive MSN 4A5 Fairfax, VA 22030 , USA"}]}],"member":"286","published-online":{"date-parts":[[2022,3,19]]},"reference":[{"author":"List of Bitcoin mining ASICs","key":"2022121515104507900_bib1"},{"volume-title":"Theory of Financial Decision Making","year":"1987","author":"Ingersoll","key":"2022121515104507900_bib2"},{"key":"2022121515104507900_bib3","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3143724","article-title":"Decentralized mining in centralized pools","author":"Cong","year":"2018"},{"key":"2022121515104507900_bib4","first-page":"77","article-title":"Portfolio selection","volume":"7","author":"Markowitz","year":"1952","journal-title":"J Finance"},{"key":"2022121515104507900_bib5","first-page":"51","article-title":"A direct search optimization method that models the objective and constraint functions by linear interpolation","volume-title":"Advances in Optimization and Numerical Analysis. Mathematics and Its Applications","author":"Powell","year":"1994"},{"key":"2022121515104507900_bib6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1086\/294846","article-title":"Mutual fund performance","volume":"39","author":"Sharpe","year":"1966","journal-title":"J Bus"},{"author":"MultiPoolMiner","key":"2022121515104507900_bib7"},{"author":"SmartMine","key":"2022121515104507900_bib8"},{"author":"MinerGate","key":"2022121515104507900_bib9"},{"key":"2022121515104507900_bib10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-319-71924-5_15","article-title":"Socially optimal mining pools","volume-title":"Web and Internet Economics","author":"Fisch","year":"2017"},{"key":"2022121515104507900_bib11","first-page":"155","article-title":"Using economic risk to model miner hash rate allocation in cryptocurrencies","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology\u2014ESORICS 2018 International Workshops, DPM 2018 and CBT 2018","author":"Bissias","year":"2018"},{"author":"Spiegelman","key":"2022121515104507900_bib12"},{"key":"2022121515104507900_bib13","first-page":"919","article-title":"Bitcoin mining pools: a cooperative game theoretic analysis","volume-title":"Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, ser","author":"Lewenberg","year":"2015"},{"key":"2022121515104507900_bib14","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/LWC.2018.2820009","article-title":"Evolutionary game for mining pool selection in blockchain networks","volume":"7","author":"Liu","year":"2018","journal-title":"IEEE Wirel Commun Lett"},{"author":"Rosenfeld","key":"2022121515104507900_bib15","article-title":"Analysis of bitcoin pooled mining reward systems"},{"author":"Comparison of mining pools","key":"2022121515104507900_bib16"},{"author":"Coinotron","key":"2022121515104507900_bib17"},{"author":"Kolivas","key":"2022121515104507900_bib18"},{"volume-title":"Microeconomic Theory","year":"1995","author":"Mas-Colell","key":"2022121515104507900_bib19"},{"author":"Smartbit Bitcoin Block Explorer","key":"2022121515104507900_bib20"},{"key":"2022121515104507900_bib21","doi-asserted-by":"crossref","first-page":"323","DOI":"10.2307\/2676262","article-title":"Adding risks: Samuelson\u2019s fallacy of large numbers revisited","volume":"34","author":"Ross","year":"1999","journal-title":"J Financ Quant Anal"},{"key":"2022121515104507900_bib22","first-page":"108","article-title":"Risk and uncertainty: a fallacy of large numbers","volume":"98","author":"Samuelson","year":"1963","journal-title":"Scientia"},{"key":"2022121515104507900_bib23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-58387-6_24","article-title":"Decentralization in Bitcoin and Ethereum networks","author":"Gencer","year":"2018"},{"key":"2022121515104507900_bib24","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/SP.2015.13","article-title":"The miner\u2019s dilemma","volume-title":"2015 IEEE Symposium on Security and Privacy","author":"Eyal","year":"2015"},{"key":"2022121515104507900_bib25","first-page":"436","article-title":"Majority is not enough: Bitcoin mining is vulnerable","volume-title":"FC 2014, ser. LNCS","author":"Eyal","year":"2014"},{"key":"2022121515104507900_bib26","first-page":"515","article-title":"Optimal selfish mining strategies in Bitcoin","volume-title":"FC 2016, ser. LNCS","author":"Sapirshtein","year":"2016"},{"key":"2022121515104507900_bib27","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/3155112.3168362","article-title":"Bitcoin\u2019s underlying incentives","volume":"15","author":"Sompolinsky","year":"2017","journal-title":"Queue"},{"author":"P2pool","key":"2022121515104507900_bib28"},{"key":"2022121515104507900_bib29","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1145\/2810103.2813621","article-title":"Nonoutsourceable scratch-off puzzles to discourage Bitcoin mining coalitions","volume-title":"ACM CCS 15","author":"Miller","year":"2015"},{"volume-title":"A Software Package for Sequential Quadratic Programming, ser","year":"1988","author":"Kraft","key":"2022121515104507900_bib30"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyab027\/47918893\/tyab027.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyab027\/47918893\/tyab027.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T23:08:42Z","timestamp":1671145722000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyab027\/6550812"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyab027","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyab027"}}