• Publications
  • Influence
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
TLDR
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Expand
  • 948
  • 109
Bitcoin-NG: A Scalable Blockchain Protocol
TLDR
We present Bitcoin-NG, a scalable blockchain protocol, based on the same trust model as Bitcoin. Expand
  • 800
  • 85
  • PDF
Majority is not enough
TLDR
We show that the Bitcoin mining protocol is not incentive-compatible. Expand
  • 414
  • 40
  • PDF
The Miner's Dilemma
  • Ittay Eyal
  • Computer Science
  • IEEE Symposium on Security and Privacy
  • 25 November 2014
TLDR
We define and analyze a game where pools use some of their participants to infiltrate other pools and perform such an attack. Expand
  • 289
  • 32
  • PDF
On Scaling Decentralized Blockchains - (A Position Paper)
TLDR
We analyze how fundamental and circumstantial bottlenecks in Bitcoin limit the ability of its current peer-to-peer overlay network to support substantially higher throughputs and lower latencies. Expand
  • 414
  • 24
  • PDF
REM: Resource-Efficient Mining for Blockchains
TLDR
Blockchains show promise as potential infrastructure for financial transaction systems. Expand
  • 70
  • 15
  • PDF
Decentralization in Bitcoin and Ethereum Networks
TLDR
We present a measurement study on various decentralization metrics of two of the leading cryptocurrencies with the largest market capitalization and user base, Bitcoin and Ethereum. Expand
  • 159
  • 13
  • PDF
The Gap Game
TLDR
We analyze the incentives and equilibrium of blockchain-based PoW systems, taking into account all elements of expenses and rewards. Expand
  • 50
  • 5
  • PDF
Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities
  • Ittay Eyal
  • Computer Science
  • Computer
  • 22 September 2017
TLDR
The financial technology (FinTech) sector sees high potential value in cryptocurrency blockchain protocols, or distributed-ledger technology (DLT). Expand
  • 97
  • 4
  • PDF
Robust data sharing with key-value stores
TLDR
We present an efficient wait-free algorithm that emulates multi-reader multi-writer storage from a set of potentially faulty KVS replicas in an asynchronous environment. Expand
  • 49
  • 4
  • PDF