{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2016:BDPGGKAPVDPDSR2RZOZ2JHERZN","short_pith_number":"pith:BDPGGKAP","schema_version":"1.0","canonical_sha256":"08de63280fa8de394751cbb3a49c91cb4dfca3ffc39a60dc82e8e503f2877259","source":{"kind":"arxiv","id":"1612.09426","version":1},"attestation_state":"computed","paper":{"title":"The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Christopher Natoli, Vincent Gramoli","submitted_at":"2016-12-30T09:08:10Z","abstract_excerpt":"In this paper, we identify a new form of attack, called the Balance attack, against proof-of-work blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability.\n  We quantify our probabilistic analysis with statistics taken from the R3 consortium, and show that a single machine needs 20 minutes to attack the consortium. Finally, w"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1612.09426","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-12-30T09:08:10Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"b4021eacba4e5717c3a63c7c02dede8b9e523751d1cf3417e6a41fadfd6b778d","abstract_canon_sha256":"6776b4379a91992bcf4dc53121961f9e69df2ba30cc28cac9ae0c044e83dd934"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:53:41.545650Z","signature_b64":"wNkEMOuZS3ttqFlweXZFNO4h7KUy3h02q5aTws9lDC3ZUB9KlDxNMY9954bUrTldRMNNgYWvMnVHxH3Q9CMBAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"08de63280fa8de394751cbb3a49c91cb4dfca3ffc39a60dc82e8e503f2877259","last_reissued_at":"2026-05-18T00:53:41.545259Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:53:41.545259Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Christopher Natoli, Vincent Gramoli","submitted_at":"2016-12-30T09:08:10Z","abstract_excerpt":"In this paper, we identify a new form of attack, called the Balance attack, against proof-of-work blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability.\n  We quantify our probabilistic analysis with statistics taken from the R3 consortium, and show that a single machine needs 20 minutes to attack the consortium. Finally, w"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1612.09426","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1612.09426","created_at":"2026-05-18T00:53:41.545320+00:00"},{"alias_kind":"arxiv_version","alias_value":"1612.09426v1","created_at":"2026-05-18T00:53:41.545320+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1612.09426","created_at":"2026-05-18T00:53:41.545320+00:00"},{"alias_kind":"pith_short_12","alias_value":"BDPGGKAPVDPD","created_at":"2026-05-18T12:30:07.202191+00:00"},{"alias_kind":"pith_short_16","alias_value":"BDPGGKAPVDPDSR2R","created_at":"2026-05-18T12:30:07.202191+00:00"},{"alias_kind":"pith_short_8","alias_value":"BDPGGKAP","created_at":"2026-05-18T12:30:07.202191+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2601.09082","citing_title":"Rigorous and Generalized Proof of Security of Bitcoin Protocol with Bounded Network Delay","ref_index":3,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN","json":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN.json","graph_json":"https://pith.science/api/pith-number/BDPGGKAPVDPDSR2RZOZ2JHERZN/graph.json","events_json":"https://pith.science/api/pith-number/BDPGGKAPVDPDSR2RZOZ2JHERZN/events.json","paper":"https://pith.science/paper/BDPGGKAP"},"agent_actions":{"view_html":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN","download_json":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN.json","view_paper":"https://pith.science/paper/BDPGGKAP","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1612.09426&json=true","fetch_graph":"https://pith.science/api/pith-number/BDPGGKAPVDPDSR2RZOZ2JHERZN/graph.json","fetch_events":"https://pith.science/api/pith-number/BDPGGKAPVDPDSR2RZOZ2JHERZN/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/action/timestamp_anchor","attest_storage":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/action/storage_attestation","attest_author":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/action/author_attestation","sign_citation":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/action/citation_signature","submit_replication":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/action/replication_record"}},"created_at":"2026-05-18T00:53:41.545320+00:00","updated_at":"2026-05-18T00:53:41.545320+00:00"}