[1] |
沈鑫, 裴庆祺, 刘雪峰 . 区块链技术综述[J]. 网络与信息安全学报, 2016,2(11): 11-20.
|
|
SHEN X , PEI Q Q , LIU X F . Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016,2(11): 11-20.
|
[2] |
XIAO Y , ZHANG N , LOU W J ,et al. A survey of distributed consensus protocols for blockchain networks[J]. IEEE Communications Surveys & Tutorials, 2020,22(2): 1432-1465.
|
[3] |
刘懿中, 刘建伟, 张宗洋 ,等. 区块链共识机制研究综述[J]. 密码学报, 2019,6(4): 395-432.
|
|
LIU Y Z , LIU J W , ZHANG Z Y ,et al. Overview on blockchain consensus mechanisms[J]. Journal of Cryptologic Research, 2019,6(4): 395-432.
|
[4] |
DOUCEUR J R , . The sybil attack[C]// Peer-to-Peer Systems. Berlin:Springer, 2002: 251-260.
|
[5] |
EYAL I , SIRER E G . Majority is not enough:bitcoin mining is vulnerable[C]// Financial Cryptography and Data Security. Berlin:Springer, 2014: 436-454.
|
[6] |
LEONARDOS N , LEONARDOS S , PILIOURAS G . Oceanic games:centralization risks and incentives in blockchain mining[C]// Mathematical Research for Blockchain Economy. Berlin:Springer, 2020: 183-199.
|
[7] |
EYAL I , . The miner’s dilemma[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 89-103.
|
[8] |
LI T , WANG Z J , YANG G Y ,et al. Semi-selfish mining based on hidden Markov decision process[J]. International Journal of Intelligent Systems, 2021,36(7): 3596-3612.
|
[9] |
NEGY K A , RIZUN P R , SIRER E G . Selfish mining re-examined[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2020: 61-78.
|
[10] |
BIAIS B , BISIèRE C , BOUVARD M ,et al. The blockchain folk theorem[J]. The Review of Financial Studies, 2019,32(5): 1662-1715.
|
[11] |
NEUDECKER T , HARTENSTEIN H . Short paper:an empirical analysis of blockchain Forks in bitcoin[C]// Financial Cryptography and Data Security. Berlin:Springer, 2019: 84-92.
|
[12] |
LIAO K , KATZ J . Incentivizing blockchain Forks via whale transactions[C]// Financial Cryptography and Data Security. Berlin:Springer, 2017: 264-279.
|
[13] |
HEILMAN E , . One weird trick to stop selfish miners:fresh bitcoins,a solution for the honest miner (poster abstract)[C]// Financial Cryptography and Data Security. Berlin:Springer, 2014: 161-162.
|
[14] |
SOLAT S , POTOP-BUTUCARU M . Brief announcement:ZeroBlock:timestamp-free prevention of block-withholding attack in bitcoin[C]// Stabilization,Safety,and Security of Distributed Systems. Berlin:Springer, 2017: 356-360.
|
[15] |
SAAD M , NJILLA L , KAMHOUA C ,et al. Countering selfish mining in blockchains[C]// Proceedings of 2019 International Conference on Computing,Networking and Communications (ICNC). Piscataway:IEEE Press, 2019: 360-364.
|
[16] |
SZALACHOWSKI P , REIJSBERGEN D , HOMOLIAK I ,et al. StrongChain:transparent and collaborative proof-of-work consensus[C]// Proceedings of the 28th USENIX Security Symposium. Berkeley:USENIX Association, 2019: 819-836.
|
[17] |
TSABARY I , EYAL I . The gap game[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 713-728.
|
[18] |
BRüNJES L , KIAYIAS A , KOUTSOUPIAS E ,et al. Reward sharing schemes for stake pools[C]// Proceedings of 2020 IEEE European Symposium on Security and Privacy (EuroS&P). Piscataway:IEEE Press, 2020: 256-275.
|
[19] |
BUTERIN V , REIJSBERGEN D , LEONARDOS S ,et al. Incentives in Ethereum’s hybrid Casper protocol[J]. International Journal of Network Management, 2020,30(5): e2098.
|
[20] |
LIU B , QIN Y , CHU X W . Reducing Forks in the blockchain via probabilistic verification[C]// Proceedings of 2019 IEEE 35th International Conference on Data Engineering Workshops. Piscataway:IEEE Press, 2019: 13-18.
|
[21] |
SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in bitcoin[C]// Financial Cryptography and Data Security. Berlin:Springer, 2017: 515-532.
|
[22] |
MIRKIN M , JI Y , PANG J ,et al. BDoS:blockchain denial-of-service[C]// Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2020: 601-619.
|
[23] |
HU Q , WANG S L , CHENG X Z . A game theoretic analysis on block withholding attacks using the zero-determinant strategy[C]// Proceedings of 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS). Piscataway:IEEE Press, 2019: 1-10.
|
[24] |
SHI H W , WANG S L , HU Q ,et al. Fee-free pooled mining for countering pool-hopping attack in blockchain[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(4): 1580-1590.
|