| 1 | 张亮, 刘百祥, 张如意, 等. 区块链技术综述. 计算机工程, 2019, 45 (5): 1- 12.  doi: 10.19678/j.issn.1000-3428.0053554
 | 
																													
																							|  | ZHANG L, LIU B X, ZHANG R Y, et al. Overview of blockchain technology. Computer Engineering, 2019, 45 (5): 1- 12.  doi: 10.19678/j.issn.1000-3428.0053554
 | 
																													
																							| 2 | 王群, 李馥娟, 倪雪莉, 等. 区块链共识算法及应用研究. 计算机科学与探索, 2022, 16 (6): 1214- 1242. | 
																													
																							|  | WANG Q, LI F J, NI X L, et al. Survey on blockchain consensus algorithms and application. Journal of Frontiers of Computer Science and Technology, 2022, 16 (6): 1214- 1242. | 
																													
																							| 3 | 谭敏生, 杨杰, 丁琳, 等. 区块链共识机制综述. 计算机工程, 2020, 46 (12): 1- 11.  doi: 10.19678/j.issn.1000-3428.0059070
 | 
																													
																							|  | TAN M S, YANG J, DING L, et al. Review of consensus mechanism of blockchain. Computer Engineering, 2020, 46 (12): 1- 11.  doi: 10.19678/j.issn.1000-3428.0059070
 | 
																													
																							| 4 | DWORK C, NAOR M. Pricing via processing or combatting junk mail. Berlin, Germany: Springer, 2007. | 
																													
																							| 5 | LASZKA A, JOHNSON B, GROSSKLAGS J. When bitcoin mining pools run dry. Berlin, Germany: Springer, 2015. | 
																													
																							| 6 | EYAL I, SIRER E G. Majority is not enough: bitcoin mining is vulnerable. Berlin, Germany: Springer, 2014. | 
																													
																							| 7 |  | 
																													
																							| 8 |  | 
																													
																							| 9 | CHATZIGIANNIS P, BALDIMTSI F, GRIVA I, et al. Diversification across mining pools: optimal mining strategies under PoW. Journal of Cybersecurity, 2022, 8 (1): 1- 15. | 
																													
																							| 10 | LI X P, LI Z. A performance measurement and optimization mechanism for blockchain mining pool system[C]//Proceedings of the 3rd International Conference on Blockchain Technology and Applications. New York, USA: ACM Press, 2020: 27-33. | 
																													
																							| 11 | 邸剑, 吝伟华. 区块链中矿池选择策略的研究与分析. 计算机应用研究, 2020, 37 (6): 1804- 1807. | 
																													
																							|  | DI J, LIN W H. Research and analysis of mining pool selection strategy in blockchain. Application Research of Computers, 2020, 37 (6): 1804- 1807. | 
																													
																							| 12 | 唐长兵, 杨珍, 郑忠龙, 等. PoW共识算法中的博弈困境分析与优化. 自动化学报, 2017, 43 (9): 1520- 1531. | 
																													
																							|  | TANG C B, YANG Z, ZHENG Z L, et al. Game dilemma analysis and optimization of PoW consensus algorithm. Acta Automatica Sinica, 2017, 43 (9): 1520- 1531. | 
																													
																							| 13 |  | 
																													
																							| 14 |  | 
																													
																							| 15 |  | 
																													
																							| 16 |  | 
																													
																							| 17 |  | 
																													
																							| 18 | GIAKKOUPIS G, KERMARREC A M, WOELFEL P. Gossip protocols for renaming and sorting[C]//Proceedings of the 27th International Symposium. Berlin, Germany: Springer, 2013: 194-208. | 
																													
																							| 19 |  | 
																													
																							| 20 | ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger Fabric: a distributed operating system for permissioned blockchains[EB/OL]. [2023-06-27]. https://arxiv.org/abs/1801.10228.pdf . | 
																													
																							| 21 | KUSHWAHA R, KULKARNI S, SINGH Y N. Generalized distance metric for different DHT routing algorithms in peer-to-peer networks[EB/OL]. [2023-06-27]. https://arxiv.org/abs/2303.13965.pdf . | 
																													
																							| 22 | RATNASAMY S, FRANCIS P, HANDLEY M, et al. A scalable content-addressable network. ACM SIGCOMM Computer Communication Review, 2001, 31 (4): 161- 172.  doi: 10.1145/964723.383072
 | 
																													
																							| 23 | MAYMOUNKOV P, MAZIÈRES D. Kademlia: a peer-to-peer information system based on the XOR metric. Berlin, Germany: Springer, 2002. | 
																													
																							| 24 |  | 
																													
																							| 25 | KLONOWSKI M, PIOTROWSKA A M. Light-weight and secure aggregation protocols based on Bloom filters. Computers & Security, 2018, 72, 107- 121. | 
																													
																							| 26 |  | 
																													
																							| 27 | 武岳, 李军祥. 区块链P2P网络协议演进过程. 计算机应用研究, 2019, 36 (10): 2881-2886, 2929. | 
																													
																							|  | WU Y, LI J X. Evolution process of blockchain P2P network protocol. Application Research of Computers, 2019, 36 (10): 2881-2886, 2929. | 
																													
																							| 28 | DEMERS A, GREENE D, HOUSER C, et al. Epidemic algorithms for replicated database maintenance. ACM SIGOPS Operating Systems Review, 1988, 22 (1): 8- 32.  doi: 10.1145/43921.43922
 | 
																													
																							| 29 | BERENDEA N, MERCIER H, ONICA E, et al. Fair and efficient gossip in Hyperledger Fabric[C]//Proceedings of the 40th International Conference on Distributed Computing Systems. Washington D. C., USA: IEEE Press, 2020: 190-200. | 
																													
																							| 30 |  | 
																													
																							| 31 |  | 
																													
																							| 32 | LUU L, VELNER Y, TEUTSCH J, et al. Smartpool: practical decentralized pooled mining[C]//Proceedings of the 26th USENIX Security Symposium. Berkeley, USA: USENIX Association, 2017: 1409-1426. | 
																													
																							| 33 |  | 
																													
																							| 34 |  | 
																													
																							| 35 |  | 
																													
																							| 36 |  | 
																													
																							| 37 |  | 
																													
																							| 38 |  | 
																													
																							| 39 |  | 
																													
																							| 40 |  | 
																													
																							| 41 | 魏松杰, 吕伟龙, 李莎莎. 区块链公链应用的典型安全问题综述. 软件学报, 2022, 33 (1): 324- 355. | 
																													
																							|  | WEI S J, LÜ W L, LI S S. Overview on typical security problems in public blockchain applications. Journal of Software, 2022, 33 (1): 324- 355. | 
																													
																							| 42 |  | 
																													
																							| 43 | 王贺立, 闫巧. 基于交易记录特征的自私挖矿检测方案. 网络与信息安全学报, 2023, 9 (2): 104- 114. | 
																													
																							|  | WANG H L, YAN Q. Selfish mining detection scheme based on the characters of transactions. Chinese Journal of Network and Information Security, 2023, 9 (2): 104- 114. | 
																													
																							| 44 | NAYAK K, KUMAR S, MILLER A, et al. Stubborn mining: generalizing selfish mining and combining with an eclipse attack[C]//Proceedings of 2016 IEEE European Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2016: 305-320. | 
																													
																							| 45 |  | 
																													
																							| 46 | SAPIRSHTEIN A, SOMPOLINSKY Y, ZOHAR A. Optimal selfish mining strategies in bitcoin. Berlin, Germany: Springer, 2017. | 
																													
																							| 47 | HEILMAN E, KENDLER A, ZOHAR A. Eclipse attacks on Bitcoin's peer-to-peer network[C]//Proceedings of the 24th USENIX Conference on Security Symposium. Washington D. C., USA: IEEE Press, 2015: 129-144. | 
																													
																							| 48 | 阮娜, 刘汉卿, 斯雪明. 采用工作量证明共识机制的区块链中挖矿攻击者间的"鲶鱼效应". 计算机学报, 2021, 44 (1): 177- 192. | 
																													
																							|  | RUAN N, LIU H Q, SI X M. Catfish effect between selfish miners in proof-of-work based blockchain. Chinese Journal of Computers, 2021, 44 (1): 177- 192. | 
																													
																							| 49 | LEE S, KIM S. Rethinking selfish mining under pooled mining. ICT Express, 2023, 9 (3): 356- 361.  doi: 10.1016/j.icte.2022.03.003
 | 
																													
																							| 50 | NIKHALAT-JAHROMI A, SAGHIRI A M, MEYBODI M R. Nik defense: an artificial intelligence based defense mechanism against selfish mining in bitcoin[EB/OL]. [2023-06-27]. https://arxiv.org/abs/2301.11463.pdf . | 
																													
																							| 51 | SINGH S, SALIM M, CHO M, et al. Smart contract-based pool hopping attack prevention for blockchain networks. Symmetry, 2019, 11 (7): 941.  doi: 10.3390/sym11070941
 | 
																													
																							| 52 |  | 
																													
																							| 53 | LIU K Y, OHSAWA Y. Auction based rewards distribution method in pool mining[C]//Proceedings of the 1st International Electronics Communication Conference. New York, USA: ACM Press, 2019: 103-110. | 
																													
																							| 54 |  | 
																													
																							| 55 |  | 
																													
																							| 56 |  | 
																													
																							| 57 |  | 
																													
																							| 58 |  | 
																													
																							| 59 | BAG S, RUJ S, SAKURAI K. Bitcoin block withholding attack: analysis and mitigation. IEEE Transactions on Information Forensics and Security, 2017, 12 (8): 1967- 1978.  doi: 10.1109/TIFS.2016.2623588
 | 
																													
																							| 60 |  | 
																													
																							| 61 | BAG S, SAKURAI K. Yet another note on block withholding attack on bitcoin mining pools. Berlin, Germany: Springer, 2016. | 
																													
																							| 62 | 田国华, 胡云瀚, 陈晓峰. 区块链系统攻击与防御技术研究进展. 软件学报, 2021, 32 (5): 1495- 1525. | 
																													
																							|  | TIAN G H, HU Y H, CHEN X F. Research progress on attack and defense techniques in block-chain system. Journal of Software, 2021, 32 (5): 1495- 1525. | 
																													
																							| 63 |  | 
																													
																							| 64 |  |