{"id":"https://openalex.org/W4416549362","doi":"https://doi.org/10.1145/3719027.3765058","title":"How to Beat Nakamoto in the Race","display_name":"How to Beat Nakamoto in the Race","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549362","doi":"https://doi.org/10.1145/3719027.3765058"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765058","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765058","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3719027.3765058","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102872877","display_name":"Shu-Jie Cao","orcid":"https://orcid.org/0009-0004-0132-2586"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shu-Jie Cao","raw_affiliation_strings":["Northwestern University, Evanston, IL, USA"],"raw_orcid":"https://orcid.org/0009-0004-0132-2586","affiliations":[{"raw_affiliation_string":"Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081342685","display_name":"Dongning Guo","orcid":"https://orcid.org/0000-0001-9000-3480"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongning Guo","raw_affiliation_strings":["Northwestern University, Evanston, IL, USA"],"raw_orcid":"https://orcid.org/0000-0001-9000-3480","affiliations":[{"raw_affiliation_string":"Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102872877"],"corresponding_institution_ids":["https://openalex.org/I111979921"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42733052,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3446","last_page":"3460"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.15729999542236328,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.15729999542236328,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.12470000237226486,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.05079999938607216,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.6661999821662903},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.5595999956130981},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5317000150680542},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4950000047683716},{"id":"https://openalex.org/keywords/beat","display_name":"Beat (acoustics)","score":0.42170000076293945},{"id":"https://openalex.org/keywords/coin-flipping","display_name":"Coin flipping","score":0.4065999984741211},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.4009000062942505},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.38350000977516174}],"concepts":[{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.6661999821662903},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5910999774932861},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.5595999956130981},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5317000150680542},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4950000047683716},{"id":"https://openalex.org/C189809214","wikidata":"https://www.wikidata.org/wiki/Q829522","display_name":"Beat (acoustics)","level":2,"score":0.42170000076293945},{"id":"https://openalex.org/C97399411","wikidata":"https://www.wikidata.org/wiki/Q825367","display_name":"Coin flipping","level":2,"score":0.4065999984741211},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.4009000062942505},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.38350000977516174},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.3384999930858612},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33180001378059387},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3303000032901764},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.3246000111103058},{"id":"https://openalex.org/C28901747","wikidata":"https://www.wikidata.org/wiki/Q177571","display_name":"Decision theory","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C163836022","wikidata":"https://www.wikidata.org/wiki/Q6771326","display_name":"Markov model","level":3,"score":0.28940001130104065},{"id":"https://openalex.org/C8272713","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Stochastic process","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C76509639","wikidata":"https://www.wikidata.org/wiki/Q918036","display_name":"Race (biology)","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C2984634286","wikidata":"https://www.wikidata.org/wiki/Q1331926","display_name":"Decision process","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2612999975681305},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765058","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765058","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765058","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765058","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7170043270","display_name":null,"funder_award_id":"2132700","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W851575271","https://openalex.org/W1523833175","https://openalex.org/W2613387059","https://openalex.org/W2757041386","https://openalex.org/W2770149261","https://openalex.org/W2890364458","https://openalex.org/W2986418087","https://openalex.org/W3030538593","https://openalex.org/W3088537673","https://openalex.org/W3097446043","https://openalex.org/W3109110085","https://openalex.org/W3214054335","https://openalex.org/W3215268109","https://openalex.org/W4281781392","https://openalex.org/W4376479252","https://openalex.org/W4383220717","https://openalex.org/W4401991105","https://openalex.org/W4409228002"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"proof-of-work":[3],"Nakamoto":[4,104],"consensus":[5],"protocols":[6],"under":[7,27],"bounded":[8],"network":[9,132],"delays,":[10],"settling":[11],"two":[12],"long-standing":[13],"questions":[14],"in":[15,105],"blockchain":[16,137],"security:":[17],"What":[18],"is":[19,35,48,89,114],"the":[20,36,53,57,65,70,75,79,95,106,129],"most":[21],"effective":[22],"attack":[23],"on":[24],"block":[25,30,81,100],"safety":[26,40,101],"a":[28],"given":[29,118],"confirmation":[31,119,134],"latency?":[32],"And":[33],"what":[34],"resulting":[37],"probability":[38,110],"of":[39,61,98,111,131],"violation?":[41],"A":[42],"Markov":[43,122],"decision":[44],"process":[45],"(MDP)":[46],"framework":[47],"introduced":[49],"to":[50,74,93],"precisely":[51],"characterize":[52],"system":[54],"state":[55,71],"(including":[56],"blocktree":[58],"and":[59,69,78,91,136],"timings":[60],"all":[62],"blocks":[63],"mined),":[64],"adversary's":[66,96],"potential":[67],"actions,":[68],"transitions":[72],"due":[73],"adversarial":[76],"action":[77],"random":[80],"arrival":[82],"processes.":[83],"An":[84],"optimal":[85],"attack,":[86],"called":[87],"bait-and-switch,":[88],"proposed":[90],"proved":[92],"maximize":[94],"chance":[97],"violating":[99],"by":[102],"''beating":[103],"race''.":[107],"The":[108],"exact":[109],"this":[112],"violation":[113],"calculated":[115],"for":[116],"any":[117],"depth":[120],"using":[121],"chain":[123],"analysis,":[124],"offering":[125],"fresh":[126],"insights":[127],"into":[128],"interplay":[130],"delay,":[133],"rules,":[135],"security.":[138]},"counts_by_year":[],"updated_date":"2025-11-28T17:07:19.951216","created_date":"2025-11-23T00:00:00"}
