{"id":"https://openalex.org/W7117241716","doi":"https://doi.org/10.1109/tce.2025.3648529","title":"Collapsing the Miner\u2019s Dilemma: A Novel Attack Forging Incentive-Compatible Coalitions via Algorithmic Bribery","display_name":"Collapsing the Miner\u2019s Dilemma: A Novel Attack Forging Incentive-Compatible Coalitions via Algorithmic Bribery","publication_year":2025,"publication_date":"2025-12-25","ids":{"openalex":"https://openalex.org/W7117241716","doi":"https://doi.org/10.1109/tce.2025.3648529"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3648529","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3648529","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019640268","display_name":"Tianzhu Han","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianzhu Han","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113100495","display_name":"Chuhua Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134393","display_name":"China National Chemical Engineering (China)","ror":"https://ror.org/04pwn6a43","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210134393"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuhua Lin","raw_affiliation_strings":["CNOOC Information Technology Company Ltd., Beijing, China"],"affiliations":[{"raw_affiliation_string":"CNOOC Information Technology Company Ltd., Beijing, China","institution_ids":["https://openalex.org/I4210134393"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121269595","display_name":"Jiashui Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiashui Wang","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037990242","display_name":"Yaoguang Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yaoguang Chen","raw_affiliation_strings":["Ant Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Hangzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121245393","display_name":"Junjie Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Hu","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5120055770","display_name":"Na Ruan","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Na Ruan","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5019640268"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76177873,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1974","last_page":"1981"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.29490000009536743,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.29490000009536743,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.05220000073313713,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11031","display_name":"Game Theory and Applications","score":0.04340000078082085,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7053999900817871},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.6597999930381775},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5881999731063843},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.42730000615119934},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.4174000024795532},{"id":"https://openalex.org/keywords/underpinning","display_name":"Underpinning","score":0.4043000042438507},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4000999927520752},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.3955000042915344},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.3910999894142151}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7053999900817871},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.6597999930381775},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5742999911308289},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5110999941825867},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4505999982357025},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.42730000615119934},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.4174000024795532},{"id":"https://openalex.org/C2780871342","wikidata":"https://www.wikidata.org/wiki/Q7883752","display_name":"Underpinning","level":2,"score":0.4043000042438507},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4000999927520752},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3955000042915344},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.3910999894142151},{"id":"https://openalex.org/C2777093003","wikidata":"https://www.wikidata.org/wiki/Q6508345","display_name":"Lead (geology)","level":2,"score":0.38089999556541443},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.358599990606308},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.3522999882698059},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.3513999879360199},{"id":"https://openalex.org/C2778146401","wikidata":"https://www.wikidata.org/wiki/Q10916362","display_name":"Disequilibrium","level":2,"score":0.34299999475479126},{"id":"https://openalex.org/C2778069335","wikidata":"https://www.wikidata.org/wiki/Q32098","display_name":"Sanctions","level":2,"score":0.3075999915599823},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3028999865055084},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.2955999970436096},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2863999903202057},{"id":"https://openalex.org/C123650614","wikidata":"https://www.wikidata.org/wiki/Q282491","display_name":"Strategic dominance","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.26840001344680786},{"id":"https://openalex.org/C96494537","wikidata":"https://www.wikidata.org/wiki/Q193057","display_name":"Forging","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.26269999146461487},{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2547000050544739},{"id":"https://openalex.org/C2780027415","wikidata":"https://www.wikidata.org/wiki/Q524648","display_name":"Language change","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3648529","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3648529","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49623700976371765,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"reliability":[1],"of":[2,102,132,140,157],"consumer":[3,133],"Autonomous":[4],"Intelligent":[5],"Systems":[6],"(AISs)":[7],"increasingly":[8],"relies":[9],"on":[10],"decentralized":[11],"consensus":[12,130],"protocols.":[13],"However,":[14],"the":[15,79,82,97,106,129,137],"economic":[16,125],"incentives":[17],"underpinning":[18],"them":[19],"are":[20],"vulnerable.":[21],"While":[22],"existing":[23],"attacks":[24],"already":[25],"exploit":[26],"these":[27],"weaknesses":[28],"for":[29,77],"profit,":[30],"this":[31,154],"paper":[32],"reveals":[33],"a":[34,48,59,103,111,123],"more":[35],"precarious":[36],"threat":[37],"landscape.":[38],"We":[39,65,146],"introduce":[40],"Power":[41],"Adjusting":[42],"Withholding":[43],"with":[44,58],"Bribe":[45],"Money":[46],"(BM-PAW),":[47],"novel":[49],"strategy":[50],"where":[51],"an":[52,55],"attacker":[53,80],"forges":[54],"incentive-compatible":[56],"coalition":[57],"third":[60],"party":[61],"through":[62,67],"algorithmic":[63],"bribery.":[64],"demonstrate":[66],"formal":[68],"analysis":[69,92],"and":[70,81,135],"large-scale":[71],"simulations":[72],"that":[73,94,127],"BM-PAWyields":[74],"superior":[75],"rewards":[76],"both":[78],"bribed":[83],"pool":[84],"compared":[85],"to":[86,152],"state-of-the-art":[87],"attacks.":[88],"Crucially,":[89],"our":[90],"game-theoretic":[91],"shows":[93],"BM-PAW":[95],"transforms":[96],"classic":[98],"\u201cminer\u2019s":[99],"dilemma.\u201d":[100],"Instead":[101],"strategic":[104,141],"stalemate,":[105],"game\u2019s":[107],"equilibrium":[108],"collapses":[109],"into":[110],"decisive":[112],"conflict":[113],"predominantly":[114],"determined":[115],"by":[116,148],"relative":[117],"hash":[118],"power.":[119],"This":[120],"finding":[121],"uncovers":[122],"critical":[124],"vulnerability":[126],"threatens":[128],"layer":[131],"AISs":[134],"challenges":[136],"long-held":[138],"assumption":[139],"deterrence":[142],"in":[143],"mining":[144],"ecosystems.":[145],"conclude":[147],"proposing":[149],"practical":[150],"countermeasures":[151],"mitigate":[153],"new":[155],"class":[156],"threat.":[158]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-12-25T00:00:00"}
