{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:30:01Z","timestamp":1766449801426,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["1942497"],"award-info":[{"award-number":["1942497"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ripple UBRI"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,8]]},"DOI":"10.1145\/3670865.3673602","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T20:13:33Z","timestamp":1734466413000},"page":"676-702","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Computing Optimal Manipulations in Cryptographic Self-Selection Proof-of-Stake Protocols"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7695-026X","authenticated-orcid":false,"given":"Matheus V. X.","family":"Ferreira","sequence":"first","affiliation":[{"name":"Computer Science, University of Virginia, Charlottesville, Virginia, USA"},{"name":"Computer Science, Harvard University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3567-8178","authenticated-orcid":false,"given":"Aadityan","family":"Ganesh","sequence":"additional","affiliation":[{"name":"Computer Science, Princeton University, Princeton, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3841-8552","authenticated-orcid":false,"given":"Jack","family":"Hourigan","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6237-3685","authenticated-orcid":false,"given":"Hannah","family":"Huh","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7744-795X","authenticated-orcid":false,"given":"S. Matthew","family":"Weinberg","sequence":"additional","affiliation":[{"name":"Computer Science, Princeton University, Princeton, New Jersey, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4605-2964","authenticated-orcid":false,"given":"Catherine","family":"Yu","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, New Jersey, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2309.06847"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329567"},{"volume-title":"submission to the 25th ACM Conference on Economics and Computation.","author":"Cai Linda","key":"e_1_3_2_1_4_1","unstructured":"Linda Cai, Jingyi Liu, S Matthew Weinberg, and Chenghan Zhao. 2024. Profitable Manipulations of Cryptographic Self-Sortition are Statistically Detectable. In In submission to the 25th ACM Conference on Economics and Computation."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.TCS.2019.02.001"},{"key":"e_1_3_2_1_7_1","first-page":"919","article-title":"Snow White: Provably Secure Proofs of Stake","volume":"2016","author":"Daian Phil","year":"2016","unstructured":"Phil Daian, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably Secure Proofs of Stake. IACR Cryptology ePrint Archive 2016 (2016), 919. http:\/\/eprint.iacr.org\/2016\/919","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","volume-title":"Asymptotic minimax character of the sample distribution function and of the classical multinomial estimator. The Annals of Mathematical Statistics","author":"Dvoretzky Aryeh","year":"1956","unstructured":"Aryeh Dvoretzky, Jack Kiefer, and Jacob Wolfowitz. 1956. Asymptotic minimax character of the sample distribution function and of the classical multinomial estimator. The Annals of Mathematical Statistics (1956), 642--669."},{"volume-title":"Financial Cryptography and Data Security","author":"Eyal Ittay","key":"e_1_3_2_1_9_1","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security. Springer, 436--454."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538337"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465456.3467636"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313692"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329630"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329566"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_18_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243737"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616674"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538250"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423264"}],"event":{"name":"EC '24: 25th ACM Conference on Economics and Computation","sponsor":["SIGecom Special Interest Group on Economics and Computation"],"location":"New Haven CT USA","acronym":"EC '24"},"container-title":["Proceedings of the 25th ACM Conference on Economics and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670865.3673602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670865.3673602","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670865.3673602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:01Z","timestamp":1750295401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670865.3673602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,8]]},"references-count":23,"alternative-id":["10.1145\/3670865.3673602","10.1145\/3670865"],"URL":"https:\/\/doi.org\/10.1145\/3670865.3673602","relation":{},"subject":[],"published":{"date-parts":[[2024,7,8]]},"assertion":[{"value":"2024-12-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}