{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T02:31:59Z","timestamp":1768789919206,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T00:00:00Z","timestamp":1560729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Israel Science Foundation","award":["1841\/14"],"award-info":[{"award-number":["1841\/14"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1813135"],"award-info":[{"award-number":["1813135"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ERC","award":["321171"],"award-info":[{"award-number":["321171"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,17]]},"DOI":"10.1145\/3328526.3329630","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"489-502","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Energy Equilibria in Proof-of-Work Mining"],"prefix":"10.1145","author":[{"given":"Amos","family":"Fiat","sequence":"first","affiliation":[{"name":"Tel-Aviv university, Tel Aviv, Israel"}]},{"given":"Anna","family":"Karlin","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Elias","family":"Koutsoupias","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Christos","family":"Papadimitriou","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,17]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"868","article-title":"Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)","volume":"2013","author":"Bahack Lear","year":"2013","unstructured":"Lear Bahack . 2013 . Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) . IACR Cryptology ePrint Archive , Vol. 2013 (2013), 868 . Lear Bahack. 2013. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). IACR Cryptology ePrint Archive, Vol. 2013 (2013), 868.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_2_3_1","volume-title":"Courtois and Lear Bahack","author":"Nicolas","year":"2014","unstructured":"Nicolas T. Courtois and Lear Bahack . 2014 . On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. CoRR , Vol. abs\/ 1402 .1718 (2014). arxiv: 1402.1718 http:\/\/arxiv.org\/abs\/1402.1718 Nicolas T. Courtois and Lear Bahack. 2014. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. CoRR, Vol. abs\/1402.1718 (2014). arxiv: 1402.1718 http:\/\/arxiv.org\/abs\/1402.1718"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_2_6_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_2_7_1","volume-title":"Bitcoin and cryptocurrency technologies: a comprehensive introduction","author":"Narayanan Arvind","unstructured":"Arvind Narayanan , Joseph Bonneau , Edward Felten , Andrew Miller , and Steven Goldfeder . 2016. Bitcoin and cryptocurrency technologies: a comprehensive introduction . Princeton University Press . Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. 2016. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press."},{"key":"e_1_3_2_2_8_1","volume-title":"2016 IEEE European Symposium on Security and Privacy (EuroS P) . 305--320","author":"Nayak K.","unstructured":"K. Nayak , S. Kumar , A. Miller , and E. Shi . 2016. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack . In 2016 IEEE European Symposium on Security and Privacy (EuroS P) . 305--320 . K. Nayak, S. Kumar, A. Miller, and E. Shi. 2016. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS P) . 305--320."},{"key":"e_1_3_2_2_9_1","volume-title":"Optimal Selfish Mining Strategies in Bitcoin","author":"Sapirshtein Ayelet","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2017. Optimal Selfish Mining Strategies in Bitcoin . In Financial Cryptography and Data Security, Jens Grossklags and Bart Preneel (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 515--532. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2017. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security, Jens Grossklags and Bart Preneel (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 515--532."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152481"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701411"}],"event":{"name":"EC '19: ACM Conference on Economics and Computation","location":"Phoenix AZ USA","acronym":"EC '19","sponsor":["SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the 2019 ACM Conference on Economics and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328526.3329630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328526.3329630","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328526.3329630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:01Z","timestamp":1750204441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328526.3329630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,17]]},"references-count":11,"alternative-id":["10.1145\/3328526.3329630","10.1145\/3328526"],"URL":"https:\/\/doi.org\/10.1145\/3328526.3329630","relation":{},"subject":[],"published":{"date-parts":[[2019,6,17]]},"assertion":[{"value":"2019-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}