LIU Zizhou, CHENG Xiaorong, WANG Zhibo. Research and Analysis of Block Withholding Attack for Blockchain[J]. Computer Engineering and Applications, 2022, 58(4): 118-125.
[1] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[2] BADERSCHER C,MAURER U,TSCHUDI D,et al.Bitcoin as a transaction ledger:a composable treatment[C]//Annual International Cryptology Conference.Cham:Springer,2017:324-356.
[3] ATZEI N,BARTOLETTI M,CIMOLI T.A survey of attacks on ethereum smart contracts(SOK)[C]//International conference on principles of security and trust.Springer,Berlin,Heidelberg,2017:164-186.
[4] ROSENFELD M.Analysis of bitcoin pooled mining reward systems[J].arXiv:1112.4980,2011.
[5] COURTOIS N T,BAHACK L.On subversive miner strategies and block withholding attack in bitcoin digital currency[J].arXiv:1402.1718,2014.
[6] LUU L,SAHA R,PARAMESHWARAN I,et al.On power splitting games in distributed computation:the case of bitcoin pooled mining[C]//2015 IEEE 28th Computer Security Foundations Symposium,2015:397-411.
[7] BAG S,RUJ S,SAKURAI K.Bitcoin block withholding attack:analysis and mitigation[J].IEEE Transactions on Information Forensics and Security,2016,12(8):1967-1978.
[8] KWON Y,KIM D,SON Y,et al.Be selfish and avoid dilemmas:fork after withholding (FAW) attacks on bitcoin[C]//2017 ACM SIGSAC Conference on Computer and Communications Security,2017:195-209.
[9] KOSBA A,MILLER A,SHI E,et al.HAWK:the blockchain model of cryptography and privacy-preserving smart contracts[C]//2016 IEEE Symposium on Security and Privacy,2016:839-858.
[10] 韩健.比特币挖矿攻击及防御方案研究[D].济南:山东大学,2019.
HAN J.Research on bitcoin mining attacks and defense schemes[D].Jinan:Shandong University,2019.
[11] DU M X,MA X F,ZHANG Z,et al.A review on consensus algorithm of blockchain[C]//2017 IEEE International Conference on Systems,Man,and Cybernetics,2017:2567-2572.
[12] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].(2008)[2020-08-15].https://bitcoin.org/bitcoin.pdf.
[13] EYAL I,SIRER E G.Majority is not enough:bitcoin mining is vulnerable[C]//International Conference on Financial Cryptography and Data Security.Berlin,Heidelberg:Springer,2014:436-454.
[14] 柯俊明.动态平均收益最优的扣块策略:间歇性扣块攻击[D].济南:山东大学,2019.
KE J M.The intermittent withholding attack:the block withholding attack for the optimal dynamic reward rate[D].Jinan:Shandong University,2019.
[15] BONNEAU J,MILLER A,CLARK J,et al.SOK:research perspectives and challenges for bitcoin and cryptocurrencies[C]//2015 IEEE Symposium on Security and Privacy,2015:104-121.
[16] NAYAK K,KUMAR S,MILLER A,et al.Stubborn mining:generalizing selfish mining and combining with an eclipse attack[C]//2016 IEEE European Symposium on Security and Privacy,2016:305-320.