Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Rethinking selfish mining under pooled mining

Full metadata record
DC Field Value Language
dc.contributor.authorLee, S.-
dc.contributor.authorKim, S.-
dc.date.accessioned2022-04-12T22:42:20Z-
dc.date.available2022-04-12T22:42:20Z-
dc.date.created2022-04-12-
dc.date.issued2022-
dc.identifier.issn2405-9595-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/140173-
dc.description.abstractBitcoin's core security requires honest participants to control at least 51% of the total hash power. However, it has been shown that several techniques can exploit the fair mining in the Bitcoin network. This study focuses on selfish mining, which is based on the idea, ”keeping blocks secret.” Herein, we analyze selfish mining regarding competition between mining pools. We emphasize that mining-related information is shared between mining pools and participants. Based on shared information about selfish mining, we have developed an effective and practical counter strategy. © 2022 The Author(s)-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKorean Institute of Communication Sciences-
dc.titleRethinking selfish mining under pooled mining-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, S.-
dc.identifier.doi10.1016/j.icte.2022.03.003-
dc.identifier.scopusid2-s2.0-85127359582-
dc.identifier.bibliographicCitationICT Express-
dc.relation.isPartOfICT Express-
dc.citation.titleICT Express-
dc.type.rimsART-
dc.type.docTypeArticle in Press-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorBlockchain-
dc.subject.keywordAuthorMining pool-
dc.subject.keywordAuthorProof-of-Work-
dc.subject.keywordAuthorSecurity analysis-
dc.subject.keywordAuthorSelfish mining-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seung joo photo

Kim, Seung joo
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE