{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:43:28Z","timestamp":1765827808186,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1838154, NSF CCF-1703925, CCF-1763970, CCF-1813188"],"award-info":[{"award-number":["IIS-1838154, NSF CCF-1703925, CCF-1763970, CCF-1813188"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355470","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"124-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["An Axiomatic Approach to Block Rewards"],"prefix":"10.1145","author":[{"given":"Xi","family":"Chen","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Christos","family":"Papadimitriou","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Tim","family":"Roughgarden","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1086\/256963"},{"key":"e_1_3_2_1_2_1","volume-title":"Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance.","author":"Bissias George","year":"2017","unstructured":"George Bissias and Brian Levine . 2017 . Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance. (2017). arXiv:1709.08750. George Bissias and Brian Levine. 2017. Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance. (2017). arXiv:1709.08750."},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 154--167","author":"Carlsten M.","key":"e_1_3_2_1_3_1","unstructured":"M. Carlsten , H. A. Kalodner , S. M. Weinberg , and A. Narayanan . 2016. On the Instability of Bitcoin Without the Block Reward . In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 154--167 . M. Carlsten, H. A. Kalodner, S. M. Weinberg, and A. Narayanan. 2016. On the Instability of Bitcoin Without the Block Reward. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 154--167."},{"volume-title":"Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security.","author":"Eyal I.","key":"e_1_3_2_1_4_1","unstructured":"I. Eyal and E. G\u00fcn Sirer . 2014. Majority is not Enough: Bitcoin Mining is Vulnerable . In Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security. I. Eyal and E. G\u00fcn Sirer. 2014. Majority is not Enough: Bitcoin Mining is Vulnerable. In Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"volume-title":"Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS).","author":"Lewenberg Y.","key":"e_1_3_2_1_6_1","unstructured":"Y. Lewenberg , Y. Bachrach , Y. Sompolinski , A Zohar , and J. S. Rosenschein . 2015. Bitcoin pools: a cooperative game theoretic analysis . In Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Y. Lewenberg, Y. Bachrach, Y. Sompolinski, A Zohar, and J. S. Rosenschein. 2015. Bitcoin pools: a cooperative game theoretic analysis. In Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)."},{"key":"e_1_3_2_1_7_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Unpublished white paper. S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). Unpublished white paper."},{"key":"e_1_3_2_1_8_1","volume-title":"Vazirani","author":"Nisan Noam","year":"2007","unstructured":"Noam Nisan , Tim Roughgarden , \u00c9va Tardos , and Vijay V . Vazirani . 2007 . Algorithmic Game Theory. Cambridge University Press , New York, NY, USA. Noam Nisan, Tim Roughgarden, \u00c9va Tardos, and Vijay V. Vazirani. 2007. Algorithmic Game Theory. Cambridge University Press, New York, NY, USA."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"volume-title":"Proceedings of the 20th International Conference on Financial Cryptography and Data Security.","author":"Sapirshtein A.","key":"e_1_3_2_1_10_1","unstructured":"A. Sapirshtein , Y. Sompolinsky , and Zohar A . 2016. Optimal Selfish Mining Strategies in Bitcoin . In Proceedings of the 20th International Conference on Financial Cryptography and Data Security. A. Sapirshtein, Y. Sompolinsky, and Zohar A. 2016. Optimal Selfish Mining Strategies in Bitcoin. In Proceedings of the 20th International Conference on Financial Cryptography and Data Security."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 20th International Conference on Financial Cryptography and Data Security.","author":"Schrijvers Okke","year":"2016","unstructured":"Okke Schrijvers , Joseph Bonneau , Dan Boneh , and Tim Roughgarden . 2016 . Incentive Compatibility of Bitcoin Mining Pool Reward Functions . In Proceedings of the 20th International Conference on Financial Cryptography and Data Security. Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden. 2016. Incentive Compatibility of Bitcoin Mining Pool Reward Functions. In Proceedings of the 20th International Conference on Financial Cryptography and Data Security."},{"volume-title":"Additive and Non-Additive Set Functions. Ph.D.Dissertation. Department of Mathematics","author":"Shapley L. S.","key":"e_1_3_2_1_12_1","unstructured":"L. S. Shapley . 1953. Additive and Non-Additive Set Functions. Ph.D.Dissertation. Department of Mathematics , Princeton University . L. S. Shapley. 1953. Additive and Non-Additive Set Functions. Ph.D.Dissertation. Department of Mathematics, Princeton University."},{"key":"e_1_3_2_1_13_1","unstructured":"J. von Neumann and O. Morgenstern. 1947. Theory of Games and Economic Behavior. Princeton University Press. Second edition.  J. von Neumann and O. Morgenstern. 1947. Theory of Games and Economic Behavior. Princeton University Press. Second edition."}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","sponsor":["ACM Association for Computing Machinery"],"location":"Zurich Switzerland","acronym":"AFT '19"},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355470","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:34Z","timestamp":1750268974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":13,"alternative-id":["10.1145\/3318041.3355470","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355470","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}