{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:10:08Z","timestamp":1750205408078,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313740","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"917-927","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Blockchain Mining Games with Pay Forward"],"prefix":"10.1145","author":[{"given":"Elias","family":"Koutsoupias","sequence":"first","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"given":"Philip","family":"Lazos","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"given":"Foluso","family":"Ogunlana","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"given":"Paolo","family":"Serafino","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_1_4_1","volume-title":"Courtois and Lear Bahack","author":"Nicolas","year":"2014","unstructured":"Nicolas T. Courtois and Lear Bahack . 2014 . On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. CoRR abs\/1402.1718(2014). arxiv:1402.1718http:\/\/arxiv.org\/abs\/1402.1718 Nicolas T. Courtois and Lear Bahack. 2014. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. CoRR abs\/1402.1718(2014). arxiv:1402.1718http:\/\/arxiv.org\/abs\/1402.1718"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_1_6_1","volume-title":"Emin G\u00fcn Sirer, and Robbert Van Renesse.","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016 . Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45-59. Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45-59."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_9_1","volume-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology - CRYPTO","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias , Alexander Russell , Bernardo David , and Roman Oliynykov . 2017 . Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology - CRYPTO 2017, Jonathan Katz and Hovav Shacham (Eds.). Springer International Publishing , Cham, 357-388. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology - CRYPTO 2017, Jonathan Katz and Hovav Shacham (Eds.). Springer International Publishing, Cham, 357-388."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of WEIS","volume":"2013","author":"Kroll Joshua A","year":"2013","unstructured":"Joshua A Kroll , Ian C Davey , and Edward W Felten . 2013 . The economics of Bitcoin mining, or Bitcoin in the presence of adversaries . In Proceedings of WEIS , Vol. 2013 . 11. Joshua A Kroll, Ian C Davey, and Edward W Felten. 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of WEIS, Vol. 2013. 11."},{"key":"e_1_3_2_1_11_1","first-page":"919","volume-title":"Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems(AAMAS '15)","author":"Lewenberg Yoad","unstructured":"Yoad Lewenberg , Yoram Bachrach , Yonatan Sompolinsky , Aviv Zohar , and Jeffrey S. Rosenschein . 2015. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis . In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems(AAMAS '15) . International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC , 919 - 927 . http:\/\/dl.acm.org\/citation.cfm?id=2772879.2773270 Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S. Rosenschein. 2015. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems(AAMAS '15). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 919-927. http:\/\/dl.acm.org\/citation.cfm?id=2772879.2773270"},{"key":"e_1_3_2_1_12_1","unstructured":"Satoshi Nakamoto. {n. d.}. Bitcoin: A peer-to-peer electronic cash system \u201d http:\/\/bitcoin.org\/bitcoin.pdf.  Satoshi Nakamoto. {n. d.}. Bitcoin: A peer-to-peer electronic cash system \u201d http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_13_1","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. draft version 0.5 9(2016) 14.  Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. draft version 0.5 9(2016) 14."},{"key":"e_1_3_2_1_14_1","unstructured":"Meni Rosenfeld. 2011. Analysis of Bitcoin Pooled Mining Reward Systems. CoRR abs\/1112.4980(2011). arxiv:1112.4980http:\/\/arxiv.org\/abs\/1112.4980  Meni Rosenfeld. 2011. Analysis of Bitcoin Pooled Mining Reward Systems. CoRR abs\/1112.4980(2011). arxiv:1112.4980http:\/\/arxiv.org\/abs\/1112.4980"},{"key":"e_1_3_2_1_15_1","unstructured":"Meni Rosenfeld. 2014. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009(2014).  Meni Rosenfeld. 2014. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009(2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 515-532","author":"Sapirshtein Ayelet","year":"2016","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2016 . Optimal selfish mining strategies in bitcoin . In International Conference on Financial Cryptography and Data Security. Springer, 515-532 . Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 515-532."},{"key":"e_1_3_2_1_17_1","first-page":"1159","article-title":"SPECTRE: A Fast and Scalable Cryptocurrency Protocol","volume":"2016","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky , Yoad Lewenberg , and Aviv Zohar . 2016 . SPECTRE: A Fast and Scalable Cryptocurrency Protocol . IACR Cryptology ePrint Archive 2016 (2016), 1159 . Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive 2016 (2016), 1159.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_1_19_1","first-page":"104","article-title":"PHANTOM: A Scalable BlockDAG Protocol","volume":"2018","author":"Sompolinsky Yonatan","year":"2018","unstructured":"Yonatan Sompolinsky and Aviv Zohar . 2018 . PHANTOM: A Scalable BlockDAG Protocol . IACR Cryptology ePrint Archive 2018 (2018), 104 . Yonatan Sompolinsky and Aviv Zohar. 2018. PHANTOM: A Scalable BlockDAG Protocol. IACR Cryptology ePrint Archive 2018 (2018), 104.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco CA USA","acronym":"WWW '19"},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:31Z","timestamp":1750204411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":20,"alternative-id":["10.1145\/3308558.3313740","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313740","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}