{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:28:09Z","timestamp":1769556489461,"version":"3.49.0"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003968","name":"Iran National Science Foundation","doi-asserted-by":"crossref","award":["99022710"],"award-info":[{"award-number":["99022710"]}],"id":[{"id":"10.13039\/501100003968","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2024,5,31]]},"abstract":"<jats:p>Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantees to prevent double-spending, assuming that an attacker\u2019s computational power does not exceed 50% of the network power. In this article, we design a novel bribery attack and show that this guarantee can be hugely undermined. Miners are assumed to be rational in this setup, and they are given incentives that are dynamically calculated. In this attack, the adversary misuses the Bitcoin protocol to bribe miners and maximize their gained advantage. We will reformulate the bribery attack to propose a general mathematical foundation upon which we build multiple strategies. We show that, unlike Whale Attack, these strategies are practical, especially in the future when halvings lower the mining rewards. In the so-called \u201cguaranteed variable-rate bribing with commitment\u201d strategy, through optimization by Differential Evolution (DE), we show how double-spending is possible in the Bitcoin ecosystem for any transaction whose value is above 218.9BTC, and this comes with 100% success rate. A slight reduction in the success probability, e.g., by 10%, brings the threshold down to 165BTC. If the rationality assumption holds, then this shows how vulnerable blockchain-based systems like Bitcoin are. We suggest a soft fork on Bitcoin to fix this issue at the end.<\/jats:p>","DOI":"10.1145\/3641546","type":"journal-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T12:16:47Z","timestamp":1705580207000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions"],"prefix":"10.1145","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2441-9664","authenticated-orcid":false,"given":"Ghader","family":"Ebrahimpour","sequence":"first","affiliation":[{"name":"University of Tehran, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1042-837X","authenticated-orcid":false,"given":"Mohammad Sayad","family":"Haghighi","sequence":"additional","affiliation":[{"name":"University of Tehran, Tehran, Iran"}]}],"member":"320","published-online":{"date-parts":[[2024,3,14]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Tawseef Ahmed Teli Faheem Masoodi and Rameez Yousuf. 2021. Security concerns and privacy preservation in blockchain based IoT systems: opportunities and challenges (January 18 2021). ICICNIS 2020 Available at SSRN: https:\/\/ssrn.com\/abstract=3768235"},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/j.ins.2022.05.051","article-title":"ESM: Selfish mining under ecological footprint","volume":"606","author":"Ai Shan","year":"2022","unstructured":"Shan Ai, Guoyu Yang, Chang Chen, Kanghua Mo, Wangyong Lv, and Arthur Sandor Voundi Koe. 2022. ESM: Selfish mining under ecological footprint. Inf. Sci. 606 (2022), 601\u2013613.","journal-title":"Inf. Sci."},{"key":"e_1_3_2_4_2","article-title":"Clockwork finance: Automated analysis of economic security in smart contracts","author":"Babel Kushal","year":"2021","unstructured":"Kushal Babel, Philip Daian, Mahimna Kelkar, and Ari Juels. 2021. Clockwork finance: Automated analysis of economic security in smart contracts. arXiv preprint arXiv:2109.04347 (2021).","journal-title":"arXiv preprint arXiv:2109.04347"},{"key":"e_1_3_2_5_2","volume-title":"Preventing the 51%-Attack: A Stochastic Analysis of Two Phase Proof of Work in Bitcoin","author":"Bastiaan Martijn","year":"2015","unstructured":"Martijn Bastiaan. 2015. Preventing the 51%-Attack: A Stochastic Analysis of Two Phase Proof of Work in Bitcoin. Retrieved from http:\/\/referaat.cs.utwente.nl\/conference\/22\/paper\/7473\/preventingthe-51-attack-a-sstochasticanalysis-oftwo-phase-proof-of-work-in-bitcoin.pdf"},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-662-53357-4_2","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Bonneau Joseph","year":"2016","unstructured":"Joseph Bonneau. 2016. Why buy when you can rent? In International Conference on Financial Cryptography and Data Security. 19\u201326."},{"key":"e_1_3_2_7_2","volume-title":"IEEE International Conference on Blockchain","author":"Bui Van Cuong","year":"2021","unstructured":"Van Cuong Bui, Sheng Wen, Jiangshan Yu, Xin Xia, Mohammad Sayad Haghighi, and Yang Xiang. 2021. Evaluating upgradable smart contract. In IEEE International Conference on Blockchain."},{"key":"e_1_3_2_8_2","first-page":"154","volume-title":"ACM SIGSAC Conference on Computer and Communications Security","author":"Carlsten Miles","year":"2016","unstructured":"Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, and Arvind Narayanan. 2016. On the instability of Bitcoin without the block reward. In ACM SIGSAC Conference on Computer and Communications Security. 154\u2013167."},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-030-21568-2_12","volume-title":"International Conference on Applied Cryptography and Network Security","author":"Chang Sang-Yoon","year":"2019","unstructured":"Sang-Yoon Chang, Younghee Park, Simeon Wuthier, and Chang-Wu Chen. 2019. Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners. In International Conference on Applied Cryptography and Network Security. 241\u2013258."},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"Chaum David","year":"1983","unstructured":"David Chaum. 1983. Blind signatures for untraceable payments. In Advances in Cryptology. Springer, 199\u2013203."},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"International Workshop on Peer-to-Peer Systems","author":"Douceur John R.","year":"2002","unstructured":"John R. Douceur. 2002. The Sybil attack. In International Workshop on Peer-to-Peer Systems. 251\u2013260."},{"issue":"11","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"8307","DOI":"10.1109\/TII.2022.3142036","article-title":"Can blockchain be trusted in industry 4.0? Study of a novel misleading attack on Bitcoin","volume":"18","author":"Ebrahimpour Ghader","year":"2022","unstructured":"Ghader Ebrahimpour, Mohammad Sayad Haghighi, and Mamoun Alazab. 2022. Can blockchain be trusted in industry 4.0? Study of a novel misleading attack on Bitcoin. IEEE Trans. Industr. Inform. 18, 11 (2022), 8307\u20138315.","journal-title":"IEEE Trans. Industr. Inform."},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/978-3-030-43725-1_13","volume-title":"International Workshops on Financial Cryptography and Data Security (FC\u201919)","author":"Eskandari Shayan","year":"2020","unstructured":"Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2020. SoK: Transparent dishonesty: Front-running attacks on blockchain. In International Workshops on Financial Cryptography and Data Security (FC\u201919). Springer, 170\u2013189."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Eyal Ittay","year":"2014","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In International Conference on Financial Cryptography and Data Security. 436\u2013454."},{"key":"e_1_3_2_15_2","first-page":"833","volume-title":"ACM SIGSAC Conference on Computer and Communications Security","author":"Gao Shang","year":"2019","unstructured":"Shang Gao, Zecheng Li, Zhe Peng, and Bin Xiao. 2019. Power adjusting and bribery racing: Novel mining attacks in the Bitcoin system. In ACM SIGSAC Conference on Computer and Communications Security. 833\u2013850."},{"key":"e_1_3_2_16_2","volume-title":"Introduction to Probability","author":"Grinstead Charles Miller","year":"2012","unstructured":"Charles Miller Grinstead and James Laurie Snell. 2012. Introduction to Probability. American Mathematical Society."},{"key":"e_1_3_2_17_2","first-page":"437","volume-title":"Conference on the Theory and Application of Cryptography","author":"Haber Stuart","year":"1990","unstructured":"Stuart Haber and W. Scott Stornetta. 1990. How to time-stamp a digital document. In Conference on the Theory and Application of Cryptography. 437\u2013455."},{"key":"e_1_3_2_18_2","volume-title":"Trends in Telecommunications Technologies","author":"Haghighi Mohammad Sayad","year":"2010","unstructured":"Mohammad Sayad Haghighi and Kamal Mohamedpour. 2010. Neighbor discovery: Security challenges in wireless ad hoc and sensor networks. In Trends in Telecommunications Technologies. Intech."},{"key":"e_1_3_2_19_2","first-page":"129","volume-title":"24th USENIX Security Symposium","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on Bitcoin\u2019s peer-to-peer network. In 24th USENIX Security Symposium. 129\u2013144."},{"key":"e_1_3_2_20_2","volume-title":"26th International Computer Conference, Computer Society of Iran","author":"Jahanbin Ahmad","year":"2021","unstructured":"Ahmad Jahanbin and Mohammad Sayad Haghighi. 2021. On the possibility of creating smart contracts on Bitcoin by MPC-based approaches. In 26th International Computer Conference, Computer Society of Iran."},{"key":"e_1_3_2_21_2","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-662-44774-1_6","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Johnson Benjamin","year":"2014","unstructured":"Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. 2014. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In International Conference on Financial Cryptography and Data Security. 72\u201386."},{"key":"e_1_3_2_22_2","volume-title":"Pay-to-win: Incentive Attacks on Proof-of-work Cryptocurrencies","author":"Judmayer Aljosha","year":"2019","unstructured":"Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, and Edgar R. Weippl. 2019. Pay-to-win: Incentive Attacks on Proof-of-work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019 (2019), 775. https:\/\/eprint.iacr.org\/2019\/775"},{"key":"e_1_3_2_23_2","first-page":"906","volume-title":"ACM Conference on Computer and Communications Security","author":"Karame Ghassan O.","year":"2012","unstructured":"Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending fast payments in Bitcoin. In ACM Conference on Computer and Communications Security. 906\u2013917."},{"issue":"1","key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2732196","article-title":"Misbehavior in Bitcoin: A study of double-spending and accountability","volume":"18","author":"Karame Ghassan O.","year":"2015","unstructured":"Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and Srdjan \u010capkun. 2015. Misbehavior in Bitcoin: A study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18, 1 (2015), 1\u201332.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"e_1_3_2_25_2","first-page":"555","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Krombholz Katharina","year":"2016","unstructured":"Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, and Edgar Weippl. 2016. The other side of the coin: User experiences with Bitcoin security and privacy. In International Conference on Financial Cryptography and Data Security. 555\u2013580."},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/978-3-319-70278-0_17","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Liao Kevin","year":"2017","unstructured":"Kevin Liao and Jonathan Katz. 2017. Incentivizing blockchain forks via whale transactions. In International Conference on Financial Cryptography and Data Security. 264\u2013279."},{"key":"e_1_3_2_27_2","first-page":"3","volume-title":"International Conference on Financial Cryptography and Data Security","author":"McCorry Patrick","year":"2018","unstructured":"Patrick McCorry, Alexander Hicks, and Sarah Meiklejohn. 2018. Smart contracts for bribing miners. In International Conference on Financial Cryptography and Data Security. 3\u201318."},{"key":"e_1_3_2_28_2","volume-title":"Secrecy, Authentication, and Public Key Systems.","author":"Merkle Ralph Charles","year":"1979","unstructured":"Ralph Charles Merkle. 1979. Secrecy, Authentication, and Public Key Systems.Stanford University."},{"key":"e_1_3_2_29_2","article-title":"Feather-forks: Enforcing a blacklist with sub-50% hash power","author":"Miller Andrew","year":"2013","unstructured":"Andrew Miller. 2013. Feather-forks: Enforcing a blacklist with sub-50% hash power. Retrieved from: https:\/\/bitcointalk.org\/index.php","journal-title":"Retrieved from"},{"key":"e_1_3_2_30_2","article-title":"Formal modelling and security analysis of Bitcoin\u2019s payment protocol","volume":"107","author":"Modesti Paolo","year":"2021","unstructured":"Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, and Feng Hao. 2021. Formal modelling and security analysis of Bitcoin\u2019s payment protocol. Comput. Secur. 107 (2021), 102279.","journal-title":"Comput. Secur."},{"key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-662-64322-8_3","volume-title":": 25th International Conference on Financial Cryptography and Data Security (FC\u201921)","author":"Nadahalli Tejaswi","year":"2021","unstructured":"Tejaswi Nadahalli, Majid Khabbazian, and Roger Wattenhofer. 2021. Timelocked bribing. In : 25th International Conference on Financial Cryptography and Data Security (FC\u201921). Springer, 53\u201372."},{"key":"e_1_3_2_32_2","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2019","unstructured":"Satoshi Nakamoto. 2019. Bitcoin: A Peer-to-Peer Electronic Cash System. Technical Report."},{"key":"e_1_3_2_33_2","unstructured":"Arvind Narayanan Joseph Bonneau Edward Felten Andrew Miller and Steven Goldfeder. 2016. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press."},{"key":"e_1_3_2_34_2","first-page":"305","volume-title":"European Symposium on Security and Privacy","author":"Nayak Kartik","year":"2016","unstructured":"Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In European Symposium on Security and Privacy. 305\u2013320."},{"key":"e_1_3_2_35_2","first-page":"1118","volume-title":"Science and Information Conference","author":"Nojoumian Mehrdad","year":"2018","unstructured":"Mehrdad Nojoumian, Arash Golchubian, Laurent Njilla, Kevin Kwiat, and Charles Kamhoua. 2018. Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm. In Science and Information Conference. Springer, 1118\u20131134."},{"key":"e_1_3_2_36_2","article-title":"A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives","volume":"113","author":"Quamara Sidharth","year":"2022","unstructured":"Sidharth Quamara and Awadhesh Kumar Singh. 2022. A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives. Comput. Secur. 113 (2022), 102548.","journal-title":"Comput. Secur."},{"key":"e_1_3_2_37_2","article-title":"Analysis of Bitcoin pooled mining reward systems","author":"Rosenfeld Meni","year":"2011","unstructured":"Meni Rosenfeld. 2011. Analysis of Bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011).","journal-title":"arXiv preprint arXiv:1112.4980"},{"key":"e_1_3_2_38_2","article-title":"Analysis of hashrate-based double spending","author":"Rosenfeld Meni","year":"2014","unstructured":"Meni Rosenfeld. 2014. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009 (2014).","journal-title":"arXiv preprint arXiv:1402.2009"},{"key":"e_1_3_2_39_2","article-title":"Bitcoin\u2019s security model revisited","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2016. Bitcoin\u2019s security model revisited. arXiv preprint arXiv:1605.09193 (2016).","journal-title":"arXiv preprint arXiv:1605.09193"},{"issue":"4","key":"e_1_3_2_40_2","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","article-title":"Differential evolution\u2014A simple and efficient heuristic for global optimization over continuous spaces","volume":"11","author":"Storn Rainer","year":"1997","unstructured":"Rainer Storn and Kenneth Price. 1997. Differential evolution\u2014A simple and efficient heuristic for global optimization over continuous spaces. J. Global Optimiz. 11, 4 (1997), 341\u2013359.","journal-title":"J. Global Optimiz."},{"key":"e_1_3_2_41_2","first-page":"569","volume-title":"European Symposium on Research in Computer Security","author":"Sun Hanyi","year":"2020","unstructured":"Hanyi Sun, Na Ruan, and Chunhua Su. 2020. How to model the bribery attack: A practical quantification method in blockchain. In European Symposium on Research in Computer Security. 569\u2013589."},{"key":"e_1_3_2_42_2","article-title":"Bribes to miners: Evidence from Ethereum","author":"Sun Xiaotong","year":"2022","unstructured":"Xiaotong Sun. 2022. Bribes to miners: Evidence from Ethereum. arXiv preprint arXiv:2203.14601 (2022).","journal-title":"arXiv preprint arXiv:2203.14601"},{"key":"e_1_3_2_43_2","first-page":"324","volume-title":"Annual International Cryptology Conference","author":"Ohta T. Okamoto and K.","year":"1991","unstructured":"T. Okamoto and K. Ohta. 1991. Universal electronic cash. In Annual International Cryptology Conference. 324\u2013337."},{"key":"e_1_3_2_44_2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-030-24299-2_11","volume-title":"Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection: International Workshops of PAAMS 2019, \u00c1vila, Spain, June 26\u201328, 2019, Proceedings","author":"Tran Quang","year":"2019","unstructured":"Quang Tran, Lin Chen, Lei Xu, Yang Lu, and Weidong Shi. 2019. Cross chain bribery contracts: Majority vs mighty minority. In Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection: International Workshops of PAAMS 2019, \u00c1vila, Spain, June 26\u201328, 2019, Proceedings. Springer, 121\u2013133."},{"key":"e_1_3_2_45_2","first-page":"347","volume-title":"International Conference on Cryptology in India","author":"Trolin M\u00e5rten","year":"2005","unstructured":"M\u00e5rten Trolin. 2005. A universally composable scheme for electronic cash. In International Conference on Cryptology in India. 347\u2013360."},{"key":"e_1_3_2_46_2","volume-title":"National Conference cum Workshop on Bioinformatics and Computational Biology","author":"Vyas Chinmay A.","year":"2014","unstructured":"Chinmay A. Vyas and Munindra Lunagaria. 2014. Security concerns and issues for Bitcoin. In National Conference cum Workshop on Bioinformatics and Computational Biology."},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2022.04.008","article-title":"BSM-ether: Bribery selfish mining in blockchain-based healthcare systems","volume":"601","author":"Wang Yilei","year":"2022","unstructured":"Yilei Wang, Zhaojie Wang, Minghao Zhao, Xueyang Han, Huiyu Zhou, Xiaoying Wang, and Arthur Sandor Voundi Koe. 2022. BSM-ether: Bribery selfish mining in blockchain-based healthcare systems. Inf. Sci. 601 (2022), 1\u201317.","journal-title":"Inf. Sci."},{"key":"e_1_3_2_48_2","first-page":"1","volume-title":"Data Mining and Big Data: 6th International Conference, DMBD 2021, Guangzhou, China, October 20\u201322, 2021, Proceedings, Part I","author":"Wang Zhaojie","year":"2021","unstructured":"Zhaojie Wang, Jianan Guo, Yiting Zhang, Ming Liu, Liang Yan, Yilei Wang, Hailun Liu, and Yunhe Li. 2021. BSMRL: Bribery selfish mining with reinforcement learning. In Data Mining and Big Data: 6th International Conference, DMBD 2021, Guangzhou, China, October 20\u201322, 2021, Proceedings, Part I. Springer, 1\u201310."},{"key":"e_1_3_2_49_2","first-page":"357","volume-title":"IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919)","author":"Winzer Fredrik","year":"2019","unstructured":"Fredrik Winzer, Benjamin Herd, and Sebastian Faust. 2019. Temporary censorship attacks in the presence of rational miners. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919). IEEE, 357\u2013366."},{"issue":"11","key":"e_1_3_2_50_2","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1002\/int.22270","article-title":"IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers","volume":"35","author":"Yang Guoyu","year":"2020","unstructured":"Guoyu Yang, Yilei Wang, Zhaojie Wang, Youliang Tian, Xiaomei Yu, and Shouzhe Li. 2020. IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers. Int. J. Intell. Syst. 35, 11 (2020), 1735\u20131748.","journal-title":"Int. J. Intell. Syst."},{"key":"e_1_3_2_51_2","first-page":"67","volume-title":"19th ACM International Conference on Computing Frontiers","author":"Yang Runkai","year":"2022","unstructured":"Runkai Yang, Xiaolin Chang, Jelena Mi\u0161i\u0107, Vojislav Mi\u0161i\u0107, and Haoran Zhu. 2022. Evaluating fork after withholding (FAW) attack in Bitcoin. In 19th ACM International Conference on Computing Frontiers. 67\u201374."},{"issue":"10","key":"e_1_3_2_52_2","doi-asserted-by":"crossref","first-page":"5715","DOI":"10.1109\/TII.2019.2921566","article-title":"Double-spending with a Sybil attack in the Bitcoin decentralized network","volume":"15","author":"Zhang Shijie","year":"2019","unstructured":"Shijie Zhang and Jong-Hyouk Lee. 2019. Double-spending with a Sybil attack in the Bitcoin decentralized network. IEEE Trans. Industr. Inform. 15, 10 (2019), 5715\u20135722.","journal-title":"IEEE Trans. Industr. Inform."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:16Z","timestamp":1750287016000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,5,31]]}},"alternative-id":["10.1145\/3641546"],"URL":"https:\/\/doi.org\/10.1145\/3641546","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,14]]},"assertion":[{"value":"2022-07-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}