搜索结果: 1-4 共查到“军事学 Selfish mining”相关记录4条 . 查询时间(0.062 秒)
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
blockchain Bitcoin, security
2019/5/21
One of Bitcoin’s core security guarantees is that, for an attacker to be able to successfully interfere with the Bitcoin network and reverse transactions, they need to control 51% of total hash power....
Bitcoin, the first successful cryptocurrency, uses the blockchain structure and PoW mechanism to generate blocks. PoW makes an adversary difficult to control the network until she retains over 50\% of...
This paper studies a fundamental problem regarding the security of blockchain on how the existence of multiple misbehaving pools influences the profitability of selfish mining. Each selfish miner main...
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
cryptographic protocols Bitcoin
2015/12/24
Selsh mining [9] is a well-known attack where a selsh miner, under certain conditions, can gain a
disproportionate share of reward by deviating from the honest behavior.