Back to Results
First PageMeta Content
Computing / Bitcoin / Peer-to-peer computing / Mining


Majority is not Enough: Bitcoin Mining is Vulnerable Ittay Eyal and Emin G¨ un Sirer arXiv:1311.0243v5 [cs.CR] 15 Nov 2013
Add to Reading List

Document Date: 2013-11-17 20:52:48


Open Document

File Size: 774,76 KB

Share Result on Facebook

Currency

USD / /

/

Facility

Mine We / Mine Strategy First / /

IndustryTerm

Selfish mining / selfish mining pool / selfish mining algorithm / public chain / main chain / longest chain / overall mining power / honest mining strategy / average mining interval / blocks private chain / selfish mining strategy / private chain / mining / selfish mining pools / relative mining power / overlay network / selfish miner / block mining / difficult chain / /

Organization

ASIC / Department of Computer Science / Cornell University / /

Position

private head / miner / selfish pool manager / single miner / first selfish miner / current public head / centralized coordinator / centralized coordinator / following some strategy / pool head / chain head / Private / head / single home miner / /

Technology

ASIC / distributed protocol / Simulation / Bitcoin protocol / selfish mining algorithm / /

SocialTag