{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:BDPGGKAPVDPDSR2RZOZ2JHERZN","short_pith_number":"pith:BDPGGKAP","canonical_record":{"source":{"id":"1612.09426","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-12-30T09:08:10Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"b4021eacba4e5717c3a63c7c02dede8b9e523751d1cf3417e6a41fadfd6b778d","abstract_canon_sha256":"6776b4379a91992bcf4dc53121961f9e69df2ba30cc28cac9ae0c044e83dd934"},"schema_version":"1.0"},"canonical_sha256":"08de63280fa8de394751cbb3a49c91cb4dfca3ffc39a60dc82e8e503f2877259","source":{"kind":"arxiv","id":"1612.09426","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1612.09426","created_at":"2026-05-18T00:53:41Z"},{"alias_kind":"arxiv_version","alias_value":"1612.09426v1","created_at":"2026-05-18T00:53:41Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1612.09426","created_at":"2026-05-18T00:53:41Z"},{"alias_kind":"pith_short_12","alias_value":"BDPGGKAPVDPD","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"BDPGGKAPVDPDSR2R","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"BDPGGKAP","created_at":"2026-05-18T12:30:07Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:BDPGGKAPVDPDSR2RZOZ2JHERZN","target":"record","payload":{"canonical_record":{"source":{"id":"1612.09426","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-12-30T09:08:10Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"b4021eacba4e5717c3a63c7c02dede8b9e523751d1cf3417e6a41fadfd6b778d","abstract_canon_sha256":"6776b4379a91992bcf4dc53121961f9e69df2ba30cc28cac9ae0c044e83dd934"},"schema_version":"1.0"},"canonical_sha256":"08de63280fa8de394751cbb3a49c91cb4dfca3ffc39a60dc82e8e503f2877259","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:53:41.545650Z","signature_b64":"wNkEMOuZS3ttqFlweXZFNO4h7KUy3h02q5aTws9lDC3ZUB9KlDxNMY9954bUrTldRMNNgYWvMnVHxH3Q9CMBAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"08de63280fa8de394751cbb3a49c91cb4dfca3ffc39a60dc82e8e503f2877259","last_reissued_at":"2026-05-18T00:53:41.545259Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:53:41.545259Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1612.09426","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:53:41Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xl1ibiVl2tbwF9PjO3sO24jzb9JZlIg8IbiS1C+zrYcRz15SsoqmwHU3F1RDcYMSJyz8OTmBtP3tGuQp3V1SBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:26:06.920083Z"},"content_sha256":"1b8bcee9bf8b50e1bda7859d515344b34d54c1eb8114a88c1fa43db58257d321","schema_version":"1.0","event_id":"sha256:1b8bcee9bf8b50e1bda7859d515344b34d54c1eb8114a88c1fa43db58257d321"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:BDPGGKAPVDPDSR2RZOZ2JHERZN","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Christopher Natoli, Vincent Gramoli","submitted_at":"2016-12-30T09:08:10Z","abstract_excerpt":"In this paper, we identify a new form of attack, called the Balance attack, against proof-of-work blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability.\n  We quantify our probabilistic analysis with statistics taken from the R3 consortium, and show that a single machine needs 20 minutes to attack the consortium. Finally, w"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1612.09426","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:53:41Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hTlTv3AWdq2GUvukhTAvMK73cP+gAfRs91ujx+MdmEh+g48Vhl2f9BJFgiwpRJOZSQGIEi3wJVZu5fzb00DMCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T20:26:06.920457Z"},"content_sha256":"a3bdc76603cd48041fc49ed50629aa4aac43eba282987d1eb56801470c352bcb","schema_version":"1.0","event_id":"sha256:a3bdc76603cd48041fc49ed50629aa4aac43eba282987d1eb56801470c352bcb"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/bundle.json","state_url":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T20:26:06Z","links":{"resolver":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN","bundle":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/bundle.json","state":"https://pith.science/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/state.json","well_known_bundle":"https://pith.science/.well-known/pith/BDPGGKAPVDPDSR2RZOZ2JHERZN/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:BDPGGKAPVDPDSR2RZOZ2JHERZN","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"6776b4379a91992bcf4dc53121961f9e69df2ba30cc28cac9ae0c044e83dd934","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-12-30T09:08:10Z","title_canon_sha256":"b4021eacba4e5717c3a63c7c02dede8b9e523751d1cf3417e6a41fadfd6b778d"},"schema_version":"1.0","source":{"id":"1612.09426","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1612.09426","created_at":"2026-05-18T00:53:41Z"},{"alias_kind":"arxiv_version","alias_value":"1612.09426v1","created_at":"2026-05-18T00:53:41Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1612.09426","created_at":"2026-05-18T00:53:41Z"},{"alias_kind":"pith_short_12","alias_value":"BDPGGKAPVDPD","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_16","alias_value":"BDPGGKAPVDPDSR2R","created_at":"2026-05-18T12:30:07Z"},{"alias_kind":"pith_short_8","alias_value":"BDPGGKAP","created_at":"2026-05-18T12:30:07Z"}],"graph_snapshots":[{"event_id":"sha256:a3bdc76603cd48041fc49ed50629aa4aac43eba282987d1eb56801470c352bcb","target":"graph","created_at":"2026-05-18T00:53:41Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, we identify a new form of attack, called the Balance attack, against proof-of-work blockchain systems. The novelty of this attack consists of delaying network communications between multiple subgroups of nodes with balanced mining power. Our theoretical analysis captures the precise tradeoff between the network delay and the mining power of the attacker needed to double spend in Ethereum with high probability.\n  We quantify our probabilistic analysis with statistics taken from the R3 consortium, and show that a single machine needs 20 minutes to attack the consortium. Finally, w","authors_text":"Christopher Natoli, Vincent Gramoli","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-12-30T09:08:10Z","title":"The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1612.09426","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:1b8bcee9bf8b50e1bda7859d515344b34d54c1eb8114a88c1fa43db58257d321","target":"record","created_at":"2026-05-18T00:53:41Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"6776b4379a91992bcf4dc53121961f9e69df2ba30cc28cac9ae0c044e83dd934","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2016-12-30T09:08:10Z","title_canon_sha256":"b4021eacba4e5717c3a63c7c02dede8b9e523751d1cf3417e6a41fadfd6b778d"},"schema_version":"1.0","source":{"id":"1612.09426","kind":"arxiv","version":1}},"canonical_sha256":"08de63280fa8de394751cbb3a49c91cb4dfca3ffc39a60dc82e8e503f2877259","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"08de63280fa8de394751cbb3a49c91cb4dfca3ffc39a60dc82e8e503f2877259","first_computed_at":"2026-05-18T00:53:41.545259Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:53:41.545259Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"wNkEMOuZS3ttqFlweXZFNO4h7KUy3h02q5aTws9lDC3ZUB9KlDxNMY9954bUrTldRMNNgYWvMnVHxH3Q9CMBAA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:53:41.545650Z","signed_message":"canonical_sha256_bytes"},"source_id":"1612.09426","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:1b8bcee9bf8b50e1bda7859d515344b34d54c1eb8114a88c1fa43db58257d321","sha256:a3bdc76603cd48041fc49ed50629aa4aac43eba282987d1eb56801470c352bcb"],"state_sha256":"1418b8f93d7e13542d12c992e9a219b176a4ed4bcc1b318d603a4147daee3e1b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"57icsmHtC50egem72Co4UMLl9CiDgb6PNSX6e5l30aKSesVWiLHifeTI+Z6P4AhQfbIofAmIYJi0hrmDaALLCQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T20:26:06.923010Z","bundle_sha256":"6db5f11f949eeb70c7e80f14d5aa47aaad96f3e077d519f169b3cd8efd4ffce3"}}