{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:21:42Z","timestamp":1768407702176,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355472","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"169-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Eye for an Eye"],"prefix":"10.1145","author":[{"given":"Yujin","family":"Kwon","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University"}]},{"given":"Yung","family":"Yi","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Robert Axelrod et al. 1987. The evolution of strategies in the iterated prisoner\u00e2\u0102&Zacute;s dilemma. The dynamics of norms (1987) 1--16.  Robert Axelrod et al. 1987. The evolution of strategies in the iterated prisoner\u00e2\u0102&Zacute;s dilemma. The dynamics of norms (1987) 1--16."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/blockchain.info\/pools. (2018). [Online","author":"Hashrate Distribution Blockchain Info","year":"2018","unstructured":"Blockchain Info 2018. Hashrate Distribution . https:\/\/blockchain.info\/pools. (2018). [Online ; accessed 02- May - 2018 ]. Blockchain Info 2018. Hashrate Distribution. https:\/\/blockchain.info\/pools. (2018). [Online; accessed 02-May-2018]."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5193(89)80188-2"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/pool.btc.com\/pool-stats. (2018). [Online","year":"2018","unstructured":"BTC.com 2018. BTC.com. https:\/\/pool.btc.com\/pool-stats. (2018). [Online ; accessed 30- April - 2018 ]. BTC.com 2018. BTC.com. https:\/\/pool.btc.com\/pool-stats. (2018). [Online; accessed 30-April-2018]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_1_6_1","unstructured":"Cloud Mining 2018. bestcloudmining. http:\/\/www.bestcloudmining.net\/. (2018). [Online; accessed 2-May-2018].  Cloud Mining 2018. bestcloudmining. http:\/\/www.bestcloudmining.net\/. (2018). [Online; accessed 2-May-2018]."},{"key":"e_1_3_2_1_7_1","volume-title":"On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. arXiv preprint arXiv:1402.1718","author":"Courtois Nicolas T","year":"2014","unstructured":"Nicolas T Courtois and Lear Bahack . 2014. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. arXiv preprint arXiv:1402.1718 ( 2014 ). Nicolas T Courtois and Lear Bahack. 2014. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. arXiv preprint arXiv:1402.1718 (2014)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_11"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_1_10_1","volume-title":"How to Disincentivize Large Bitcoin Mining Pools. (2014). [Online","author":"Eyal Ittay","year":"2017","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . 2014. How to Disincentivize Large Bitcoin Mining Pools. (2014). [Online ; accessed 1- May - 2017 ]. Ittay Eyal and Emin G\u00fcn Sirer. 2014. How to Disincentivize Large Bitcoin Mining Pools. (2014). [Online; accessed 1-May-2017]."},{"key":"e_1_3_2_1_11_1","volume-title":"Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In International Conference on Financial Cryptography and Data Security. Springer.","author":"Eyal Ittay","year":"2014","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . 2014 . Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In International Conference on Financial Cryptography and Data Security. Springer. Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In International Conference on Financial Cryptography and Data Security. Springer."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Drew Fudenberg and Eric Maskin. 2009. The folk theorem in repeated games with discounting or with incomplete information. In A Long-Run Collaboration On Long-Run Games. World Scientific 209--230.  Drew Fudenberg and Eric Maskin. 2009. The folk theorem in repeated games with discounting or with incomplete information. In A Long-Run Collaboration On Long-Run Games. World Scientific 209--230.","DOI":"10.1142\/9789812818478_0011"},{"key":"e_1_3_2_1_13_1","volume-title":"On the Security and Performance of Proof of Work Blockchains. In Conference on Computer and Communications Security. ACM.","author":"Gervais Arthur","year":"2016","unstructured":"Arthur Gervais , Ghassan O Karame , Karl W\u00fcst , Vasileios Glykantzis , Hubert Ritzdorf , and Srdjan Capkun . 2016 . On the Security and Performance of Proof of Work Blockchains. In Conference on Computer and Communications Security. ACM. Arthur Gervais, Ghassan O Karame, Karl W\u00fcst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. In Conference on Computer and Communications Security. ACM."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"e_1_3_2_1_15_1","volume-title":"Double-spending Fast Payments in Bitcoin. In Conference on Computer and Communications Security. ACM.","author":"Karame Ghassan O","year":"2012","unstructured":"Ghassan O Karame , Elli Androulaki , and Srdjan Capkun . 2012 . Double-spending Fast Payments in Bitcoin. In Conference on Computer and Communications Security. ACM. Ghassan O Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending Fast Payments in Bitcoin. In Conference on Computer and Communications Security. ACM."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of WEIS","volume":"2013","author":"Kroll Joshua A","year":"2013","unstructured":"Joshua A Kroll , Ian C Davey , and Edward W Felten . 2013 . The economics of Bitcoin mining, or Bitcoin in the presence of adversaries . In Proceedings of WEIS , Vol. 2013 . Joshua A Kroll, Ian C Davey, and Edward W Felten. 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of WEIS, Vol. 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"e_1_3_2_1_18_1","volume-title":"Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? arXiv preprint arXiv:1902.11064","author":"Kwon Yujin","year":"2019","unstructured":"Yujin Kwon , Hyoungshick Kim , Jinwoo Shin , and Yongdae Kim . 2019. Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? arXiv preprint arXiv:1902.11064 ( 2019 ). Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, and Yongdae Kim. 2019. Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? arXiv preprint arXiv:1902.11064 (2019)."},{"key":"e_1_3_2_1_19_1","volume-title":"An Eye for an Eye: Economics of Retaliation in Mining Pools. arXiv preprint arXiv:1908.10781","author":"Kwon Yujin","year":"2019","unstructured":"Yujin Kwon , Hyoungshick Kim , Yung Yi , and Yongdae Kim . 2019. An Eye for an Eye: Economics of Retaliation in Mining Pools. arXiv preprint arXiv:1908.10781 ( 2019 ). Yujin Kwon, Hyoungshick Kim, Yung Yi, and Yongdae Kim. 2019. An Eye for an Eye: Economics of Retaliation in Mining Pools. arXiv preprint arXiv:1908.10781 (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_5"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 919--927","author":"Lewenberg Yoad","year":"2015","unstructured":"Yoad Lewenberg , Yoram Bachrach , Yonatan Sompolinsky , Aviv Zohar , and Jeffrey S Rosenschein . 2015 . Bitcoin mining pools: A cooperative game theoretic analysis . In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 919--927 . Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S Rosenschein. 2015. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 919--927."},{"key":"e_1_3_2_1_22_1","volume-title":"On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. In Computer Security Foundations Symposium (CSF). IEEE.","author":"Luu Loi","year":"2015","unstructured":"Loi Luu , Ratul Saha , Inian Parameshwaran , Prateek Saxena , and Aquinas Hobor . 2015 . On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. In Computer Security Foundations Symposium (CSF). IEEE. Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, and Aquinas Hobor. 2015. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. In Computer Security Foundations Symposium (CSF). IEEE."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_1_25_1","volume-title":"Double Spending Risk Remains After July 4th Bitcoin Fork. https:\/\/www.coindesk.com\/double-spending-risk-bitcoin-network-fork\/. (2018). [Online","author":"Pete Rizzo","year":"2018","unstructured":"Pete Rizzo 2018. Double Spending Risk Remains After July 4th Bitcoin Fork. https:\/\/www.coindesk.com\/double-spending-risk-bitcoin-network-fork\/. (2018). [Online ; accessed 30- April - 2018 ]. Pete Rizzo 2018. Double Spending Risk Remains After July 4th Bitcoin Fork. https:\/\/www.coindesk.com\/double-spending-risk-bitcoin-network-fork\/. (2018). [Online; accessed 30-April-2018]."},{"key":"e_1_3_2_1_26_1","volume-title":"https:\/\/btc.com\/stats\/pool. (2018). [Online","author":"Pool Distribution Pool Distribution","year":"2018","unstructured":"Pool Distribution 2018. Pool Distribution . https:\/\/btc.com\/stats\/pool. (2018). [Online ; accessed 2- May - 2018 ]. Pool Distribution 2018. Pool Distribution. https:\/\/btc.com\/stats\/pool. (2018). [Online; accessed 2-May-2018]."},{"key":"e_1_3_2_1_27_1","volume-title":"Proof of Work. https:\/\/en.bitcoin.it\/wiki\/Proof_of_work.(2018). [Online","author":"Proof","year":"2018","unstructured":"Proof 2018. Proof of Work. https:\/\/en.bitcoin.it\/wiki\/Proof_of_work.(2018). [Online ; accessed 30- April - 2018 ]. Proof 2018. Proof of Work. https:\/\/en.bitcoin.it\/wiki\/Proof_of_work.(2018). [Online; accessed 30-April-2018]."},{"key":"e_1_3_2_1_28_1","volume-title":"Analysis of Bitcoin Pooled Mining Reward Systems. arXiv preprint arXiv:1112.4980","author":"Rosenfeld Meni","year":"2011","unstructured":"Meni Rosenfeld . 2011. Analysis of Bitcoin Pooled Mining Reward Systems. arXiv preprint arXiv:1112.4980 ( 2011 ). Meni Rosenfeld. 2011. Analysis of Bitcoin Pooled Mining Reward Systems. arXiv preprint arXiv:1112.4980 (2011)."},{"key":"e_1_3_2_1_29_1","volume-title":"Optimal Selfish Mining Strategies in Bitcoin. arXiv preprint arXiv:1507.06183","author":"Sapirshtein Ayelet","year":"2015","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2015. Optimal Selfish Mining Strategies in Bitcoin. arXiv preprint arXiv:1507.06183 ( 2015 ). Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2015. Optimal Selfish Mining Strategies in Bitcoin. arXiv preprint arXiv:1507.06183 (2015)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243737"},{"key":"e_1_3_2_1_31_1","volume-title":"https:\/\/pool.viabtc.com\/. (2018). [Online","author":"BTC","year":"2018","unstructured":"Via BTC 2018. ViaBTC. https:\/\/pool.viabtc.com\/. (2018). [Online ; accessed 3- May - 2018 ]. ViaBTC 2018. ViaBTC. https:\/\/pool.viabtc.com\/. (2018). [Online; accessed 3-May-2018]."},{"key":"e_1_3_2_1_32_1","volume-title":"Promoting Cooperative Strategies on Proof-of-Work Blockchain. In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8.","author":"Yoo Seunghyun","year":"2018","unstructured":"Seunghyun Yoo , Seungbae Kim , Joshua Joy , and Mario Gerla . 2018 . Promoting Cooperative Strategies on Proof-of-Work Blockchain. In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8. Seunghyun Yoo, Seungbae Kim, Joshua Joy, and Mario Gerla. 2018. Promoting Cooperative Strategies on Proof-of-Work Blockchain. In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8."}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:34Z","timestamp":1750268974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355472"}},"subtitle":["Economics of Retaliation in Mining Pools"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":32,"alternative-id":["10.1145\/3318041.3355472","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355472","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}