{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:12:46Z","timestamp":1755839566932,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1145\/3558535.3559781","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:54:17Z","timestamp":1688568857000},"page":"281-293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain Nash Dynamics and the Pursuit of Compliance"],"prefix":"10.1145","author":[{"given":"Dimitris","family":"Karakostas","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Edinburgh and IOG, Edinburgh, United Kingdom"}]},{"given":"Thomas","family":"Zacharias","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2019.5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243848"},{"volume-title":"The encyclopedia of public choice","author":"Baumol William J","key":"e_1_3_2_1_4_1","unstructured":"William J Baumol . 2004. Welfare Economics and the Theory of the State . In The encyclopedia of public choice . Springer , 937--940. William J Baumol. 2004. Welfare Economics and the Theory of the State. In The encyclopedia of public choice. Springer, 937--940."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329567"},{"key":"e_1_3_2_1_7_1","unstructured":"Vitalik Buterin. 2014. On stake. https:\/\/blog.ethereum.org\/2014\/07\/05\/stake\/. Vitalik Buterin. 2014. On stake. https:\/\/blog.ethereum.org\/2014\/07\/05\/stake\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith . 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 ( 2017 ). Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Vitalik Buterin Dani\u00ebl Reijsbergen Stefanos Leonardos and Georgios Piliouras. 2019. Incentives in Ethereum's Hybrid Casper Protocol. CoRR abs\/1903.04205. arXiv:1903.04205 http:\/\/arxiv.org\/abs\/1903.04205 Vitalik Buterin Dani\u00ebl Reijsbergen Stefanos Leonardos and Georgios Piliouras. 2019. Incentives in Ethereum's Hybrid Casper Protocol. CoRR abs\/1903.04205. arXiv:1903.04205 http:\/\/arxiv.org\/abs\/1903.04205","DOI":"10.1109\/BLOC.2019.8751241"},{"key":"e_1_3_2_1_10_1","volume-title":"ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. Cryptology ePrint Archive, Report 2018\/377. https:\/\/eprint.iacr.org\/2018\/377.","author":"Chen Jing","year":"2018","unstructured":"Jing Chen , Sergey Gorbunov , Silvio Micali , and Georgios Vlachos . 2018 . ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. Cryptology ePrint Archive, Report 2018\/377. https:\/\/eprint.iacr.org\/2018\/377. Jing Chen, Sergey Gorbunov, Silvio Micali, and Georgios Vlachos. 2018. ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. Cryptology ePrint Archive, Report 2018\/377. https:\/\/eprint.iacr.org\/2018\/377."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355470"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2009.05.004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_18"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_29"},{"key":"e_1_3_2_1_17_1","unstructured":"Ethereum. 2018. Proof of Stake FAQs. https:\/\/eth.wiki\/en\/concepts\/proof-of-stake-faqs. Ethereum. 2018. Proof of Stake FAQs. https:\/\/eth.wiki\/en\/concepts\/proof-of-stake-faqs."},{"key":"e_1_3_2_1_18_1","volume-title":"Emin G\u00fcn Sirer, and Robbert Van Renesse.","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016 . Bitcoin-ng : A scalable blockchain protocol. In 13th {USENIX} symposium on networked systems design and implementation ({NSDI} 16). 45--59. Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In 13th {USENIX} symposium on networked systems design and implementation ({NSDI} 16). 45--59."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007445"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465456.3467636"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329630"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00059"},{"key":"e_1_3_2_1_25_1","unstructured":"Algorand Foundation. 2020. FAQs. https:\/\/algorand.foundation\/faq Algorand Foundation. 2020. FAQs. https:\/\/algorand.foundation\/faq"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_13"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_29_1","volume-title":"Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. https:\/\/eprint.iacr.org\/2017\/454.","author":"Gilad Yossi","year":"2017","unstructured":"Yossi Gilad , Rotem Hemo , Silvio Micali , Georgios Vlachos , and Nickolai Zeldovich . 2017 . Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. https:\/\/eprint.iacr.org\/2017\/454. Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. https:\/\/eprint.iacr.org\/2017\/454."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.68"},{"key":"e_1_3_2_1_31_1","volume-title":"FC 2019: 23rd International Conference on Financial Cryptography and Data Security. Lecture Notes in Computer Science","volume":"11598","author":"Goldberg Ian","year":"2019","unstructured":"Ian Goldberg and Tyler Moore ( Eds .). 2019 . FC 2019: 23rd International Conference on Financial Cryptography and Data Security. Lecture Notes in Computer Science , Vol. 11598 . Springer, Heidelberg, Germany, Frigate Bay, St. Kitts and Nevis. Ian Goldberg and Tyler Moore (Eds.). 2019. FC 2019: 23rd International Conference on Financial Cryptography and Data Security. Lecture Notes in Computer Science, Vol. 11598. Springer, Heidelberg, Germany, Frigate Bay, St. Kitts and Nevis."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329566"},{"key":"e_1_3_2_1_33_1","unstructured":"Cyril Grunspan and Ricardo P\u00e9rez-Marco. 2019. On profitability of selfish mining. arXiv:1805.08281 [cs.GT] Cyril Grunspan and Ricardo P\u00e9rez-Marco. 2019. On profitability of selfish mining. arXiv:1805.08281 [cs.GT]"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57990-6_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Dimitris Karakostas Aggelos Kiayias and Thomas Zacharias. 2022. Blockchain Nash Dynamics and the Pursuit of Compliance. arXiv:2201.00858 [cs.CR] Dimitris Karakostas Aggelos Kiayias and Thomas Zacharias. 2022. Blockchain Nash Dynamics and the Pursuit of Compliance. arXiv:2201.00858 [cs.CR]","DOI":"10.1145\/3558535.3559781"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25283-0_18"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_40_1","unstructured":"Aggelos Kiayias and Aikaterini-Panagiota Stouka. 2019. Coalition-Safe Equilibria with Virtual Payoffs. arXiv:2001.00047 [cs.GT] Aggelos Kiayias and Aikaterini-Panagiota Stouka. 2019. Coalition-Safe Equilibria with Virtual Payoffs. arXiv:2001.00047 [cs.GT]"},{"key":"e_1_3_2_1_41_1","volume-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19","author":"King Sunny","year":"2012","unstructured":"Sunny King and Scott Nadal . 2012 . Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19 (2012), 1. Sunny King and Scott Nadal. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19 (2012), 1."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313740"},{"key":"e_1_3_2_1_43_1","volume-title":"The Twelfth Workshop on the Economics of Information Security (WEIS","author":"Kroll Joshua A.","year":"2013","unstructured":"Joshua A. Kroll , Ian C. Davey , and Edward W. Felten . 2013. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries . In The Twelfth Workshop on the Economics of Information Security (WEIS 2013 ). Joshua A. Kroll, Ian C. Davey, and Edward W. Felten. 2013. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries. In The Twelfth Workshop on the Economics of Information Security (WEIS 2013)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813712"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 2015 international conference on autonomous agents and multiagent systems. Citeseer, 919--927","author":"Lewenberg Yoad","year":"2015","unstructured":"Yoad Lewenberg , Yoram Bachrach , Yonatan Sompolinsky , Aviv Zohar , and Jeffrey S Rosenschein . 2015 . Bitcoin mining pools: A cooperative game theoretic analysis . In Proceedings of the 2015 international conference on autonomous agents and multiagent systems. Citeseer, 919--927 . Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S Rosenschein. 2015. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 international conference on autonomous agents and multiagent systems. Citeseer, 919--927."},{"volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Li Wenting","key":"e_1_3_2_1_46_1","unstructured":"Wenting Li , S\u00e9bastien Andreina , Jens-Matthias Bohli , and Ghassan Karame . 2017. Securing proof-of-stake blockchain protocols . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 297--315. Wenting Li, S\u00e9bastien Andreina, Jens-Matthias Bohli, and Ghassan Karame. 2017. Securing proof-of-stake blockchain protocols. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 297--315."},{"key":"e_1_3_2_1_47_1","unstructured":"William Forster Lloyd. 1833. Two lectures on the checks to population. JH Parker. William Forster Lloyd. 1833. Two lectures on the checks to population. JH Parker."},{"key":"e_1_3_2_1_48_1","unstructured":"Katie Martin and Billy Nauman. 2021. Bitcoin's growing energy problem: 'It's a dirty currency'. https:\/\/www.ft.com\/content\/1aecb2db-8f61-427c-a413-3b929291c8ac. Katie Martin and Billy Nauman. 2021. Bitcoin's growing energy problem: 'It's a dirty currency'. https:\/\/www.ft.com\/content\/1aecb2db-8f61-427c-a413-3b929291c8ac."},{"key":"e_1_3_2_1_49_1","unstructured":"Julian Martinez. 2018. Understanding Proof of Stake: The Nothing at Stake Theory. https:\/\/medium.com\/coinmonks\/understanding-proof-of-stake-the-nothing-at-stake-theory-1f0d71bc027. Julian Martinez. 2018. Understanding Proof of Stake: The Nothing at Stake Theory. https:\/\/medium.com\/coinmonks\/understanding-proof-of-stake-the-nothing-at-stake-theory-1f0d71bc027."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1566374.1566376"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_14"},{"key":"e_1_3_2_1_52_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_53_1","volume-title":"Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. Cryptology ePrint Archive, Report 2015\/796. https:\/\/eprint.iacr.org\/2015\/796.","author":"Nayak Kartik","year":"2015","unstructured":"Kartik Nayak , Srijan Kumar , Andrew Miller , and Elaine Shi . 2015 . Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. Cryptology ePrint Archive, Report 2015\/796. https:\/\/eprint.iacr.org\/2015\/796. Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2015. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. Cryptology ePrint Archive, Report 2015\/796. https:\/\/eprint.iacr.org\/2015\/796."},{"key":"e_1_3_2_1_54_1","volume-title":"Part II. Lecture Notes in Computer Science","volume":"10821","author":"Nielsen Jesper Buus","year":"2018","unstructured":"Jesper Buus Nielsen and Vincent Rijmen ( Eds .). 2018 . Advances in Cryptology - EUROCRYPT 2018 , Part II. Lecture Notes in Computer Science , Vol. 10821 . Springer, Heidelberg, Germany, Tel Aviv, Israel. Jesper Buus Nielsen and Vincent Rijmen (Eds.). 2018. Advances in Cryptology - EUROCRYPT 2018, Part II. Lecture Notes in Computer Science, Vol. 10821. Springer, Heidelberg, Germany, Tel Aviv, Israel."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01737559"},{"key":"e_1_3_2_1_58_1","volume-title":"Optimal Selfish Mining Strategies in Bitcoin. In FC 2016: 20th International Conference on Financial Cryptography and Data Security (Lecture Notes in Computer Science","volume":"532","author":"Sapirshtein Ayelet","year":"2016","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2016 . Optimal Selfish Mining Strategies in Bitcoin. In FC 2016: 20th International Conference on Financial Cryptography and Data Security (Lecture Notes in Computer Science , Vol. 9603), Jens Grossklags and Bart Preneel (Eds.). Springer, Heidelberg, Germany, Christ Church, Barbados, 515-- 532 . Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal Selfish Mining Strategies in Bitcoin. In FC 2016: 20th International Conference on Financial Cryptography and Data Security (Lecture Notes in Computer Science, Vol. 9603), Jens Grossklags and Bart Preneel (Eds.). Springer, Heidelberg, Germany, Christ Church, Barbados, 515--532."},{"key":"e_1_3_2_1_59_1","unstructured":"Tezos. 2020. Proof-of-stake in Tezos. https:\/\/tezos.gitlab.io\/whitedoc\/proof_of_stake.html Tezos. 2020. Proof-of-stake in Tezos. https:\/\/tezos.gitlab.io\/whitedoc\/proof_of_stake.html"},{"key":"e_1_3_2_1_60_1","unstructured":"Gavin Wood. 2014. Ethereum yellow paper. Gavin Wood. 2014. Ethereum yellow paper."}],"event":{"name":"AFT '22: 4th ACM Conference on Advances in Financial Technologies","acronym":"AFT '22","location":"Cambridge MA USA"},"container-title":["Proceedings of the 4th ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558535.3559781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558535.3559781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:09Z","timestamp":1750178829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558535.3559781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":59,"alternative-id":["10.1145\/3558535.3559781","10.1145\/3558535"],"URL":"https:\/\/doi.org\/10.1145\/3558535.3559781","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2023-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}