Proceedings of the 2019 ACM Conference on Economics and Computation 2019
DOI: 10.1145/3328526.3329566
|View full text |Cite
|
Sign up to set email alerts
|

Mind the Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(27 citation statements)
references
References 11 publications
1
26
0
Order By: Relevance
“…A wide range of work has also focused on potential mining attacks besides selfish mining. One example is difficulty attacks [23], [47], in which miners can profitably manipulate a chain's difficulty by secretly raising difficulty on their own private chain [4], switching between competing currencies secured by the same mining hardware [47], or pausing mining activities around difficulty adjustment time [23]. This can discourage mining altogether [30].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A wide range of work has also focused on potential mining attacks besides selfish mining. One example is difficulty attacks [23], [47], in which miners can profitably manipulate a chain's difficulty by secretly raising difficulty on their own private chain [4], switching between competing currencies secured by the same mining hardware [47], or pausing mining activities around difficulty adjustment time [23]. This can discourage mining altogether [30].…”
Section: Related Workmentioning
confidence: 99%
“…In what follows, we let S a and S o denote the number of stale blocks mined by the adversary of interest and all the other miners in a single epoch, respectively; a stale block is a block that does not end up on the main chain, and hence does not collect any block reward. Note that the following result relies on the deterministic analysis of [23], which abstracts away the stochastics of the problem.…”
Section: Appendixmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a vast literature investigating game theoretical aspects of blockchain systems (Kiayias et al, 2016;Huberman et al, 2017;Abdellatif and Abdelmouttalib, 2018;Ma et al, 2018;Papadis et al, 2018;Spiegelman et al, 2018;Azouvi and Hicks, 2019;Goren and Spiegelman, 2019;Liu et al, 2019a,b;Wang et al, 2019). Nonetheless, the literature on congestion games applied to such systems is scarce.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, in contrast, we focus on the competition between miners. Spiegelman et al (2018) adopted the framework of congestion games to model competition between miners of multiples cryptocurrencies who try to maximize utilities by choosing which puzzle (cryptocurrency) to mine (the work was then extended at Goren and Spiegelman, 2019). The authors prove that there is no standard potential function for the game they propose, but that an ordinal potential always exists, implying that best response converges to a pure Nash equilibrium.…”
Section: Related Workmentioning
confidence: 99%