2020
DOI: 10.1155/2020/8839047
|View full text |Cite|
|
Sign up to set email alerts
|

Rational Protocols and Attacks in Blockchain System

Abstract: Blockchain has been an emerging technology, which comprises lots of fields such as distributed systems and Internet of Things (IoT). As is well known, blockchain is the underlying technology of bitcoin, whose initial motivation is derived from economic incentives. Therefore, lots of components of blockchain (e.g., consensus mechanism) can be constructed toward the view of game theory. In this paper, we highlight the combination of game theory and blockchain, including rational smart contracts, game theoretic a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 69 publications
(53 citation statements)
references
References 39 publications
0
53
0
Order By: Relevance
“…Game theory is generally utilized to analyze the attacks in blockchain system since the latter highly correlates economic scenarios. [18][19][20] Eyal elaborately discusses a more complex scenario, where two pools attack each other by sponsoring BWA. 21 The Nash equilibrium (NE) is mutual BWA for each pool.…”
Section: Related Workmentioning
confidence: 99%
“…Game theory is generally utilized to analyze the attacks in blockchain system since the latter highly correlates economic scenarios. [18][19][20] Eyal elaborately discusses a more complex scenario, where two pools attack each other by sponsoring BWA. 21 The Nash equilibrium (NE) is mutual BWA for each pool.…”
Section: Related Workmentioning
confidence: 99%
“…These studies considered geographically distributed cloud data centers and applied workload migration techniques to minimize the energy of running tasks inside the system. Dynamic application partitioning with failure and resource constraint-enabled schemes were suggested in these studies [21][22][23][24][25][26][27]. The studies considered fine-grained and coarse-grained healthcare workloads in their models.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
“…To the best of our knowledge, dynamic application partitioning and task scheduling of biosensor healthcare workflow in secure mobile edge clouds has not been studied yet. Closely related studies [1,3,5,9,[21][22][23][24][25][26][27] have focused on dynamic application partitioning and minimizing the energy use of mobile devices. These studies only considered bandwidth and resource constraints.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
“…In 2008, Bitcoin was proposed by Satoshi Nakamoto in "Bitcoin: A Peer-to-Peer Electronic Cash System" [14], marking the emergence of blockchain technology. As the *Correspondence: ylchen3@gzu.edu.cn 1 State Key Laboratory of Public Big Data,College of Computer Science and Technology, Guizhou University, Guiyang 550025, China 4 Blockchain Laboratory of Agricultural Vegetables, Weifang University of Science and Technology, Weifang 262700, China Full list of author information is available at the end of the article underlying technology of Bitcoin, blockchain has received extensive attention [15][16][17][18]. Blockchain is a distributed database technology that has the characteristics of decentralization [19][20][21], traceability, tamper-proof, collective maintenance, etc.…”
Section: Introductionmentioning
confidence: 99%