{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:41:41Z","timestamp":1774942901105,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1421689"],"award-info":[{"award-number":["CNS 1421689"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978408","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"154-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":244,"title":["On the Instability of Bitcoin Without the Block Reward"],"prefix":"10.1145","author":[{"given":"Miles","family":"Carlsten","sequence":"first","affiliation":[{"name":"Princeton, Princeton, USA"}]},{"given":"Harry","family":"Kalodner","sequence":"additional","affiliation":[{"name":"Princeton, Princeton, USA"}]},{"given":"S. Matthew","family":"Weinberg","sequence":"additional","affiliation":[{"name":"Princeton, Princeton, USA"}]},{"given":"Arvind","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Princeton, Princeton, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"40","article-title":"learning and correlated equilibrium","volume":"21","author":"Calibrated","year":"1997","unstructured":"Calibrated learning and correlated equilibrium. Games and Economic Behavior, 21(1):40--55, 1997.","journal-title":"Games and Economic Behavior"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0262.00153"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2012.v008a006"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1314498.1314543"},{"key":"e_1_3_2_1_7_1","volume-title":"On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs\/1402.1718","author":"Courtois N. T.","year":"2014","unstructured":"N. T. Courtois and L. Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs\/1402.1718, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_10_1","volume-title":"Forbes, 2013","author":"Hill K.","year":"2013","unstructured":"K. Hill. Bitcoin is not broken. Forbes, 2013. http:\/\/www.forbes.com\/sites\/kashmirhill\/2013\/11\/06\/bitcoin-is-not-broken\/#55d4a8812568."},{"key":"e_1_3_2_1_11_1","volume-title":"Working Paper GATE 2014-07","author":"Houy N.","year":"2014","unstructured":"N. Houy. The economics of bitcoin transaction fees. Working Paper GATE 2014-07. halshs-00951358., 2014."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Twelfth Annual Workshop on the Economics of Information Security (WEIS)","author":"Kroll J. A.","year":"2013","unstructured":"J. A. Kroll, I. C. Davey, and E. W. Felten. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In Proceedings of the Twelfth Annual Workshop on the Economics of Information Security (WEIS), 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813659"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831120.2831127"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_2"},{"key":"e_1_3_2_1_18_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_1_20_1","volume-title":"A transaction fee market exists without a block size limit","author":"Peter R.","year":"2015","unstructured":"R. Peter. A transaction fee market exists without a block size limit. 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"Analysis of bitcoin pooled mining reward systems. CoRR, abs\/1112.4980","author":"Rosenfeld M.","year":"2011","unstructured":"M. Rosenfeld. Analysis of bitcoin pooled mining reward systems. CoRR, abs\/1112.4980, 2011."},{"key":"e_1_3_2_1_22_1","volume-title":"Financial Cryptography and Data Security","author":"Sapirshtein A.","year":"2016","unstructured":"A. Sapirshtein, Y. Sompolinsky, and A. Zohar. Optimal selfish mining strategies in bitcoin. In Financial Cryptography and Data Security, 2016."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_5"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978408","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978408","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:24:05Z","timestamp":1763457845000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":23,"alternative-id":["10.1145\/2976749.2978408","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978408","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}