图洛克竞赛:加密货币的工作量证明挖掘模型

Jorge Soria
{"title":"图洛克竞赛:加密货币的工作量证明挖掘模型","authors":"Jorge Soria","doi":"10.2139/ssrn.3561146","DOIUrl":null,"url":null,"abstract":"This paper presents an N-player Tullock contest where players purchases shares in a lottery at a fixed common cost. Once all players have purchased their shares, a common value reward is raffled off. The model has some similarities to all-pay auctions, however the assignment mechanism differs. This difference ensures that, unlike all-pay auctions, the N-player Tullock contest has an unique pure strategy Nash equilibrium. \n \nThis article presents also a new kind of Tullock contest that integrates the main mechanism behind proof-of-work mining of cryptocurrencies such as Bitcoin. The application of the model is expanded to analyze some topics of proof-of-work protocols, such as concentration of hashing power, double-spending attacks and environmental externalities.","PeriodicalId":377322,"journal":{"name":"Investments eJournal","volume":"240 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Tullock Contest: A Model of Proof-of-Work Mining in Cryptocurrencies\",\"authors\":\"Jorge Soria\",\"doi\":\"10.2139/ssrn.3561146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an N-player Tullock contest where players purchases shares in a lottery at a fixed common cost. Once all players have purchased their shares, a common value reward is raffled off. The model has some similarities to all-pay auctions, however the assignment mechanism differs. This difference ensures that, unlike all-pay auctions, the N-player Tullock contest has an unique pure strategy Nash equilibrium. \\n \\nThis article presents also a new kind of Tullock contest that integrates the main mechanism behind proof-of-work mining of cryptocurrencies such as Bitcoin. The application of the model is expanded to analyze some topics of proof-of-work protocols, such as concentration of hashing power, double-spending attacks and environmental externalities.\",\"PeriodicalId\":377322,\"journal\":{\"name\":\"Investments eJournal\",\"volume\":\"240 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Investments eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3561146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Investments eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3561146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文提出了一个n人塔洛克竞赛,其中参与者以固定的共同成本购买彩票股份。一旦所有玩家都购买了他们的股份,一个共同的价值奖励将被抽彩。该模式与全付费拍卖有一些相似之处,但分配机制有所不同。这种差异确保了,与全付费拍卖不同,n人塔洛克竞赛具有独特的纯策略纳什均衡。本文还介绍了一种新型的Tullock竞赛,它集成了比特币等加密货币的工作量证明挖掘背后的主要机制。扩展了该模型的应用,分析了工作量证明协议的一些主题,如哈希算力的集中、双重支出攻击和环境外部性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Tullock Contest: A Model of Proof-of-Work Mining in Cryptocurrencies
This paper presents an N-player Tullock contest where players purchases shares in a lottery at a fixed common cost. Once all players have purchased their shares, a common value reward is raffled off. The model has some similarities to all-pay auctions, however the assignment mechanism differs. This difference ensures that, unlike all-pay auctions, the N-player Tullock contest has an unique pure strategy Nash equilibrium. This article presents also a new kind of Tullock contest that integrates the main mechanism behind proof-of-work mining of cryptocurrencies such as Bitcoin. The application of the model is expanded to analyze some topics of proof-of-work protocols, such as concentration of hashing power, double-spending attacks and environmental externalities.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信