Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake
Abstract
References
Index Terms
- Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake
Recommendations
Proof-of-Stake Mining Games with Perfect Randomness
EC '21: Proceedings of the 22nd ACM Conference on Economics and ComputationProof-of-Stake blockchains based on a longest-chain consensus protocol are an attractive energy-friendly alternative to the Proof-of-Work paradigm. However, formal barriers to "getting the incentives right" were recently discovered, driven by the desire ...
Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies
CryBlock '20: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed SystemsThere have been several 51% attacks on Proof-of-Work (PoW) blockchains recently, including Verge and GameCredits, but the most noteworthy has been the attack that saw hackers make off with up to $18 million after a successful double-spend was executed ...
Proof-of-Stake Longest Chain Protocols: Security vs Predictability
ConsensusDay '22: Proceedings of the 2022 ACM Workshop on Developments in ConsensusThe Nakamoto longest chain protocol is remarkably simple and has been proven to provide security against any adversary with less than 50% of the total hashing power. Proof-of-stake (PoS) protocols are an energy efficient alternative; however existing ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- David M. Pennock,
- Program Chairs:
- Ilya Segal,
- Sven Seuken
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 141Total Downloads
- Downloads (Last 12 months)32
- Downloads (Last 6 weeks)5
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in