{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T05:46:13Z","timestamp":1769233573008,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1223623"],"award-info":[{"award-number":["1223623"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813621","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"680-691","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions"],"prefix":"10.1145","author":[{"given":"Andrew","family":"Miller","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Ahmed","family":"Kosba","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Jonathan","family":"Katz","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Elaine","family":"Shi","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ziftrcoin : A cryptocurrency to enable commerce. Whitepaper. ziftrcoin : A cryptocurrency to enable commerce. Whitepaper."},{"key":"e_1_3_2_1_2_1","volume-title":"Exposing computationally-challenged byzantine impostors. Department of Computer Science","author":"Aspnes James","year":"2005","unstructured":"James Aspnes , Collin Jackson , and Arvind Krishnamurthy . Exposing computationally-challenged byzantine impostors. Department of Computer Science , Yale University , New Haven, CT , Tech. Rep, 2005 . James Aspnes, Collin Jackson, and Arvind Krishnamurthy. Exposing computationally-challenged byzantine impostors. Department of Computer Science, Yale University, New Haven, CT, Tech. Rep, 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_5_1","first-page":"781","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . Succinct non-interactive zero knowledge for a von neumann architecture . In 23rd USENIX Security Symposium (USENIX Security 14) , pages 781 -- 796 , San Diego, CA , August 2014 . USENIX Association. Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. Succinct non-interactive zero knowledge for a von neumann architecture. In 23rd USENIX Security Symposium (USENIX Security 14), pages 781--796, San Diego, CA, August 2014. USENIX Association."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195407"},{"key":"e_1_3_2_1_7_1","volume-title":"2015 IEEE Symposium on Security and Privacy. IEEE","author":"Bonneau Joseph","year":"2015","unstructured":"Joseph Bonneau , Andrew Miller , Jeremy Clark , Arvind Narayanan , Joshua Kroll , and Edward W. Felten . Research perspectives on bitcoin and second-generation digital currencies . In 2015 IEEE Symposium on Security and Privacy. IEEE , 2015 . Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua Kroll, and Edward W. Felten. Research perspectives on bitcoin and second-generation digital currencies. In 2015 IEEE Symposium on Security and Privacy. IEEE, 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/978-3-662-45472-5_31","volume-title":"Financial Cryptography and Data Security","author":"Bonneau Joseph","year":"2014","unstructured":"Joseph Bonneau , Arvind Narayanan , Andrew Miller , Jeremy Clark , Joshua A Kroll , and Edward W Felten . Mixcoin: Anonymity for bitcoin with accountable mixes . In Financial Cryptography and Data Security , pages 486 -- 504 . Springer , 2014 . Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A Kroll, and Edward W Felten. Mixcoin: Anonymity for bitcoin with accountable mixes. In Financial Cryptography and Data Security, pages 486--504. Springer, 2014."},{"key":"e_1_3_2_1_9_1","unstructured":"Danny Bradbury. Alydian targets big ticket miners with terahash hosting. http:\/\/www.coindesk.com\/alydian-targets-big-ticket-miners-with-terahash-hosting\/ August 2013. Danny Bradbury. Alydian targets big ticket miners with terahash hosting. http:\/\/www.coindesk.com\/alydian-targets-big-ticket-miners-with-terahash-hosting\/ August 2013."},{"key":"e_1_3_2_1_10_1","unstructured":"Vitalik Buterin. Bitcoin network shaken by blockchain fork. http:\/\/bitcoinmagazine.com\/3668\/bitcoin-network-shaken-by-blockchain-fork\/ 2013. Vitalik Buterin. Bitcoin network shaken by blockchain fork. http:\/\/bitcoinmagazine.com\/3668\/bitcoin-network-shaken-by-blockchain-fork\/ 2013."},{"key":"e_1_3_2_1_11_1","first-page":"199","volume-title":"Crypto","volume":"82","author":"Chaum David","year":"1982","unstructured":"David Chaum . Blind signatures for untraceable payments . In Crypto , volume 82 , pages 199 -- 203 , 1982 . David Chaum. Blind signatures for untraceable payments. In Crypto, volume 82, pages 199--203, 1982."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646753.704915"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_30"},{"key":"e_1_3_2_1_14_1","unstructured":"Wei Dai. b-money. http:\/\/www.weidai.com\/bmoney.txt 1998. Wei Dai. b-money. http:\/\/www.weidai.com\/bmoney.txt 1998."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517878"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646757.705669"},{"key":"e_1_3_2_1_17_1","volume-title":"June","author":"Eyal Ittay","year":"2014","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . How to disincentivize large bitcoin mining pools. Blog post: http:\/\/hackingdistributed.com\/2014\/06\/18\/how-to-disincentivize-large-bitcoin-mining-pools\/ , June 2014 . Ittay Eyal and Emin G\u00fcn Sirer. How to disincentivize large bitcoin mining pools. Blog post: http:\/\/hackingdistributed.com\/2014\/06\/18\/how-to-disincentivize-large-bitcoin-mining-pools\/, June 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"Eyal Ittay","year":"2014","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . Majority is not enough: Bitcoin mining is vulnerable . In Financial Cryptography and Data Security , pages 436 -- 454 . Springer , 2014 . Ittay Eyal and Emin G\u00fcn Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, pages 436--454. Springer, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-013-9816-5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/3481262"},{"key":"e_1_3_2_1_23_1","first-page":"151","volume-title":"NDSS","volume":"99","author":"Juels Ari","year":"1999","unstructured":"Ari Juels and John G Brainard . Client puzzles : A cryptographic countermeasure against connection depletion attacks . In NDSS , volume 99 , pages 151 -- 165 , 1999 . Ari Juels and John G Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS, volume 99, pages 151--165, 1999."},{"key":"e_1_3_2_1_24_1","volume-title":"WEIS","author":"Kroll Joshua A","year":"2013","unstructured":"Joshua A Kroll , Ian C Davey , and Edward W Felten . The economics of bitcoin mining or, bitcoin in the presence of adversaries . WEIS , 2013 . Joshua A Kroll, Ian C Davey, and Edward W Felten. The economics of bitcoin mining or, bitcoin in the presence of adversaries. WEIS, 2013."},{"key":"e_1_3_2_1_25_1","volume-title":"Workshop on Economics and Information","author":"Laurie Ben","year":"2004","unstructured":"Ben Laurie and Richard Clayton . Proof-of-work\" proves not to work; version 0.2 . In Workshop on Economics and Information , Security , 2004 . Ben Laurie and Richard Clayton. Proof-of-work\" proves not to work; version 0.2. In Workshop on Economics and Information, Security, 2004."},{"key":"e_1_3_2_1_26_1","volume-title":"Inclusive block chain protocols. Financial Cryptography and Data Security","author":"Lewenberg Yoad","year":"2015","unstructured":"Yoad Lewenberg , Yonatan Sompolinsky , and Aviv Zohar . Inclusive block chain protocols. Financial Cryptography and Data Security . Springer , 2015 . Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. Inclusive block chain protocols. Financial Cryptography and Data Security. Springer, 2015."},{"key":"e_1_3_2_1_27_1","unstructured":"Jon Matonis. The bitcoin mining arms race: Ghash.io and the 51% issue. http:\/\/www.coindesk.com\/bitcoin-mining-detente-ghash-io-51-issue\/ July 2014. Jon Matonis. The bitcoin mining arms race: Ghash.io and the 51% issue. http:\/\/www.coindesk.com\/bitcoin-mining-detente-ghash-io-51-issue\/ July 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Andrew Miller Ahmed Kosba Elaine Shi and Jonathan Katz. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. (full version). http:\/\/cs.umd.edu\/ amiller\/nonoutsourceable_full.pdf 2015. Andrew Miller Ahmed Kosba Elaine Shi and Jonathan Katz. Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. (full version). http:\/\/cs.umd.edu\/ amiller\/nonoutsourceable_full.pdf 2015.","DOI":"10.1145\/2810103.2813621"},{"key":"e_1_3_2_1_32_1","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. http:\/\/bitcon.org\/bitcoin.pdf 2008. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. http:\/\/bitcon.org\/bitcoin.pdf 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/647092.714096"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.17310\/ntj.2004.2.02"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_1_37_1","volume-title":"The scrypt password-based key derivation function","author":"Percival Colin","year":"2012","unstructured":"Colin Percival and Simon Josefsson . The scrypt password-based key derivation function . 2012 . Colin Percival and Simon Josefsson. The scrypt password-based key derivation function. 2012."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2307\/2554972"},{"key":"e_1_3_2_1_39_1","volume-title":"Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980","author":"Rosenfeld Meni","year":"2011","unstructured":"Meni Rosenfeld . Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 , 2011 . Meni Rosenfeld. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011."},{"key":"e_1_3_2_1_40_1","volume-title":"Secure high-rate transaction processing in bitcoin. Financial Cryptography and Data Security","author":"Sompolinsky Yonatan","year":"2015","unstructured":"Yonatan Sompolinsky and Aviv Zohar . Secure high-rate transaction processing in bitcoin. Financial Cryptography and Data Security . Springer , 2015 . Yonatan Sompolinsky and Aviv Zohar. Secure high-rate transaction processing in bitcoin. Financial Cryptography and Data Security. Springer, 2015."},{"key":"e_1_3_2_1_41_1","volume-title":"October","year":"2014","unstructured":"Spreadcoin. http:\/\/spreadcoin.net\/files\/SpreadCoin-WhitePaper.pdf , October 2014 . Spreadcoin. http:\/\/spreadcoin.net\/files\/SpreadCoin-WhitePaper.pdf, October 2014."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1964621.1964648"},{"key":"e_1_3_2_1_43_1","volume-title":"Bitcoin Research Workshop","author":"Tromp John","year":"2015","unstructured":"John Tromp . Cuckoo cycle: a new memory-hard proof-of-work system . Bitcoin Research Workshop , 2015 . John Tromp. Cuckoo cycle: a new memory-hard proof-of-work system. Bitcoin Research Workshop, 2015."},{"key":"e_1_3_2_1_44_1","unstructured":"Forrest Voight. p2pool: Decentralized dos-resistant hop-proof pool. https:\/\/bitcointalk.org\/index.php?topic=18313 June 2011. Forrest Voight. p2pool: Decentralized dos-resistant hop-proof pool. https:\/\/bitcointalk.org\/index.php?topic=18313 June 2011."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813621","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":42,"alternative-id":["10.1145\/2810103.2813621","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813621","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}