{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T11:58:29Z","timestamp":1756382309139,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,26]],"date-time":"2021-09-26T00:00:00Z","timestamp":1632614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,26]]},"DOI":"10.1145\/3479722.3480795","type":"proceedings-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T17:35:26Z","timestamp":1637688926000},"page":"71-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Coalition-safe equilibria with virtual payoffs"],"prefix":"10.1145","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[{"name":"University of Edinburgh and IOHK, Edinburgh, United Kingdom"}]},{"given":"Aikaterini-Panagiota","family":"Stouka","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Cloud Mining. https:\/\/en.bitcoin.it\/wiki\/Cloud_mining.  [n.d.]. Cloud Mining. https:\/\/en.bitcoin.it\/wiki\/Cloud_mining."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Ethereum. https:\/\/ethereum.org\/en\/.  [n.d.]. Ethereum. https:\/\/ethereum.org\/en\/."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Hash function. https:\/\/en.wikipedia.org\/wiki\/Hash_function.  [n.d.]. Hash function. https:\/\/en.wikipedia.org\/wiki\/Hash_function."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146393"},{"key":"e_1_3_2_1_6_1","volume-title":"Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. CoRR abs\/1612.02916","author":"Abraham Ittai","year":"2016","unstructured":"Ittai Abraham , Dahlia Malkhi , Kartik Nayak , Ling Ren , and Alexander Spiegelman . 2016 . Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. CoRR abs\/1612.02916 (2016). arXiv:1612.02916 http:\/\/arxiv.org\/abs\/1612.02916 Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. 2016. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. CoRR abs\/1612.02916 (2016). arXiv:1612.02916 http:\/\/arxiv.org\/abs\/1612.02916"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095816"},{"key":"e_1_3_2_1_8_1","volume-title":"Bitcoin: A Natural Oligopoly. CoRR abs\/1811.08572","author":"Arnosti Nick","year":"2018","unstructured":"Nick Arnosti and S. Matthew Weinberg . 2018 . Bitcoin: A Natural Oligopoly. CoRR abs\/1811.08572 (2018). arXiv:1811.08572 http:\/\/arxiv.org\/abs\/1811.08572 Nick Arnosti and S. Matthew Weinberg. 2018. Bitcoin: A Natural Oligopoly. CoRR abs\/1811.08572 (2018). arXiv:1811.08572 http:\/\/arxiv.org\/abs\/1811.08572"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400882168"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"e_1_3_2_1_11_1","unstructured":"Adam Back. 1997. Hashcash. http:\/\/www.cypherspace.org\/hashcash.  Adam Back. 1997. Hashcash. http:\/\/www.cypherspace.org\/hashcash."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_2"},{"key":"e_1_3_2_1_13_1","volume-title":"POPL 2016 Student Research Competition.","author":"Bansal Suguman","year":"2016","unstructured":"Suguman Bansal . 2016 . Reasoning about incentive compatibility . POPL 2016 Student Research Competition. Suguman Bansal. 2016. Reasoning about incentive compatibility. POPL 2016 Student Research Competition."},{"key":"e_1_3_2_1_14_1","first-page":"300","article-title":"Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies","volume":"2017","author":"Bentov Iddo","year":"2017","unstructured":"Iddo Bentov , Pavel Hub\u00e1cek , Tal Moran , and Asaf Nadler . 2017 . Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies . IACR Cryptology ePrint Archive 2017 (2017), 300 . http:\/\/eprint.iacr.org\/2017\/300 Iddo Bentov, Pavel Hub\u00e1cek, Tal Moran, and Asaf Nadler. 2017. Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies. IACR Cryptology ePrint Archive 2017 (2017), 300. http:\/\/eprint.iacr.org\/2017\/300","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(87)90099-8"},{"volume-title":"The Blockchain Folk Theorem","author":"Biais Bruno","key":"e_1_3_2_1_16_1","unstructured":"Bruno Biais , Christophe Bisiere , Matthieu Bouvard , and Catherine Casamatta . 2018. The Blockchain Folk Theorem . Swiss Finance Institute Research Paper No . 17--75. Bruno Biais, Christophe Bisiere, Matthieu Bouvard, and Catherine Casamatta. 2018. The Blockchain Folk Theorem. Swiss Finance Institute Research Paper No. 17--75."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"e_1_3_2_1_18_1","volume-title":"Reward Sharing Schemes for Stake Pools. CoRR abs\/1807.11218","author":"Br\u00fcnjes Lars","year":"2018","unstructured":"Lars Br\u00fcnjes , Aggelos Kiayias , Elias Koutsoupias , and Aikaterini-Panagiota Stouka . 2018. Reward Sharing Schemes for Stake Pools. CoRR abs\/1807.11218 ( 2018 ). arXiv:1807.11218 http:\/\/arxiv.org\/abs\/1807.11218 Lars Br\u00fcnjes, Aggelos Kiayias, Elias Koutsoupias, and Aikaterini-Panagiota Stouka. 2018. Reward Sharing Schemes for Stake Pools. CoRR abs\/1807.11218 (2018). arXiv:1807.11218 http:\/\/arxiv.org\/abs\/1807.11218"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"volume-title":"Advances in Cryptology --- CRYPTO' 92, Ernest F","author":"Dwork Cynthia","key":"e_1_3_2_1_23_1","unstructured":"Cynthia Dwork and Moni Naor . 1993. Pricing via Processing or Combatting Junk Mail . In Advances in Cryptology --- CRYPTO' 92, Ernest F . Brickell (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 139--147. Cynthia Dwork and Moni Naor. 1993. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology --- CRYPTO' 92, Ernest F. Brickell (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 139--147."},{"volume-title":"Majority Is Not Enough: Bitcoin Mining Is Vulnerable","author":"Eyal Ittay","key":"e_1_3_2_1_24_1","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable . In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 436--454. Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 436--454."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329630"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.75"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.49"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"volume-title":"Byzantine Agreement with a Rational Adversary","author":"Groce Adam","key":"e_1_3_2_1_30_1","unstructured":"Adam Groce , Jonathan Katz , Aishwarya Thiruvengadam , and Vassilis Zikas . 2012. Byzantine Agreement with a Rational Adversary . In Automata, Languages, and Programming, Artur Czumaj, Kurt Mehlhorn, Andrew Pitts, and Roger Wattenhofer (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 561--572. Adam Groce, Jonathan Katz, Aishwarya Thiruvengadam, and Vassilis Zikas. 2012. Byzantine Agreement with a Rational Adversary. In Automata, Languages, and Programming, Artur Czumaj, Kurt Mehlhorn, Andrew Pitts, and Roger Wattenhofer (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 561--572."},{"key":"e_1_3_2_1_31_1","volume-title":"On profitability of selfish mining. CoRR abs\/1805.08281","author":"Grunspan Cyril","year":"2018","unstructured":"Cyril Grunspan and Ricardo P\u00e9rez-Marco . 2018. On profitability of selfish mining. CoRR abs\/1805.08281 ( 2018 ). arXiv:1805.08281 http:\/\/arxiv.org\/abs\/1805.08281 Cyril Grunspan and Ricardo P\u00e9rez-Marco. 2018. On profitability of selfish mining. CoRR abs\/1805.08281 (2018). arXiv:1805.08281 http:\/\/arxiv.org\/abs\/1805.08281"},{"volume-title":"Incentive compatibility. Encyclopedia Britannica, inc. Encyclopedia Britannica https:\/\/www.britannica.com\/topic\/incentive-compatibility","author":"James Jr.","key":"e_1_3_2_1_32_1","unstructured":"Jr. Harvey S. James . 2014. Incentive compatibility. Encyclopedia Britannica, inc. Encyclopedia Britannica https:\/\/www.britannica.com\/topic\/incentive-compatibility . Jr. Harvey S. James. 2014. Incentive compatibility. Encyclopedia Britannica, inc. Encyclopedia Britannica https:\/\/www.britannica.com\/topic\/incentive-compatibility."},{"key":"e_1_3_2_1_33_1","unstructured":"Charlie Hou Mingxun Zhou Yansquir Ji Phil Daian Florian Tramer Giulia Fanti and Ari Juels. 2019. SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. arXiv:1912.01798 [cs.CR]  Charlie Hou Mingxun Zhou Yansquir Ji Phil Daian Florian Tramer Giulia Fanti and Ari Juels. 2019. SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. arXiv:1912.01798 [cs.CR]"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of WEIS.","author":"Felten Edward W","year":"2013","unstructured":"Edward W Felten Joshua A Kroll , Ian C Davey . 2013 . The economics of Bitcoin mining, or Bitcoin in the presence of adversaries . In Proceedings of WEIS. Edward W Felten Joshua A Kroll, Ian C Davey. 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of WEIS."},{"key":"e_1_3_2_1_35_1","volume-title":"Brainard","author":"Juels Ari","year":"1999","unstructured":"Ari Juels and John G . Brainard . 1999 . Client Puzzles : A Cryptographic Counter-measure Against Connection Depletion Attacks. In NDSS. The Internet Society . Ari Juels and John G. Brainard. 1999. Client Puzzles: A Cryptographic Counter-measure Against Connection Depletion Attacks. In NDSS. The Internet Society."},{"volume-title":"Theory of Cryptography","author":"Katz Jonathan","key":"e_1_3_2_1_36_1","unstructured":"Jonathan Katz , Ueli Maurer , Bj\u00f6rn Tackmann , and Vassilis Zikas . 2013. Universally Composable Synchronous Computation . In Theory of Cryptography , Amit Sahai (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 477--498. Jonathan Katz, Ueli Maurer, Bj\u00f6rn Tackmann, and Vassilis Zikas. 2013. Universally Composable Synchronous Computation. In Theory of Cryptography, Amit Sahai (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 477--498."},{"volume-title":"Essentials of Game Theory: A Concise Multidisciplinary Introduction (Synthesis Lectures on Artificial Intelligence and Machine Learning)","author":"Kevin Leyton-Brown Yoav Shoham","key":"e_1_3_2_1_37_1","unstructured":"Yoav Shoham Kevin Leyton-Brown . 2008. Essentials of Game Theory: A Concise Multidisciplinary Introduction (Synthesis Lectures on Artificial Intelligence and Machine Learning) . Morgan & Claypool Publishers . Yoav Shoham Kevin Leyton-Brown. 2008. Essentials of Game Theory: A Concise Multidisciplinary Introduction (Synthesis Lectures on Artificial Intelligence and Machine Learning). Morgan & Claypool Publishers."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_39_1","unstructured":"Aggelos Kiayias and Aikaterini-Panagiota Stouka. 2019. Coalition-Safe Equilibria with Virtual Payoffs. arXiv:2001.00047 [cs.GT]  Aggelos Kiayias and Aikaterini-Panagiota Stouka. 2019. Coalition-Safe Equilibria with Virtual Payoffs. arXiv:2001.00047 [cs.GT]"},{"volume-title":"SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts","author":"Kothapalli Abhiram","key":"e_1_3_2_1_40_1","unstructured":"Abhiram Kothapalli , Andrew Miller , and Nikita Borisov . 2017. SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts . In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). Springer International Publishing , Cham , 536--552. Abhiram Kothapalli, Andrew Miller, and Nikita Borisov. 2017. SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). Springer International Publishing, Cham, 536--552."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_42_1","volume-title":"Oceanic Games: Centralization Risks and Incentives in Blockchain Mining. CoRR abs\/1904.02368","author":"Leonardos Nikos","year":"2019","unstructured":"Nikos Leonardos , Stefanos Leonardos , and Georgios Piliouras . 2019 . Oceanic Games: Centralization Risks and Incentives in Blockchain Mining. CoRR abs\/1904.02368 (2019). arXiv:1904.02368 http:\/\/arxiv.org\/abs\/1904.02368 Nikos Leonardos, Stefanos Leonardos, and Georgios Piliouras. 2019. Oceanic Games: Centralization Risks and Incentives in Blockchain Mining. CoRR abs\/1904.02368 (2019). arXiv:1904.02368 http:\/\/arxiv.org\/abs\/1904.02368"},{"key":"e_1_3_2_1_43_1","unstructured":"Stefanos Leonardos Daniel Reijsbergen and Georgios Piliouras. 2019. PREStO: A Systematic Framework for Blockchain Consensus Protocols. arXiv:1906.06540 [cs.CR]  Stefanos Leonardos Daniel Reijsbergen and Georgios Piliouras. 2019. PREStO: A Systematic Framework for Blockchain Consensus Protocols. arXiv:1906.06540 [cs.CR]"},{"volume-title":"Inclusive Block Chain Protocols","author":"Lewenberg Yoad","key":"e_1_3_2_1_44_1","unstructured":"Yoad Lewenberg , Yonatan Sompolinsky , and Aviv Zohar . 2015. Inclusive Block Chain Protocols . In Financial Cryptography and Data Security, Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 528--547. Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. 2015. Inclusive Block Chain Protocols. In Financial Cryptography and Data Security, Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 528--547."},{"volume-title":"Incentivizing Blockchain Forks via Whale Transactions","author":"Liao Kevin","key":"e_1_3_2_1_45_1","unstructured":"Kevin Liao and Jonathan Katz . 2017. Incentivizing Blockchain Forks via Whale Transactions . In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). Springer International Publishing , Cham , 264--279. Kevin Liao and Jonathan Katz. 2017. Incentivizing Blockchain Forks via Whale Transactions. In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). Springer International Publishing, Cham, 264--279."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2701163"},{"key":"e_1_3_2_1_47_1","volume-title":"Wenbo Wang, Dusit Niyato, Ping Wang, Ying-Chang Liang, and Dong In Kim.","author":"Liu Ziyao","year":"2019","unstructured":"Ziyao Liu , Nguyen Cong Luong , Wenbo Wang, Dusit Niyato, Ping Wang, Ying-Chang Liang, and Dong In Kim. 2019 . A Survey on Applications of Game Theory in Blockchain . arXiv:1902.10865 [cs.GT] Ziyao Liu, Nguyen Cong Luong, Wenbo Wang, Dusit Niyato, Ping Wang, Ying-Chang Liang, and Dong In Kim. 2019. A Survey on Applications of Game Theory in Blockchain. arXiv:1902.10865 [cs.GT]"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813659"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_50_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System . http:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_3_2_1_54_1","unstructured":"R. L. Rivest A. Shamir and D. A. Wagner. 1996. Time-lock Puzzles and Timed-release Crypto. Technical Report. Cambridge MA USA.  R. L. Rivest A. Shamir and D. A. Wagner. 1996. Time-lock Puzzles and Timed-release Crypto. Technical Report. Cambridge MA USA."},{"volume-title":"Quantitative Analysis of the Full Bitcoin Transaction Graph","author":"Ron Dorit","key":"e_1_3_2_1_55_1","unstructured":"Dorit Ron and Adi Shamir . 2013. Quantitative Analysis of the Full Bitcoin Transaction Graph . In Financial Cryptography and Data Security, Ahmad-Reza Sadeghi (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 6--24. Dorit Ron and Adi Shamir. 2013. Quantitative Analysis of the Full Bitcoin Transaction Graph. In Financial Cryptography and Data Security, Ahmad-Reza Sadeghi (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 6--24."},{"key":"e_1_3_2_1_56_1","unstructured":"Tim Roughgarden. 2020. Transaction Fee Mechanism Design for the Ethereum Blockchain: An Economic Analysis of EIP-1559. arXiv:2012.00854 [cs.GT]  Tim Roughgarden. 2020. Transaction Fee Mechanism Design for the Ethereum Blockchain: An Economic Analysis of EIP-1559. arXiv:2012.00854 [cs.GT]"},{"volume-title":"Optimal Selfish Mining Strategies in Bitcoin","author":"Sapirshtein Ayelet","key":"e_1_3_2_1_57_1","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2017. Optimal Selfish Mining Strategies in Bitcoin . In Financial Cryptography and Data Security, Jens Grossklags and Bart Preneel (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 515--532. Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2017. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security, Jens Grossklags and Bart Preneel (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 515--532."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243737"},{"key":"e_1_3_2_1_60_1","volume-title":"The Gap Game. CoRR abs\/1805.05288","author":"Tsabary Itay","year":"2018","unstructured":"Itay Tsabary and Ittay Eyal . 2018. The Gap Game. CoRR abs\/1805.05288 ( 2018 ). arXiv:1805.05288 http:\/\/arxiv.org\/abs\/1805.05288 Itay Tsabary and Ittay Eyal. 2018. The Gap Game. CoRR abs\/1805.05288 (2018). arXiv:1805.05288 http:\/\/arxiv.org\/abs\/1805.05288"}],"event":{"name":"AFT '21: 3rd ACM Conference on Advances in Financial Technologies","sponsor":["ACM Association for Computing Machinery"],"location":"Arlington Virginia","acronym":"AFT '21"},"container-title":["Proceedings of the 3rd ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479722.3480795","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479722.3480795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:19:00Z","timestamp":1750191540000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479722.3480795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,26]]},"references-count":59,"alternative-id":["10.1145\/3479722.3480795","10.1145\/3479722"],"URL":"https:\/\/doi.org\/10.1145\/3479722.3480795","relation":{},"subject":[],"published":{"date-parts":[[2021,9,26]]},"assertion":[{"value":"2021-11-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}