{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:51:17Z","timestamp":1774716677236,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2704700"],"award-info":[{"award-number":["2023YFB2704700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472276"],"award-info":[{"award-number":["62472276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Committee of Science and Technology, China","award":["23511101000"],"award-info":[{"award-number":["23511101000"]}]},{"name":"Shanghai Committee of Science and Technology, China","award":["24BC3200400"],"award-info":[{"award-number":["24BC3200400"]}]},{"name":"Science and Technology Project of the State Grid Corporation of China","award":["5700-202321603A-3-2-ZN"],"award-info":[{"award-number":["5700-202321603A-3-2-ZN"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3594185","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:50:15Z","timestamp":1753901415000},"page":"8906-8921","source":"Crossref","is-referenced-by-count":5,"title":["The Halt Game: Sometimes Rewards Cannot Cover Expenses in the PoW-Based Blockchain"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8524-9070","authenticated-orcid":false,"given":"Junjie","family":"Hu","sequence":"first","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0016-6324","authenticated-orcid":false,"given":"Huan","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7673-9843","authenticated-orcid":false,"given":"Na","family":"Ruan","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6784-9709","authenticated-orcid":false,"given":"Zhen","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6831-3973","authenticated-orcid":false,"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Bitcoin: A Peer-to-peer Electronic Cash System","author":"Nakamoto","year":"2009"},{"issue":"37","key":"ref2","first-page":"1","article-title":"A next-generation smart contract and decentralized application platform","volume-title":"White Paper","volume":"3","author":"Buterin","year":"2014"},{"key":"ref3","volume-title":"Cryptocurrency Market Capitalizations","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref7","volume-title":"Bitcoin Energy Consumption Index","year":"2023"},{"key":"ref8","volume-title":"Ethereum Energy Consumption Index","year":"2023"},{"key":"ref9","volume-title":"Bitcoin Difficulty Adjustment","year":"2024"},{"key":"ref10","volume-title":"Ethereum 1.x Difficulty Adjustment","year":"2024"},{"key":"ref11","volume-title":"Transaction Fees","year":"2023"},{"key":"ref12","volume-title":"Ether Supply Growth","year":"2023"},{"key":"ref13","volume-title":"Ether Transaction Fees","year":"2023"},{"key":"ref14","volume-title":"Fork","year":"2024"},{"key":"ref15","volume-title":"Pay-to-Script-Hash","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref17","article-title":"Theoretical Bitcoin attacks with less than half of the computational power (draft)","author":"Bahack","year":"2013","journal-title":"arXiv:1312.7013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref22","first-page":"6255","article-title":"Max attestation matters: Making honest parties lose their incentives in Ethereum PoS","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Security)","author":"Zhang"},{"key":"ref23","volume-title":"Full Version and Test Blocks","author":"Hu","year":"2024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243737"},{"key":"ref25","volume-title":"How Do I Calculate My Transaction Fee","author":"Binns","year":"2023"},{"key":"ref26","volume-title":"Bitcoin Market Capitalization","author":"info","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhy095"},{"key":"ref28","volume-title":"A Deep Dive in a Real-World Bitcoin Mine","author":"net","year":"2023"},{"key":"ref29","volume-title":"Karush-kuhn-Tucker Conditions","year":"2024"},{"key":"ref30","article-title":"Timestamp manipulation: Timestamp-based nakamoto-style blockchains are vulnerable","author":"Hu","year":"2025","journal-title":"arXiv:2505.05328"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71070-4_12"},{"key":"ref33","first-page":"6273","article-title":"Sprints: Intermittent blockchain PoW mining","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Security)","author":"Mirkin"},{"issue":"11","key":"ref34","first-page":"1","article-title":"The economics of Bitcoin mining or, Bitcoin in the presence of adversaries","volume-title":"Proc. WEIS","volume":"2013","author":"Kroll"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423264"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3534056.3535005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00013"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00131"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53356-4_5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2325702.2325704"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3202696"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3326386"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417247"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_14"},{"key":"ref49","first-page":"39:1","article-title":"Hybrid consensus: Efficient consensus in the permissionless model","volume-title":"Proc. 31st Int. Symp. Distrib. Comput. (DISC)","volume":"91","author":"Pass"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref52","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","volume-title":"Proc. 13th USENIX Conf. Netw. Syst. Des. Implement.","author":"Eyal"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11104110.pdf?arnumber=11104110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:08:57Z","timestamp":1756404537000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11104110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3594185","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}