Back to Results
First PageMeta Content
Computing / Bitcoin / Peer-to-peer computing / Mining


Majority is not Enough: Bitcoin Mining is Vulnerable Ittay Eyal and Emin G¨ un Sirer Department of Computer Science, Cornell University
Add to Reading List

Document Date: 2013-11-04 11:10:34


Open Document

File Size: 711,55 KB

Share Result on Facebook

Currency

USD / /

Facility

Mine We / Mine Strategy First / /

IndustryTerm

Selfish mining / selfish mining pool / selfish mining algorithm / public chain / longest chain / main chain / overall mining power / honest mining strategy / average mining interval / blocks private chain / selfish mining strategy / private chain / mining / selfish mining pools / relative mining power / overlay network / selfish miner / block mining / difficult chain / /

Organization

ASIC / Department of Computer Science / Cornell University / /

Position

private head / miner / selfish pool manager / single miner / first selfish miner / current public head / centralized coordinator / centralized coordinator / following some strategy / pool head / chain head / Private / head / single home miner / /

Technology

ASIC / distributed protocol / Simulation / Bitcoin protocol / selfish mining algorithm / /

SocialTag