{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:30Z","timestamp":1775199570078,"version":"3.50.1"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/bloc.2019.8751290","type":"proceedings-article","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T23:44:06Z","timestamp":1562024646000},"page":"376-384","source":"Crossref","is-referenced-by-count":20,"title":["Weighted Voting on the Blockchain: Improving Consensus in Proof of Stake Protocols"],"prefix":"10.1109","author":[{"given":"Stefanos","family":"Leonardos","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Reijsbergen","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Piliouras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"5872","article-title":"Multiplicative weights update with constant step-size in congestion games: Convergence, limit cycles and chaos","author":"palaiopanos","year":"2017","journal-title":"Advances in Neural IInformation Processing Systems"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124945"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref32","author":"kwon","year":"2014","journal-title":"Tendermint Core"},{"key":"ref31","author":"kwon","year":"2014","journal-title":"Tendermint Consensus without Mining"},{"key":"ref30","first-page":"469","article-title":"An Analysis of Anonymity in Bitcoin Using P2P Network Traffic","author":"koshy","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2307\/2526438"},{"key":"ref36","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref35","first-page":"140:1","article-title":"Opinion dynamics in networks: Convergence, stability and lack of explosion","author":"mai","year":"2017","journal-title":"44th International Colloquium on Automata Languages and Programming ICALP 2017"},{"key":"ref34","year":"2018","journal-title":"Lisk&#x2019;s Consensus Algorithm"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"ref27","author":"grigg","year":"2017","journal-title":"EOS &#x2013; An Introduction"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","article-title":"lboros: A provably secure proof-of-stake blockchain protocol","author":"kiayias","year":"2017","journal-title":"Advances in Cryptology &#x2013; CRYPTO 2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2012.v008a006"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00222"},{"key":"ref22","first-page":"436","article-title":"Majority is not enough: Bitcoin mining is vulnerable","author":"eyal","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"ref24","first-page":"291","article-title":"The Bitcoin Backbone Protocol with Chains of Variable Difficulty","author":"garay","year":"2017","journal-title":"Crypto"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","article-title":"The Bitcoin Backbone Protocol: Analysis and Applications","author":"garay","year":"2015","journal-title":"Advances in Cryptology-EUROCRYPT 2015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref25","article-title":"Boot-strapping the Blockchain, with Applications to Consensus and Fast PKI Setup","author":"garay","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00249"},{"key":"ref51","article-title":"Divide and conquer: false-name manipulations in weighted voting games","author":"bachrach","year":"2008","journal-title":"AAMAS"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2011.12.003"},{"key":"ref53","article-title":"RepuCoin: Your Reputation is Your Power","author":"yu","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1257\/jep.9.1.51"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/2527413"},{"key":"ref11","first-page":"142","article-title":"Cryptocurrencies without proof of work","author":"bentov","year":"2016","journal-title":"Financial Cryptography and Data Security"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/978-3-319-56614-6_22","article-title":"analysis of the blockchain protocol in asynchronous networks","author":"pass","year":"2017","journal-title":"Advances in Cryptology &#x2013; EUROCRYPT 2017"},{"key":"ref12","article-title":"Snow white: Provably secure proofs of stake","volume":"2016","author":"bentov","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref13","article-title":"Why buy when you can rent ?","author":"bonneau","year":"2015","journal-title":"Bribery attacks on Bitcoin consensus"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"ref15","article-title":"Formal Barriers to Longest-Chain Proof-of-Stake Protocols","author":"brown-cohen","year":"2018","journal-title":"ArXiv e-prints"},{"key":"ref16","first-page":"arxiv:1807.11218","article-title":"Reward Sharing Schemes for Stake Pools","author":"brunjes","year":"2018","journal-title":"ArXiv e-prints"},{"key":"ref17","author":"buterin","year":"2018","journal-title":"Ethereum 2 0 spec &#x2013; Casper and sharding"},{"key":"ref18","article-title":"Casper the Friendly Finality Gadget","author":"buterin","year":"2017","journal-title":"ArXiv e-prints"},{"key":"ref19","article-title":"Blockchain Consensus Protocols in the Wild","volume":"abs 1707 1873","author":"cachin","year":"2017","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2007.4557718"},{"key":"ref3","first-page":"409","article-title":"False Name Manipulations in Weighted Voting Games: Splitting, Merging and Annexation","author":"aziz","year":"2009","journal-title":"Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems -Volume 1 AAMAS &#x2019;09"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1111\/iere.12083"},{"key":"ref5","article-title":"Betting on Blockchain Consensus with Fantomette","author":"azouvi","year":"2018","journal-title":"ArXiv e-prints"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3219166.3219235"},{"key":"ref7","first-page":"999","article-title":"Power and Stability in Connectivity Games","author":"bachrach","year":"2008","journal-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems -Volume 2 AAMAS &#x2019;08"},{"key":"ref49","first-page":"400","article-title":"Agreement with Satoshi &#x2013; On the Formalization of Nakamoto Consensus","volume":"2018","author":"stifter","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref9","article-title":"Consensus in the age of blockchains","author":"bano","year":"2017","journal-title":"arXiv preprint arXiv 1711 03890"},{"key":"ref46","first-page":"515","article-title":"Optimal selfish mining strategies in bitcoin","author":"sapirshtein","year":"2017","journal-title":"Financial Cryptography and Data Security"},{"key":"ref45","author":"ryan","year":"2018","journal-title":"Ethereum improvement proposal 1011"},{"key":"ref48","author":"stathakopoulou","year":"2018","journal-title":"On Scalability and Performance of Permissioned Blockchain Systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/BF00118940"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-78375-8_1","article-title":"thunderella: Blockchains with optimistic instant confirmation","author":"pass","year":"2018","journal-title":"Advances in Cryptology &#x2013; EUROCRYPT 2018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"ref44","author":"ryan","year":"2018","journal-title":"Validator Implementation Guide"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"}],"event":{"name":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Seoul, Korea (South)","start":{"date-parts":[[2019,5,14]]},"end":{"date-parts":[[2019,5,17]]}},"container-title":["2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8744142\/8751228\/08751290.pdf?arnumber=8751290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:11:21Z","timestamp":1657854681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8751290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/bloc.2019.8751290","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}