
- Previous Article
- MFC Home
- This Issue
-
Next Article
Constant competitive algorithms for unbounded one-Way trading under monotone hazard rate
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining
1. | Department of Computer Science, Georgia State University, Atlanta, GA, USA |
2. | Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China |
3. | School of Big Data & Software Engineering, Chongqing University, Chongqing, China |
The past three years have seen the rapid increase of Bitcoin difficulty, which has led to a substantial variance in solo mining. As a result, miners tend to join a large open pool to get a more stable reward. Nowadays, mining pools take up over 98% of Bitcoins total computation power. In a sense, this is a manifestation of Bitcoin that tends to be centralized. Thus, researchers have shown an increased interest in pool mining payoff and security. The purpose of this paper is to review and summarize recent research in Bitcoin pool mining system. We first introduce several common reward distribution schemes, and analyze their advantages and disadvantages with some improvement mechanisms; In the second section, to address pool security problems, we examined the practical utility of some existing and potential attack strategies. To study those malicious attack in details, several defense methods are collected. Finally, we make an outlook on Bitcoin future.
References:
[1] |
S. Bag, S. Ruj and K. Sakurai,
Bitcoin block withholding attack: Analysis and mitigation, IEEE Trans. Information Forensics and Security, 12 (2017), 1967-1978.
doi: 10.1109/TIFS.2016.2623588. |
[2] |
L. Bahack, Theoretical bitcoin attacks with less than half of the computational power (draft), CoRR, vol. abs/1312.7013, 2013. [Online]. Available: arXiv: 1312.7013 Google Scholar |
[3] |
T. Bamert, C. Decker, L. Elsen, R. Wattenhofer and S. Welten, Have a snack, pay with bitcoins, IEEE P2P 2013, Proceedings, 2013, 1–5.
doi: 10.1109/P2P.2013.6688717. |
[4] |
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll and E. W. Felten, Sok: Research perspectives and challenges for bitcoin and cryptocurrencies, in 2015 IEEE Symposium on Security and Privacy, 2015, 104–121.
doi: 10.1109/SP.2015.14. |
[5] |
Z. Cai, Z. He, X. Guan and Y. Li,
Collective data-sanitization for preventing sensitive information inference attacks in social networks, IEEE Transactions on Dependable and Secure Computing, 15 (2018), 577-590.
doi: 10.1109/TDSC.2016.2613521. |
[6] |
Z. Cai and X. Zheng, A private and efficient mechanism for data uploading in smart cyber-physical systems, IEEE Transactions on Network Science and Engineering (Early Access), 2018, 1–1.
doi: 10.1109/TNSE.2018.2830307. |
[7] |
M. Carlsten, H. Kalodner, S. M. Weinberg and A. Narayanan, On the instability of bitcoin without the block reward, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, 154–167.
doi: 10.1145/2976749.2978408. |
[8] |
N. T. Courtois and L. Bahack, On subversive miner strategies and block withholding attack in bitcoin digital currency, CoRR, vol. abs/1402.1718, 2014. [Online]. Available: arXiv: 1402.1718 Google Scholar |
[9] |
N. T. Courtois, M. Grajek and R. Naik, Optimizing sha256 in bitcoin mining, in Cryptography and Security Systems - Third International Conference, CSS 2014, Proceedings, 2014, 131–144.
doi: 10.1007/978-3-662-44893-9_12. |
[10] |
C. Decker and R. Wattenhofer, Information propagation in the bitcoin network, in IEEEP2P 2013, Proceedings, 2013, 1–10.
doi: 10.1109/P2P.2013.6688704. |
[11] |
I. Eyal, The miner's dilemma, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, 2015, 89–103.
doi: 10.1109/SP.2015.13. |
[12] |
I. Eyal and E. G. Sirer,
Majority is not enough: Bitcoin mining is vulnerable, Communications of the ACM CACM Homepage Archive, 61 (2018), 95-102.
doi: 10.1145/3212998. |
[13] |
B. A. Fisch, R. Pass and A. Shelat, Socially optimal mining pools, in International Conference on Web and Internet Economics, 2017, 205–218. Google Scholar |
[14] |
J. Garay, A. Kiayias and N. Leonardos, The bitcoin backbone protocol: Analysis and applications, in Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ⅱ, 9057 (2015), 281–310.
doi: 10.1007/978-3-662-46803-6_10. |
[15] |
Z. He, Z. Cai, J. Yu, X. Wang, Y. Sun and Y. Li,
Cost-efficient strategies for restraining rumor spreading in mobile social networks, IEEE Transactions on Vehicular Technology, 66 (2017), 2789-2800.
doi: 10.1109/TVT.2016.2585591. |
[16] |
Z. He, Z. Cai and X. Wang, Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks, in IEEE ICDCS, 2015, 205–214.
doi: 10.1109/ICDCS.2015.29. |
[17] |
Z. He, Z. Cai and J. Yu,
Latent-data privacy preserving with customized data utility for social network data, IEEE Transactions on Vehicular Technology, 67 (2018), 665-673.
doi: 10.1109/TVT.2017.2738018. |
[18] |
E. Heilman, One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers, 2014, 161–162.
doi: 10.1007/978-3-662-44774-1_12. |
[19] |
C. Hu, W. Li, X. Cheng, J. Yu, S. Wang and R. Bie,
A secure and verifiable access control scheme for big data storage in clouds, IEEE Transactions on Big Data (Early Access), 4 (2018), 341-355.
doi: 10.1109/TBDATA.2016.2621106. |
[20] |
Q. Hu, S. Wang, C. Hu, J. Huang, W. Li and X. Cheng,
Messages in a concealed bottle: Achieving query content privacy with accurate location-based services, to appear in IEEE Transactions on Vehicular Technology, 67 (2018), 7698-7711.
doi: 10.1109/TVT.2018.2838041. |
[21] |
G. O. Karame, E. Androulaki and S. Capkun, Double-spending fast payments in bitcoin, in the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012, 2012, 906–917.
doi: 10.1145/2382196.2382292. |
[22] |
A. Kothapalli, A. Miller and N. Borisov, Smartcast: An incentive compatible consensus protocol using smart contracts, in International Conference on Financial Cryptography and Data Security, 2017, 536–552. Google Scholar |
[23] |
J. A. Kroll, I. C. Davey and E. W. Felten, The economics of bitcoin mining, or bitcoin in the presence of adversaries, in Proceedings of WEIS, 2013 (2013), p. 11. Google Scholar |
[24] |
W. Li, M. Larson, C. Hu, R. Li, X. Cheng and R. Bie,
Secure multi-unit sealed first-price auction mechanisms, Security and Communication Netowrks SI on Cyber Security, Crime, and Forensices of Wireless Networks and Applications, 9 (2016), 3833-3843.
doi: 10.1002/sec.1522. |
[25] |
Y. Liang, Z. Cai, J. Yu, Q. Han and Y. Li,
Deep learning based inference of private information using embedded sensors in smart devices, IEEE Network Magazine, 32 (2018), 8-14.
doi: 10.1109/MNET.2018.1700349. |
[26] |
Y. Liang, Z. Cai, Q. Han and Y. Li, Location privacy leakage through sensory data, Security and Communication Networks, 2017 (2017), Article ID 7576307, 12 pages.
doi: 10.1155/2017/7576307. |
[27] |
L. Luu, R. Saha, I. Parameshwaran, P. Saxena and A. Hobor, On power splitting games in distributed computation: The case of bitcoin pooled mining, in IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, 2015, 397–411.
doi: 10.1109/CSF.2015.34. |
[28] |
L. Luu, Y. Velner, J. Teutsch and P. Saxena, Smart pool: Practical decentralized pooled mining, in 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017., 2017, 1409–1426. [Online]. Available: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/luu Google Scholar |
[29] |
R. Meni, A short note about variance and pool payouts, [Online], 2011, Available: https://bitcointalk.org/index.php?topic=5264.0 Google Scholar |
[30] |
C. Mooney and S. Mufson, Why the bitcoin craze is using up so much energy, 2018, [Online]. Available: https://www.washingtonpost.com/news/energy-environment/wp/2017/12/19/why-the-bitcoin-craze-is-using-up-so-much-energy/?utm_term=.2ec154762efa Google Scholar |
[31] |
S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, [Online], 2009, Available: http://www.bitcoin.org/bitcoin.pdf Google Scholar |
[32] |
K. Nayak, S. Kumar, A. Miller and E. Shi, Stubborn mining: Generalizing selfish mining and combining with an eclipse attack, in IEEE European Symposium on Security and Privacy, EuroS & P 2016, Saarbrücken, Germany, March 21-24, 2016, 2016, 305–320.
doi: 10.1109/EuroSP.2016.32. |
[33] |
M. Rosenfeld, Analysis of bitcoin pooled mining reward systems, CoRR, vol. abs/1112.4980, 2011. [Online]. Available: arXiv: 1112.4980 Google Scholar |
[34] |
M. Rosenfeld, Mining pools reward methods, presentation at bitcoin 2013 conference, [Online]. Available: http://www.youtube.com/watch?v=5sgdD4mGPfg Google Scholar |
[35] |
M. Rosenfeld, Double geometric method: Hopping-proof, low-variance reward system, [Online], Available: https://bitcointalk.org/index.php?topic=39497.0 Google Scholar |
[36] |
A. Sapirshtein, Y. Sompolinsky and A. Zohar, Optimal selfish mining strategies in bitcoin, in Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, 9603 (2017), 515–532.
doi: 10.1007/978-3-662-54970-4\_30. |
[37] |
O. Schrijvers, J. Bonneau, D. Boneh and T. Roughgarden, Incentive compatibility of bitcoin mining pool reward functions, in Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, 9603 (2017), 477–498.
doi: 10.1007/978-3-662-54970-4\_28. |
[38] |
B. L. Shultz and D. Bayer, Certification of witness: Mitigating blockchain fork attacks, Undergraduate Thesis in Mathematics, Columbia University in the City of New York, 2015. Google Scholar |
[39] |
S. Solat and M. Potop-Butucaru, Brief announcement: Zeroblock: Timestamp-free prevention of block-withholding attack in bitcoin, in Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Boston, MA, USA, November 5-8, 2017, Proceedings, 2017, 356–360.
doi: 10.1007/978-3-319-69084-1_25. |
[40] |
E. Swanson, Bitcoin mining calculator, 2013, [Online], Available: https://alloscomp.com/bitcoin/calculator/ Google Scholar |
[41] |
D. K. Tosh, S. Shetty, X. Liang, C. A. Kamhoua, K. A. Kwiat and L. Njilla, Security implications of blockchain cloud with analysis of block withholding attack, in 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID, 2017, 458–467.
doi: 10.1109/CCGRID.2017.111. |
[42] |
Y. Velner, J. Teutsch and L. Luu, Smart contracts make bitcoin mining pools vulnerable, in Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers, 2017, 298–316.
doi: 10.1007/978-3-319-70278-0_19. |
[43] |
J. Wang, Z. Cai, Y. Li, D. Yang, J. Li and H. Gao, Protecting query privacy with differentially private k-anonymity in location-based services, Personal and Ubiquitous Computing, 2018, 1–17. Google Scholar |
[44] |
G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 151 (2014), 1-32. Google Scholar |
[45] |
R. Zhang and B. Preneel, Publish or perish: A backward-compatible defense against selfish mining in bitcoin, in Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings, 10159 (2017), 277–292.
doi: 10.1007/978-3-319-52153-4\_16. |
[46] |
X. Zheng, Z. Cai, J. Yu, C. Wang and Y. Li,
Follow but no track: Privacy preserved profile publishing in cyber-physical social systems, IEEE Internet of Things Journal, 4 (2017), 1868-1878.
doi: 10.1109/JIOT.2017.2679483. |
[47] |
X. Zheng, Z. Cai and Y. Li, Data linkage in smart iot systems: A consideration from privacy perspective, to appear in IEEE Communications Magazine, 2018. Google Scholar |
[48] |
X. Zheng, Z. Cai, J. Li and H. Gao, Location-privacy-aware review publication mechanism for local business service systems, in IEEE INFOCOM, Atlanta, USA, 2017, 1–9.
doi: 10.1109/INFOCOM.2017.8056976. |
[49] |
X. Zheng, G. Luo and Z. Cai, A fair mechanism for private data publication in online social networks, IEEE Transactions on Network Science and Engineering (Early Access), 2018, 1–1.
doi: 10.1109/TNSE.2018.2801798. |
[50] |
Y. Zolotavkin, J. García and C. Rudolph, Incentive compatibility of pay per last N shares in bitcoin mining pools, in Decision and Game Theory for Security - 8th International Conference, GameSec, 2017, 21–39.
doi: 10.1007/978-3-319-68711-7_2. |
[51] |
Blockchain info: Detailed information and charts on all bitcoin transactions and blocks, [Online], Available: https://blockchain.info/ Google Scholar |
[52] |
Bitcoin block reward halving countdown, [Online], Available: https://www.bitcoinblockhalf.com/ Google Scholar |
[53] |
Comparison of mining pools, [Online], Available: https://en.bitcoin.it/wiki/Comparison of mining pools Google Scholar |
[54] |
The cryptocurrency for payments based on blockchain technology, [Online], Available: https://litecoin.org/ Google Scholar |
[55] |
How to destroy bitcoin with 51, [Online], Available: https://medium.com/@homakov/how-to-destroy-bitcoin-with-51-pocked-guide-for-governments-83d9bdf2ef6b Google Scholar |
[56] |
Pps vs pplns – mining pool payment reward structure explained, [Online], 2018, Available: https://coinguides.org/pps-vs-pplns/ Google Scholar |
[57] |
Slush pool reward system, [Online], Available: https://slushpool.com/help/manual/rewards Google Scholar |
show all references
References:
[1] |
S. Bag, S. Ruj and K. Sakurai,
Bitcoin block withholding attack: Analysis and mitigation, IEEE Trans. Information Forensics and Security, 12 (2017), 1967-1978.
doi: 10.1109/TIFS.2016.2623588. |
[2] |
L. Bahack, Theoretical bitcoin attacks with less than half of the computational power (draft), CoRR, vol. abs/1312.7013, 2013. [Online]. Available: arXiv: 1312.7013 Google Scholar |
[3] |
T. Bamert, C. Decker, L. Elsen, R. Wattenhofer and S. Welten, Have a snack, pay with bitcoins, IEEE P2P 2013, Proceedings, 2013, 1–5.
doi: 10.1109/P2P.2013.6688717. |
[4] |
J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll and E. W. Felten, Sok: Research perspectives and challenges for bitcoin and cryptocurrencies, in 2015 IEEE Symposium on Security and Privacy, 2015, 104–121.
doi: 10.1109/SP.2015.14. |
[5] |
Z. Cai, Z. He, X. Guan and Y. Li,
Collective data-sanitization for preventing sensitive information inference attacks in social networks, IEEE Transactions on Dependable and Secure Computing, 15 (2018), 577-590.
doi: 10.1109/TDSC.2016.2613521. |
[6] |
Z. Cai and X. Zheng, A private and efficient mechanism for data uploading in smart cyber-physical systems, IEEE Transactions on Network Science and Engineering (Early Access), 2018, 1–1.
doi: 10.1109/TNSE.2018.2830307. |
[7] |
M. Carlsten, H. Kalodner, S. M. Weinberg and A. Narayanan, On the instability of bitcoin without the block reward, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, 154–167.
doi: 10.1145/2976749.2978408. |
[8] |
N. T. Courtois and L. Bahack, On subversive miner strategies and block withholding attack in bitcoin digital currency, CoRR, vol. abs/1402.1718, 2014. [Online]. Available: arXiv: 1402.1718 Google Scholar |
[9] |
N. T. Courtois, M. Grajek and R. Naik, Optimizing sha256 in bitcoin mining, in Cryptography and Security Systems - Third International Conference, CSS 2014, Proceedings, 2014, 131–144.
doi: 10.1007/978-3-662-44893-9_12. |
[10] |
C. Decker and R. Wattenhofer, Information propagation in the bitcoin network, in IEEEP2P 2013, Proceedings, 2013, 1–10.
doi: 10.1109/P2P.2013.6688704. |
[11] |
I. Eyal, The miner's dilemma, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, 2015, 89–103.
doi: 10.1109/SP.2015.13. |
[12] |
I. Eyal and E. G. Sirer,
Majority is not enough: Bitcoin mining is vulnerable, Communications of the ACM CACM Homepage Archive, 61 (2018), 95-102.
doi: 10.1145/3212998. |
[13] |
B. A. Fisch, R. Pass and A. Shelat, Socially optimal mining pools, in International Conference on Web and Internet Economics, 2017, 205–218. Google Scholar |
[14] |
J. Garay, A. Kiayias and N. Leonardos, The bitcoin backbone protocol: Analysis and applications, in Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part Ⅱ, 9057 (2015), 281–310.
doi: 10.1007/978-3-662-46803-6_10. |
[15] |
Z. He, Z. Cai, J. Yu, X. Wang, Y. Sun and Y. Li,
Cost-efficient strategies for restraining rumor spreading in mobile social networks, IEEE Transactions on Vehicular Technology, 66 (2017), 2789-2800.
doi: 10.1109/TVT.2016.2585591. |
[16] |
Z. He, Z. Cai and X. Wang, Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks, in IEEE ICDCS, 2015, 205–214.
doi: 10.1109/ICDCS.2015.29. |
[17] |
Z. He, Z. Cai and J. Yu,
Latent-data privacy preserving with customized data utility for social network data, IEEE Transactions on Vehicular Technology, 67 (2018), 665-673.
doi: 10.1109/TVT.2017.2738018. |
[18] |
E. Heilman, One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers, 2014, 161–162.
doi: 10.1007/978-3-662-44774-1_12. |
[19] |
C. Hu, W. Li, X. Cheng, J. Yu, S. Wang and R. Bie,
A secure and verifiable access control scheme for big data storage in clouds, IEEE Transactions on Big Data (Early Access), 4 (2018), 341-355.
doi: 10.1109/TBDATA.2016.2621106. |
[20] |
Q. Hu, S. Wang, C. Hu, J. Huang, W. Li and X. Cheng,
Messages in a concealed bottle: Achieving query content privacy with accurate location-based services, to appear in IEEE Transactions on Vehicular Technology, 67 (2018), 7698-7711.
doi: 10.1109/TVT.2018.2838041. |
[21] |
G. O. Karame, E. Androulaki and S. Capkun, Double-spending fast payments in bitcoin, in the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012, 2012, 906–917.
doi: 10.1145/2382196.2382292. |
[22] |
A. Kothapalli, A. Miller and N. Borisov, Smartcast: An incentive compatible consensus protocol using smart contracts, in International Conference on Financial Cryptography and Data Security, 2017, 536–552. Google Scholar |
[23] |
J. A. Kroll, I. C. Davey and E. W. Felten, The economics of bitcoin mining, or bitcoin in the presence of adversaries, in Proceedings of WEIS, 2013 (2013), p. 11. Google Scholar |
[24] |
W. Li, M. Larson, C. Hu, R. Li, X. Cheng and R. Bie,
Secure multi-unit sealed first-price auction mechanisms, Security and Communication Netowrks SI on Cyber Security, Crime, and Forensices of Wireless Networks and Applications, 9 (2016), 3833-3843.
doi: 10.1002/sec.1522. |
[25] |
Y. Liang, Z. Cai, J. Yu, Q. Han and Y. Li,
Deep learning based inference of private information using embedded sensors in smart devices, IEEE Network Magazine, 32 (2018), 8-14.
doi: 10.1109/MNET.2018.1700349. |
[26] |
Y. Liang, Z. Cai, Q. Han and Y. Li, Location privacy leakage through sensory data, Security and Communication Networks, 2017 (2017), Article ID 7576307, 12 pages.
doi: 10.1155/2017/7576307. |
[27] |
L. Luu, R. Saha, I. Parameshwaran, P. Saxena and A. Hobor, On power splitting games in distributed computation: The case of bitcoin pooled mining, in IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, 2015, 397–411.
doi: 10.1109/CSF.2015.34. |
[28] |
L. Luu, Y. Velner, J. Teutsch and P. Saxena, Smart pool: Practical decentralized pooled mining, in 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017., 2017, 1409–1426. [Online]. Available: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/luu Google Scholar |
[29] |
R. Meni, A short note about variance and pool payouts, [Online], 2011, Available: https://bitcointalk.org/index.php?topic=5264.0 Google Scholar |
[30] |
C. Mooney and S. Mufson, Why the bitcoin craze is using up so much energy, 2018, [Online]. Available: https://www.washingtonpost.com/news/energy-environment/wp/2017/12/19/why-the-bitcoin-craze-is-using-up-so-much-energy/?utm_term=.2ec154762efa Google Scholar |
[31] |
S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, [Online], 2009, Available: http://www.bitcoin.org/bitcoin.pdf Google Scholar |
[32] |
K. Nayak, S. Kumar, A. Miller and E. Shi, Stubborn mining: Generalizing selfish mining and combining with an eclipse attack, in IEEE European Symposium on Security and Privacy, EuroS & P 2016, Saarbrücken, Germany, March 21-24, 2016, 2016, 305–320.
doi: 10.1109/EuroSP.2016.32. |
[33] |
M. Rosenfeld, Analysis of bitcoin pooled mining reward systems, CoRR, vol. abs/1112.4980, 2011. [Online]. Available: arXiv: 1112.4980 Google Scholar |
[34] |
M. Rosenfeld, Mining pools reward methods, presentation at bitcoin 2013 conference, [Online]. Available: http://www.youtube.com/watch?v=5sgdD4mGPfg Google Scholar |
[35] |
M. Rosenfeld, Double geometric method: Hopping-proof, low-variance reward system, [Online], Available: https://bitcointalk.org/index.php?topic=39497.0 Google Scholar |
[36] |
A. Sapirshtein, Y. Sompolinsky and A. Zohar, Optimal selfish mining strategies in bitcoin, in Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, 9603 (2017), 515–532.
doi: 10.1007/978-3-662-54970-4\_30. |
[37] |
O. Schrijvers, J. Bonneau, D. Boneh and T. Roughgarden, Incentive compatibility of bitcoin mining pool reward functions, in Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, 9603 (2017), 477–498.
doi: 10.1007/978-3-662-54970-4\_28. |
[38] |
B. L. Shultz and D. Bayer, Certification of witness: Mitigating blockchain fork attacks, Undergraduate Thesis in Mathematics, Columbia University in the City of New York, 2015. Google Scholar |
[39] |
S. Solat and M. Potop-Butucaru, Brief announcement: Zeroblock: Timestamp-free prevention of block-withholding attack in bitcoin, in Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Boston, MA, USA, November 5-8, 2017, Proceedings, 2017, 356–360.
doi: 10.1007/978-3-319-69084-1_25. |
[40] |
E. Swanson, Bitcoin mining calculator, 2013, [Online], Available: https://alloscomp.com/bitcoin/calculator/ Google Scholar |
[41] |
D. K. Tosh, S. Shetty, X. Liang, C. A. Kamhoua, K. A. Kwiat and L. Njilla, Security implications of blockchain cloud with analysis of block withholding attack, in 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID, 2017, 458–467.
doi: 10.1109/CCGRID.2017.111. |
[42] |
Y. Velner, J. Teutsch and L. Luu, Smart contracts make bitcoin mining pools vulnerable, in Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers, 2017, 298–316.
doi: 10.1007/978-3-319-70278-0_19. |
[43] |
J. Wang, Z. Cai, Y. Li, D. Yang, J. Li and H. Gao, Protecting query privacy with differentially private k-anonymity in location-based services, Personal and Ubiquitous Computing, 2018, 1–17. Google Scholar |
[44] |
G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, 151 (2014), 1-32. Google Scholar |
[45] |
R. Zhang and B. Preneel, Publish or perish: A backward-compatible defense against selfish mining in bitcoin, in Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings, 10159 (2017), 277–292.
doi: 10.1007/978-3-319-52153-4\_16. |
[46] |
X. Zheng, Z. Cai, J. Yu, C. Wang and Y. Li,
Follow but no track: Privacy preserved profile publishing in cyber-physical social systems, IEEE Internet of Things Journal, 4 (2017), 1868-1878.
doi: 10.1109/JIOT.2017.2679483. |
[47] |
X. Zheng, Z. Cai and Y. Li, Data linkage in smart iot systems: A consideration from privacy perspective, to appear in IEEE Communications Magazine, 2018. Google Scholar |
[48] |
X. Zheng, Z. Cai, J. Li and H. Gao, Location-privacy-aware review publication mechanism for local business service systems, in IEEE INFOCOM, Atlanta, USA, 2017, 1–9.
doi: 10.1109/INFOCOM.2017.8056976. |
[49] |
X. Zheng, G. Luo and Z. Cai, A fair mechanism for private data publication in online social networks, IEEE Transactions on Network Science and Engineering (Early Access), 2018, 1–1.
doi: 10.1109/TNSE.2018.2801798. |
[50] |
Y. Zolotavkin, J. García and C. Rudolph, Incentive compatibility of pay per last N shares in bitcoin mining pools, in Decision and Game Theory for Security - 8th International Conference, GameSec, 2017, 21–39.
doi: 10.1007/978-3-319-68711-7_2. |
[51] |
Blockchain info: Detailed information and charts on all bitcoin transactions and blocks, [Online], Available: https://blockchain.info/ Google Scholar |
[52] |
Bitcoin block reward halving countdown, [Online], Available: https://www.bitcoinblockhalf.com/ Google Scholar |
[53] |
Comparison of mining pools, [Online], Available: https://en.bitcoin.it/wiki/Comparison of mining pools Google Scholar |
[54] |
The cryptocurrency for payments based on blockchain technology, [Online], Available: https://litecoin.org/ Google Scholar |
[55] |
How to destroy bitcoin with 51, [Online], Available: https://medium.com/@homakov/how-to-destroy-bitcoin-with-51-pocked-guide-for-governments-83d9bdf2ef6b Google Scholar |
[56] |
Pps vs pplns – mining pool payment reward structure explained, [Online], 2018, Available: https://coinguides.org/pps-vs-pplns/ Google Scholar |
[57] |
Slush pool reward system, [Online], Available: https://slushpool.com/help/manual/rewards Google Scholar |









Pool Name | Reward Mechanism | PPS fee | Other fee |
Antpool | PPLNS & PPS | 2.5% | 0% |
BTC.com | FPPS | 0% | 4% |
Slush Pool | Score | 2% | |
BTCC Pool | PPS | 2% | 0% |
P2Pool | PPLNS | 0% | |
BTCDig | DGM | 0% |
Pool Name | Reward Mechanism | PPS fee | Other fee |
Antpool | PPLNS & PPS | 2.5% | 0% |
BTC.com | FPPS | 0% | 4% |
Slush Pool | Score | 2% | |
BTCC Pool | PPS | 2% | 0% |
P2Pool | PPLNS | 0% | |
BTCDig | DGM | 0% |
[1] |
Shoji Kasahara, Jun Kawahara. Effect of Bitcoin fee on transaction-confirmation process. Journal of Industrial & Management Optimization, 2019, 15 (1) : 365-386. doi: 10.3934/jimo.2018047 |
[2] |
Mohamed Baouch, Juan Antonio López-Ramos, Blas Torrecillas, Reto Schnyder. An active attack on a distributed Group Key Exchange system. Advances in Mathematics of Communications, 2017, 11 (4) : 715-717. doi: 10.3934/amc.2017052 |
[3] |
Rodrigo I. Brevis, Jaime H. Ortega, David Pardo. A source time reversal method for seismicity induced by mining. Inverse Problems & Imaging, 2017, 11 (1) : 25-45. doi: 10.3934/ipi.2017002 |
[4] |
Yoshiaki Kawase, Shoji Kasahara. Priority queueing analysis of transaction-confirmation time for Bitcoin. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-22. doi: 10.3934/jimo.2018193 |
[5] |
Kevin Ford. The distribution of totients. Electronic Research Announcements, 1998, 4: 27-34. |
[6] |
Jintai Ding, Joshua Deaton, Kurt Schmidt. Giophantus distinguishing attack is a low dimensional learning with errors problem. Advances in Mathematics of Communications, 2019, 0 (0) : 0-0. doi: 10.3934/amc.2020030 |
[7] |
Jintai Ding, Joshua Deaton, Kurt Schmidt. Giophantus distinguishing attack is a low dimensional learning with errors problem. Advances in Mathematics of Communications, 2020, 14 (1) : 171-175. doi: 10.3934/amc.2020014 |
[8] |
Jintai Ding, Zheng Zhang, Joshua Deaton. The singularity attack to the multivariate signature scheme HIMQ-3. Advances in Mathematics of Communications, 2019, 0 (0) : 0-0. doi: 10.3934/amc.2020043 |
[9] |
Heung Wing Joseph Lee, Chi Kin Chan, Karho Yau, Kar Hung Wong, Colin Myburgh. Control parametrization and finite element method for controlling multi-species reactive transport in a circular pool. Journal of Industrial & Management Optimization, 2013, 9 (3) : 505-524. doi: 10.3934/jimo.2013.9.505 |
[10] |
Matthew Bourque, T. E. S. Raghavan. Policy improvement for perfect information additive reward and additive transition stochastic games with discounted and average payoffs. Journal of Dynamics & Games, 2014, 1 (3) : 347-361. doi: 10.3934/jdg.2014.1.347 |
[11] |
Qinglei Zhang, Wenying Feng. Detecting coalition attacks in online advertising: A hybrid data mining approach. Big Data & Information Analytics, 2016, 1 (2&3) : 227-245. doi: 10.3934/bdia.2016006 |
[12] |
Zhen Mei. Manifold data mining helps businesses grow more effectively. Big Data & Information Analytics, 2016, 1 (2&3) : 275-276. doi: 10.3934/bdia.2016009 |
[13] |
Sunmoo Yoon, Maria Patrao, Debbie Schauer, Jose Gutierrez. Prediction models for burden of caregivers applying data mining techniques. Big Data & Information Analytics, 2017, 2 (5) : 1-9. doi: 10.3934/bdia.2017014 |
[14] |
Anupama N, Sudarson Jena. A novel approach using incremental under sampling for data stream mining. Big Data & Information Analytics, 2017, 2 (5) : 1-13. doi: 10.3934/bdia.2017017 |
[15] |
King-Yeung Lam, Daniel Munther. Invading the ideal free distribution. Discrete & Continuous Dynamical Systems - B, 2014, 19 (10) : 3219-3244. doi: 10.3934/dcdsb.2014.19.3219 |
[16] |
Katrin Gelfert, Christian Wolf. On the distribution of periodic orbits. Discrete & Continuous Dynamical Systems - A, 2010, 26 (3) : 949-966. doi: 10.3934/dcds.2010.26.949 |
[17] |
Andrei Korobeinikov. Global properties of a general predator-prey model with non-symmetric attack and consumption rate. Discrete & Continuous Dynamical Systems - B, 2010, 14 (3) : 1095-1103. doi: 10.3934/dcdsb.2010.14.1095 |
[18] |
Edward S. Canepa, Alexandre M. Bayen, Christian G. Claudel. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming. Networks & Heterogeneous Media, 2013, 8 (3) : 783-802. doi: 10.3934/nhm.2013.8.783 |
[19] |
Victor Berdichevsky. Distribution of minimum values of stochastic functionals. Networks & Heterogeneous Media, 2008, 3 (3) : 437-460. doi: 10.3934/nhm.2008.3.437 |
[20] |
I-Lin Wang, Ju-Chun Lin. A compaction scheme and generator for distribution networks. Journal of Industrial & Management Optimization, 2016, 12 (1) : 117-140. doi: 10.3934/jimo.2016.12.117 |
Impact Factor:
Tools
Metrics
Other articles
by authors
[Back to Top]