{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:26:16Z","timestamp":1774369576594,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Israel cyber bureau"},{"name":"Technion Hiroshi Fujiwara cyber-security research center"},{"name":"Israel Science Foundation","award":["1641\/18"],"award-info":[{"award-number":["1641\/18"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243737","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"713-728","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["The Gap Game"],"prefix":"10.1145","author":[{"given":"Itay","family":"Tsabary","sequence":"first","affiliation":[{"name":"Technion, Haifa, Israel"}]},{"given":"Ittay","family":"Eyal","sequence":"additional","affiliation":[{"name":"Technion, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus. arXiv preprint arXiv:1612.02916","author":"Abraham Ittai","year":"2016"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_4"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"e_1_3_2_2_4_1","volume-title":"But why does it work? A rational protocol design treatment of bitcoin Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Badertscher Christian"},{"key":"e_1_3_2_2_5_1","volume-title":"The blockchain folk theorem. ssrn id 3108601","author":"Biais Bruno","year":"2018"},{"key":"e_1_3_2_2_6_1","volume-title":"How do I calculate my transaction fee?","author":"Binns Will","year":"2018"},{"key":"e_1_3_2_2_7_1","volume-title":"Bitcoin Cash Site. https:\/\/www.bitcoincash.org\/, retrieved","author":"Bitcoin Cash","year":"2018"},{"key":"e_1_3_2_2_8_1","volume-title":"Controlled supply. https:\/\/en.bitcoin.it\/wiki\/Controlled_supply, retrieved","year":"2018"},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/shop.bitmain.com\/product\/detail?pid=00020180503144211733Dd3wi9Ez06A0, retrieved","author":"Antminer","year":"2018"},{"key":"e_1_3_2_2_10_1","unstructured":"Blockchain.info. 2018. Bitcoin Market Capitalization. http:\/\/blockchain.info\/charts\/market-cap retrieved Feb. 2018. (2018).  Blockchain.info. 2018. Bitcoin Market Capitalization. http:\/\/blockchain.info\/charts\/market-cap retrieved Feb. 2018. (2018)."},{"key":"e_1_3_2_2_11_1","volume-title":"Bitcoin Mining Pools. https:\/\/blockchain.info\/pools, retrieved","year":"2018"},{"key":"e_1_3_2_2_12_1","volume-title":"Mempool Transaction Count. https:\/\/blockchain.info\/charts\/mempool-count, retrieved","year":"2018"},{"key":"e_1_3_2_2_13_1","volume-title":"https:\/\/blockchain.info\/charts\/transaction-fees, retrieved","author":"Fees Transaction","year":"2018"},{"key":"e_1_3_2_2_14_1","volume-title":"Felten","author":"Bonneau Joseph","year":"2015"},{"key":"e_1_3_2_2_15_1","unstructured":"Ryan Browne. 2017. The cheapest and most expensive countries to mine bitcoin. (2017). https:\/\/www.cnbc.com\/2018\/02\/15\/the-cheapest-and-most-expensive-countries-to-mine-bitcoin.html  Ryan Browne. 2017. The cheapest and most expensive countries to mine bitcoin. (2017). https:\/\/www.cnbc.com\/2018\/02\/15\/the-cheapest-and-most-expensive-countries-to-mine-bitcoin.html"},{"key":"e_1_3_2_2_16_1","volume-title":"A Next Generation Smart Contract & Decentralized Application Platform. https:\/\/www.ethereum.org\/ pdfs\/EthereumWhitePaper.pdf\/, retrieved","author":"Buterin Vitalik","year":"2015"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_2_18_1","unstructured":"Coinmarketcap.com. 2018. Cryptocurrency Market Capitalizations. (2018). https:\/\/coinmarketcap.com\/  Coinmarketcap.com. 2018. Cryptocurrency Market Capitalizations. (2018). https:\/\/coinmarketcap.com\/"},{"key":"e_1_3_2_2_19_1","volume-title":"Why is there a limited amount of bitcoin available?","author":"Davies Ellery","year":"2015"},{"key":"e_1_3_2_2_20_1","volume-title":"Economists relaxed about Bitcoin: New CFM-CEPR expert survey on cryptocurrencies, the financial system, and economic policy. VoxEU. org","author":"den Haan Wouter","year":"2017"},{"key":"e_1_3_2_2_21_1","unstructured":"Digiconomist.net. 2017. A Deep Dive in a Real-World Bitcoin Mine. (2017). https:\/\/digiconomist.net\/deep-dive-real-world-bitcoin-mine  Digiconomist.net. 2017. A Deep Dive in a Real-World Bitcoin Mine. (2017). https:\/\/digiconomist.net\/deep-dive-real-world-bitcoin-mine"},{"key":"e_1_3_2_2_22_1","unstructured":"Digiconomist.net. 2018 a. Bitcoin Energy Consumption Index. (2018). https:\/\/digiconomist.net\/bitcoin-energy-consumption  Digiconomist.net. 2018 a. Bitcoin Energy Consumption Index. (2018). https:\/\/digiconomist.net\/bitcoin-energy-consumption"},{"key":"e_1_3_2_2_23_1","unstructured":"Digiconomist.net. 2018 b. Ethereum Energy Consumption Index. (2018). https:\/\/digiconomist.net\/ethereum-energy-consumption  Digiconomist.net. 2018 b. Ethereum Energy Consumption Index. (2018). https:\/\/digiconomist.net\/ethereum-energy-consumption"},{"key":"e_1_3_2_2_24_1","volume-title":"Pricing via Processing or Combatting Junk Mail","author":"Dwork Cynthia"},{"key":"e_1_3_2_2_25_1","unstructured":"Earn.com. 2018. Predicting Bitcoin Fees For Transactions. (2018). https:\/\/bitcoinfees.earn.com\/  Earn.com. 2018. Predicting Bitcoin Fees For Transactions. (2018). https:\/\/bitcoinfees.earn.com\/"},{"key":"e_1_3_2_2_26_1","volume-title":"Ether Supply Growth. https:\/\/etherscan.io\/chart\/ethersupply, retrieved","year":"2018"},{"key":"e_1_3_2_2_27_1","volume-title":"Ether Transaction Fees. https:\/\/etherscan.io\/chart\/transactionfee, retrieved","year":"2018"},{"key":"e_1_3_2_2_28_1","volume-title":"https:\/\/etherscan.io\/chart\/pendingtx, retrieved","author":"Transactions Pending","year":"2018"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_2_31_1","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Eyal Ittay","year":"2016"},{"key":"e_1_3_2_2_32_1","unstructured":"Ittay Eyal Adem Efe Gencer Emin G\u00fcn Sirer and Robbert Van Renesse. 2016 b. Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45--59.   Ittay Eyal Adem Efe Gencer Emin G\u00fcn Sirer and Robbert Van Renesse. 2016 b. Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45--59."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not Enough: Bitcoin Mining is Vulnerable Financial Cryptography and Data Security.  Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not Enough: Bitcoin Mining is Vulnerable Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Juan A. Garay Aggelos Kiayias and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 281--310.  Juan A. Garay Aggelos Kiayias and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 281--310.","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_2_37_1","volume-title":"Monopoly without a monopolist: An economic analysis of the bitcoin payment system. ssrn id 3025604","author":"Huberman Gur","year":"2017"},{"key":"e_1_3_2_2_38_1","volume-title":"Sawtooth-core source code (validator). (2018). https:\/\/github.com\/hyperledger\/sawtooth-core\/tree\/0--7\/validator\/sawtooth_validator\/consensus\/poet1 {Online","year":"2018"},{"key":"e_1_3_2_2_39_1","volume-title":"Secure Information Networks","author":"Jakobsson Markus"},{"key":"e_1_3_2_2_40_1","volume-title":"Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. IACR Cryptology ePrint Archive","author":"Karame Ghassan","year":"2012"},{"key":"e_1_3_2_2_41_1","volume-title":"Ethereum: Ether, Ether Gas, Gas Limit, Gas Price and Fees.","author":"Khatwani Sudhir","year":"2018"},{"key":"e_1_3_2_2_42_1","volume-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol Annual International Cryptology Conference","author":"Kiayias Aggelos","year":"2017"},{"key":"e_1_3_2_2_43_1","volume-title":"Bitcoin in the Presence of Adversaries Workshop on the Economics of Information Security.","author":"Kroll Joshua A","year":"2013"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"e_1_3_2_2_45_1","volume-title":"Redesigning Bitcoin's fee market. arXiv preprint arXiv:1709.08881","author":"Lavi Ron","year":"2017"},{"key":"e_1_3_2_2_46_1","volume-title":"d.}. Litecoin, open source P2P digital currency. https:\/\/litecoin.org, retrieved","author":"Project Litecoin","year":"2014"},{"key":"e_1_3_2_2_47_1","unstructured":"Samara Malkin. 2018. Cheapest Places Mining Bitcoin. (2018). https:\/\/cryptocurrencynews.com\/daily-news\/cryptocurrency-mining\/cheapest-places-mining-bitcoin\/  Samara Malkin. 2018. Cheapest Places Mining Bitcoin. (2018). https:\/\/cryptocurrencynews.com\/daily-news\/cryptocurrency-mining\/cheapest-places-mining-bitcoin\/"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"e_1_3_2_2_49_1","volume-title":"Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees Financial Cryptography and Data Security","author":"M\u00f6ser Malte"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906988"},{"key":"e_1_3_2_2_51_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2008"},{"key":"e_1_3_2_2_52_1","first-page":"796","article-title":"Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack","volume":"2015","author":"Nayak Kartik","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_53_1","volume-title":"Analysis of the Blockchain Protocol in Asynchronous Networks Advances in Cryptology -- EUROCRYPT","author":"Pass Rafael","year":"2017"},{"key":"e_1_3_2_2_54_1","volume-title":"Hybrid Consensus: Efficient Consensus in the Permissionless Model. Cryptology ePrint Archive, Report 2016\/917.","author":"Pass Rafael","year":"2016"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_14"},{"key":"e_1_3_2_2_57_1","volume-title":"What Happens to Bitcoin After All 21 Million are Mined?","author":"Reiff Nathan","year":"2017"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"crossref","unstructured":"Ayelet Sapirshtein Yonatan Sompolinsky and Aviv Zohar. 2016. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security.  Ayelet Sapirshtein Yonatan Sompolinsky and Aviv Zohar. 2016. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_2_60_1","volume-title":"Incentive compatibility of bitcoin mining pool reward functions International Conference on Financial Cryptography and Data Security","author":"Schrijvers Okke"},{"key":"e_1_3_2_2_61_1","volume-title":"2017 International Conference on. IEEE, 109--113","author":"Tama Bayu Adhi","year":"2017"},{"key":"e_1_3_2_2_62_1","unstructured":"Jordan Tuwiner. 2017. Bitcoin Mining Hardware. (2017). https:\/\/www.buybitcoinworldwide.com\/mining\/hardware\/  Jordan Tuwiner. 2017. Bitcoin Mining Hardware. (2017). https:\/\/www.buybitcoinworldwide.com\/mining\/hardware\/"},{"key":"e_1_3_2_2_63_1","volume-title":"China Reveals Troubles Beyond Regulation.","author":"Wang Cindy","year":"2017"},{"key":"e_1_3_2_2_64_1","volume-title":"d.}. Electricity Pricing. https:\/\/en.wikipedia.org\/wiki\/Electricity_pricing, retrieved","year":"2018"},{"key":"e_1_3_2_2_65_1","first-page":"179","article-title":"REM: Resource-Efficient Mining for Blockchains","volume":"2017","author":"Zhang Fan","year":"2017","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243737","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":65,"alternative-id":["10.1145\/3243734.3243737","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243737","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}