搜索结果: 1-4 共查到“军队指挥学 Selfish mining”相关记录4条 . 查询时间(0.062 秒)
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
blockchain Bitcoin, security
font style='font-size:12px;'>
2019/5/21
One of Bitcoin’s core security guarantees is that, for an attacker to be able to successfully interfere with the Bitcoin network and reverse transactions, they need to control 51% of total hash power....
Pooled Mining Makes Selfish Mining Tricky
applications blockchain
font style='font-size:12px;'>
2019/1/2
Bitcoin, the first successful cryptocurrency, uses the blockchain structure and PoW mechanism to generate blocks. PoW makes an adversary difficult to control the network until she retains over 50\% of...
A Deep Dive into Blockchain Selfish Mining
Blockchain Selfish Mining private chains
font style='font-size:12px;'>
2018/11/12
This paper studies a fundamental problem regarding the security of blockchain on how the existence of multiple misbehaving pools influences the profitability of selfish mining. Each selfish miner main...
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
cryptographic protocols Bitcoin
font style='font-size:12px;'>
2015/12/24
Selsh mining [9] is a well-known attack where a selsh miner, under certain conditions, can gain a
disproportionate share of reward by deviating from the honest behavior.