<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Incentive Compatibility In Consensus Protocols And DAOs: A Game-Theoretic Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Angelo Murano</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bruna Bruno</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vincenzo Vespri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Università degli Studi di Firenze</institution>
          ,
          <addr-line>Viale Morgagni, 67/a I-50134 Firenze</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Università degli Studi di Salerno</institution>
          ,
          <addr-line>Via Giovanni Paolo II, 132, 84084 Fisciano SA</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Università degli Studi di Salerno</institution>
          ,
          <addr-line>Via Giovanni Paolo II, 132, 84084 Fisciano SA</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>entities. These agents exhibit behaviour driven by their individual interests. Therefore, the consensus protocol must be designed to consider efective incentive compatibility constraints. The theoretical approach is based on the evaluation of incentive compatibility constraints for both honest and faulty nodes, according two diferent remuneration schemes. By extending the principles of incentive compatibility from non cryptocurrency blockchains to organizational structures modelled as DAOs, we explore how decentralized governance models can benefit from blockchain-based incentive mechanisms while addressing the inherent economic risks and legal challenges.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Non-cryptocurrency</kwd>
        <kwd>Incentives compatibility</kwd>
        <kwd>PBFT</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Blockchain technologies have received significant attention from economists, especially in the study of
non-fiat currencies and their impact on traditional monetary systems. Non-fiat currencies are those that
are not issued or regulated by a central government and lack physical backing like traditional currency.
Bitcoin [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] is an example of a decentralised cryptocurrency that operates on the blockchain. Unlike
traditional currencies, it is not issued or regulated by a central bank or government. The acceptance
and validity of the blockchain system depend on the network of users participating in it and their trust
in the security and integrity of the underlying technology.
      </p>
      <p>
        However, it is important to acknowledge that blockchain is a valuable technology with diferent
applications, exerting significant influence across various sectors including environment, education,
health, financial services, trading, utilities, manufacturing, as well as both private and public
administrations. Beyond its origins in cryptocurrency, blockchain technology ofers innovative solutions in
numerous fields, such as supply chain management, healthcare, and digital identity management. For
instance, in supply chain logistics, blockchain provides a transparent and tamper-proof record system
that enhances traceability and accountability, thereby reducing fraud and ensuring product authenticity
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In the healthcare sector, blockchain can secure and streamline the sharing of medical records,
improving patient outcomes and safeguarding data privacy [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Similarly, digital identity systems
based on blockchain technology can ofer a decentralized and secure platform for identity verification,
reducing identity theft and enhancing user control over personal information [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        Central to the success of these non-cryptocurrency applications are the incentive mechanisms that
encourage participation and ensure the integrity of the system. These mechanisms often involve
rewarding participants with tokens or digital assets for their contributions to the network, such as
validating transactions or providing storage space, which helps maintain the high-security standards
necessary for these applications. For example, in blockchain-based supply chains, participants including
suppliers and transporters may receive tokens as incentives for maintaining accurate and timely data
entries, which are crucial for the efectiveness and reliability of the supply chain [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. This form of
incentivization not only promotes system integrity but also fosters a cooperative environment where
all stakeholders are motivated to contribute positively.
      </p>
      <p>This study aims to explore blockchain technologies in-depth, including the integration of fundamental
blockchain features within economic theory and applications. It is important to note that applying an
economic perspective to the functioning and attributes of blockchain may provide valuable insights
to the extensive body of literature that has predominantly evolved within the realm of computer
science. It is important to recognise the unique approach of economics in addressing problems and in
choices making, which difers from the hypotheses and objectives typically used in computer science
investigations.</p>
      <p>Contribution of economic theory to computer science practice on blockchains is especially relevant
in the realm of some potential applications of blockchain technologies where free-riding or other
opportunistic behaviours may emerge. In the economic perspective, blockchain nodes are individuals,
whose behaviours and objectives must be considered.</p>
      <p>
        In contexts where blockchain is used outside of cryptocurrency - such as in digital supply chains, public
record management, or consensus models for collective decision-making - these issues become
particularly pronounced. Free-riding and opportunistic behaviors are crucial concerns in non-cryptocurrency
blockchain applications due to the decentralized nature and lack of a central authoritative entity which
in traditional systems often acts as a monitor or enforcer. For example, in a blockchain-based digital
supply chain, a participant may under-report sales to evade fees or engage in selective misreporting
to gain competitive advantages. Without the direct oversight typical in centralized systems, such
actions can undermine the integrity and trust upon which the blockchain operates. Real-world data
and theoretical analysis show that free riding can lead to significant ineficiencies and increase the cost
of maintaining blockchain systems, potentially making them economically unviable without proper
incentive mechanisms in place [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. Furthermore, other studies [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] demonstrate through simulations how
difering incentives can lead to varied degrees of participation and honesty among nodes, highlighting
the fragile balance required to sustain cooperative behaviour in blockchain networks.
      </p>
      <p>Agents often face complex and dynamic situations that involve rational, emotional, and social
elements. Economics takes a unique approach to problem-solving and decision-making, based on a
deep understanding of the behaviour, dynamics, and interactions among agents. In contrast, computer
science is primarily focused on system design, algorithm optimization, and information management.
The issues tackled in computer science are usually well-defined and structured, governed by clear
logic and rules. The primary goal is to ensure the eficiency and accuracy of technical solutions. The
integration of these perspectives is crucial in the development of blockchain solutions that are not only
technically robust but also economically sustainable.</p>
      <p>
        The traditional paradigm in distributed computation categorises agents as either ’good’ or ’bad’ [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
In this scenario, individuals who follow the prescribed protocol are considered ’good’, while those who
use any means necessary to disrupt it are considered ’bad’. Research has shown that the protocol is
successful when a given percentage of individuals take on the ’bad’ role, highlighting the binary nature
of traditional computational perspectives.
      </p>
      <p>
        To understand the ethical and security challenges presented by blockchain technology, it is useful
to analyse a case study that clearly demonstrates the complex relationship between technological
vulnerabilities, ethical concerns, and the involvement of malicious actors in shaping the development
of blockchain technology. In 2016, a hacker exploited a vulnerability in the code of the Decentralised
Autonomous Organisation (DAO) and transferred 3.6 million Ether, valued at approximately 50 million
dollars, into a personal account. The DAO was a pioneering initiative in blockchain-based governance,
aiming to democratise investment in Ethereum-based start-ups by enabling investors to allocate funds
to proposed projects using Ethers. The breach not only highlighted vulnerabilities within such platforms
but also sparked a controversial debate over the blockchain’s immutable nature and the ethical principle
of ’code is law’. The Ethereum community’s decision to rectify the theft through a network fork resulted
in significant fallout, including the emergence of Ethereum Classic and a revaluation of hard and
soft fork applications in the blockchain domain [25]. Further complicating the situation, the hacker
communicated directly with the Ethereum and DAO communities after the attack through an open letter.
The hacker defended the extraction of funds as legal under the jurisdiction’s laws, exploiting a loophole
in the DAO’s smart contract code. The hacker claimed that exploiting a systemic flaw was not a crime
and threatened legal action against any attempts to recover the stolen Ether. This increased tensions
within the community. In addition, the hacker’s eforts to sabotage soft fork proposals by ofering
significant bribes to Ethereum miners highlight the dificulties in implementing technical solutions
to ethical violations. This controversial exchange resulted in the abandonment of a soft fork due to
identified vulnerabilities, ultimately requiring a hard fork. The division of the Ethereum blockchain into
Ethereum (ETH) and Ethereum Classic (ETC) resolved the immediate crisis and sparked a significant
discussion on censorship resistance and the principle of blockchain immutability [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ].
      </p>
      <p>
        Other contributions draw attention to the contrasting methodologies employed in computer science
and economics within the context of blockchain technology [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In computer science and modern
cryptography, assumptions typically concern the actions of agents, which are categorized as either
honest or faulty nodes. Honest nodes consistently exhibit honest behaviour, while faulty nodes engage
in misconduct. In contrast, economists tend to make assumptions about primitives, such as agents’
utility functions, and subsequently analyse their strategic behaviours within equilibrium frameworks
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The expansive domain for economic exploration within blockchain technology becomes particularly
evident when addressing conditions of asymmetric information. In other studies it is emphasized the
substantial latitude available for manoeuvring within this nascent field of research [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Furthermore,
some works accentuate the disparity between computer science hypotheses and economic traditions
regarding individual behaviour [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The authors emphasise the contrast between the game-theoretic
approach, which assumes rationality among all players or processes, and the conventional computer
science approach. In the latter, some processes are deemed correct and expected to adhere to the
specified protocol, while others are designated as Byzantine, introducing a nuanced perspective on
individual behaviour [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        A practical example of this dynamic is Dogecoin, a cryptocurrency conceived purely ironically in 2013.
Contrary to the rational expectations of game theory, Dogecoin gained popularity and market value
despite its unconventional origin [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. From an economic perspective, the existence of cryptocurrencies
such as Dogecoin underlines how psychological and social factors can influence economic valuation.
This highlights that, in blockchain, economic valuation cannot completely disregard human behavioural
dynamics, adding a complex dimension to the relationship between information technology and
economics in this emerging field. The term ’Byzantine’ originates from the Byzantine generals’ problem
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], a theoretical framework that illustrates the complexity of coordinating distributed processes when
certain entities may disseminate erroneous information or exhibit malicious behaviour.
      </p>
      <p>In the context of blockchain and consensus protocols, it is crucial for nodes to adhere to the established
protocol to ensure network consistency and security. The use of the ’Byzantine’ concept recognises the
possibility of non-compliant actions by certain nodes. Therefore, it is necessary to develop consensus
algorithms that can handle such deviations in behaviour, ensuring the security and integrity of the
system, even in the presence of defective or malicious nodes.</p>
      <p>
        A specific investigation delves into numerous economic implications and challenges within the realm
of economic science [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, this discussion focuses mainly on the domain of cryptocurrency
blockchain. Therefore, it is necessary to conduct an extensive economic analysis of non-cryptocurrency
blockchain, which is highly relevant for economic applications. It is important to note that
noncryptocurrency blockchains difer significantly from their cryptocurrency counterparts in terms of
explicit monetary incentives. Given the relevance of non-cryptocurrency blockchain for economic
application, economic perspective of non-cryptocurrency blockchain must be investigated.
      </p>
      <p>
        Non-cryptocurrency applications of blockchain are often private blockchains, due to limitations
observed in public blockchains when applied to industrial use cases. It is important to note that public
blockchains exhibit constraints that prove detrimental to corporate and administrative applications [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Another research has highlighted that incentive-compatible mechanisms widely employed in existing
blockchain systems are not seamlessly applicable to non-cryptocurrency scenarios [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. This statement
highlights the need for consensus protocols in business applications that use non-cryptocurrency
blockchains. Though non-cryptocurrency blockchains are already employed in some business
applications, wider organizational structures with multiple agents interacting on the blockchain (e.g. in public
administration) may exhibit more occurrences of opportunistic behaviours to be prevented. Therefore, it
is necessary to investigate incentive-compatible mechanisms enforcing non crypto-currency consensus
protocols for suitable economic applications.
      </p>
      <p>
        Contribution of the paper is the analysis of diferent rewarding schemes ensuring the compatibility of
incentives for self-interest agents maximizing their utility functions. As also emphasised recently [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ],
to our best knowledge the work carried out to develop this approach is still limited. Paper is organized
as follows. The next Section presents a brief overview of economic literature investigating blockchain
technologies. The model description in following section, while the last Section summarizes concluding
remarks.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Overview on previous works</title>
      <p>In blockchain, incentivization mechanisms play a crucial role in motivating miners to participate in
validation processes, contributing significantly to the system’s overall maintenance. While efective in
cryptocurrency applications, extending existing blockchain systems to non-cryptocurrency domains
with distinct business models poses a significant challenge. The lack of efective incentives can be a
significant obstacle to the wider adoption of blockchain technology.</p>
      <p>
        An incentive compatibility mechanism characterizes a process where participants would not find
it advantageous to violate the rules of the process [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In the blockchain domain, it ensures that the
consensus protocol will induce validators to exhibit honest and cooperative behaviour, adhering to the
prescribed protocol rules and actively contributing to the overall security and stability of the network.
Incentives may be in economic form, such as cryptocurrency rewards or penalties for misconduct, or
in reputational form, encompassing trustworthiness scores or penalties for any deviations from the
prescribed behaviour.
      </p>
      <p>
        The main challenge is to create an incentive mechanism that can be easily adapted to
noncryptocurrency applications. The need for a compatible incentive mechanism becomes evident in
the context of non-cryptocurrency blockchain applications that employ ’Voting-based’ consensus
algorithms. Research in this domain is currently limited and mostly focused on incentive mechanism
design for cryptocurrency applications that use ’Proof-based’ consensus algorithms [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>
        It is essential to point out that the ‘Voting-based’ consensus algorithms are used also in cryptocurrency
permissionless blockchains, where probabilistic consensus can be achieved due to the large numbers of
not identified nodes. In this framework, fast probabilistic consensus protocols [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] may reduce the
high communication costs associated to voting mechanisms at a large scale, without incurring in PoW
energy costs [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
      </p>
      <p>It is important to note that studies on incentive compatibility for Proof-of-Work (POW) are not
applicable to PBFT-based blockchains due to the inherent disparity between ’Proof-based’ and
’Votingbased’ consensus algorithms. Bridging this gap is essential for the successful integration of blockchain
technology into non-cryptocurrency applications.</p>
      <p>
        To tackle the issue of creating digital identities on a blockchain and implementing an anonymous
voting system to prevent the creation of fictitious digital identities, an approach is needed where the
blockchain is used as an immutable ledger to securely store digital identities [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. In this context,
smart contracts should define rules and conditions related to digital identities. For example, they could
establish the requirement for verification by a central authority to create or update an identity [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        To ensure anonymity in the voting system, cryptographic techniques such as zero-knowledge proofs
and homomorphic encryption voting systems can be implemented. These techniques allow participants
to prove they possess a certain piece of information without revealing it. The proposed zero-knowledge
proofs and homomorphic encryption voting system ensures integrity, confidentiality, and authenticity
of votes while preserving voter anonymity [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. Smart contracts manage the voting process and record
each vote on the blockchain. Cryptography ensures the anonymity of votes, while smart contracts
verify their validity.
      </p>
      <p>
        To prevent the creation of fictitious digital identities, identity validation is performed before voting
through ofline verification procedures or interactions with certification authorities. Anti-Sybil
mechanisms can be implemented that require approval by existing members before assigning an identity [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ].
In addition, smart contracts define approval rules for adding new identities to the registry, requiring
the consent of the majority of authorised actors [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ].
      </p>
      <p>
        Despite the shift in consensus algorithms from ’Proof-based’ to ’Voting-based’, concerns about
incentive compatibility remain, particularly in PBFT-based consensus algorithms. Free riders within
peer-to-peer networks exploit benefits to the detriment of honest actors [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Therefore, it is necessary to
have robust mechanisms that can identify and penalise instances of free-riding behaviour. Our proposed
approach, based on an economic framework, examines the complex study of participant interactions
and strategic behaviours. The establishment of robust and eficient consensus mechanisms, critical
for the optimal functioning of blockchain systems, relies heavily on the behaviour of participating
entities [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. However, in distributed systems, especially in open and permissionless settings, it is
impractical to assume consistent proactive and honest behaviour from every participant. Therefore, the
integration of incentives plays a crucial role in attracting participants and motivating them to adhere to
desired behaviours. However, incompatible incentive mechanisms have been identified as a source of
compromise to honesty, leading to significant security vulnerabilities.
      </p>
      <p>
        Acknowledging the rational and self-interested nature of participants, the design of incentive
mechanisms rooted in game theory proves indispensable in addressing these challenges [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]. The eficacy
of such mechanisms in blockchain systems hinges on the ability to attract a substantial number of
participants and motivate them to act proactively. Some studies underscore the positive impact of game
theory-based incentives in enhancing the overall efectiveness of blockchain systems [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]. Although
game theory has made significant contributions to incentive mechanism design in blockchain systems,
limited eforts have been directed towards applying it to PBFT consensus algorithms.
      </p>
      <p>
        Several studies have analysed the compatibility problems that arise in blockchain systems based
on Practical Byzantine Fault Tolerance (PBFT), particularly regarding incentive mechanisms. One
notable endeavour, the SmartCast system [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], has systematically scrutinized compatibility challenges
through the introduction of an of-chain incentive mechanism. However, this solution’s eficacy
becomes impractical when applied to applications functioning within a public peer-to-peer network.
This is particularly exemplified by certain Internet of Things (IoT) applications [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. In a distinct
proposal, Solidus [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], attempts to address incentive compatibility by presenting a consensus algorithm
meticulously designed for Proof-of-Work (POW)-based PBFT. However, it still relies on Proof of Work
(POW) for selecting proposers, limiting its use to cryptocurrency contexts rather than a wider range
of non-cryptocurrency applications. An alternative scholarly work (Wei et al, 2020) undertakes a
game theory-based analysis with a principal focus on the incentive structure of the business model.
Unfortunately, this study does not provide a detailed analysis of the complex dynamics involved in
maintaining the blockchain network. It focuses mainly on incentives related to business considerations.
Concurrently, eforts have been made to enhance Practical Byzantine Fault Tolerance (PBFT) consensus
algorithms by incorporating reputation-based methods [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Although these algorithms significantly
contribute to enhancing the PBFT consensus mechanism, their primary objective is to formulate eficient
selection methods rather than directly addressing the challenges associated with incentive compatibility
intrinsic to PBFT-based blockchain architectures. The need for comprehensive solutions that address
both consensus eficiency and incentive compatibility remains a significant concern in the developing
ifeld of blockchain research.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Model</title>
      <p>
        A fundamental process in blockchain functioning is the broadcast process, implying a problem
concerning asymmetric information, because nodes have private information on the content of the message they
receive. The message content may be a dichotomous variable, as in the retrieve/attack message of the
Byzantine problem [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In a non-crypto blockchain used for certification purposes (e.g. competencies,
property rights, characteristics of individuals or things), the dichotomous choice may be a true/false
alternative. Consequently, a faulty or malicious node may have incentives in wrong certifications,
namely in certificating features that are not true by broadcasting a message diferent from the one
received. A self-interested validator may adopt opportunist behaviours, intentionally fraudulent. An
honest node broadcasts the same message received. Utility functions for honest and malicious nodes
may be diferent, and the incentive compatibility constraints for each type of node should be verified.
      </p>
      <p>
        To comprehend and enhance the incentive mechanisms in such a system, an understanding of game
theory is indispensable. The concept of Nash equilibrium, where each player, recognizing the strategies
of others, has no incentive to unilaterally change their strategy, can be crucial in designing systems
where honest behaviour is maintained [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Furthermore, incorporating dominant strategies, which
are advantageous regardless of others’ actions, can ensure that maintaining honesty becomes the
most beneficial course of action for all nodes. By aligning these utility functions with game theory
principles such as Nash equilibrium and dominant strategies, blockchain systems can be designed to be
robust against dishonest behaviours and ensure a more secure and trustworthy environment for all
participants.
      </p>
      <p>Consider a non-crypto currency blockchain with n=3k+1 validators, including faulty/malicious
validators who are interested in blockchain malfunctioning and/or wrong certifications. In a PBFT
protocol the block is accepted if at least 2k+1 validators agree on the block acceptance. The agreement
of each validator i is expressed through a vi vote (i=1,..,n), which can take two values:
Therefore, the final decision on the block can be summarized as follows:
 =
{︃1 if the validator agree,</p>
      <p>0 if the validator does not agree.</p>
      <p>If ∑︁  &gt;
=1</p>
      <p>If ∑︁  ≤
=1
{︃1 if the content is true</p>
      <p>0 if the content is false
{︃1 if the message reaches the consensus</p>
      <p>0 if the message does not reach the consensus</p>
      <p>Furthermore, we assume that a reputation grade  &gt; 0, or another kind of non-monetary reward, is
associated with the voting (consensus) process.</p>
      <p>Finally, we assume that the validators have the capability to access the data encapsulated within the
blocks, although they cannot comprehend or interpret the contents. From the validator’s perspective,
the data housed within the block is simply construed as uncomplicated sequences of bits, even singular
bits. The validator’s role is emphasised as impartial through this abstraction, with a focus on the binary
nature of the data rather than its semantic interpretation.</p>
      <p>The following behavioral hypotheses are adopted:
H1: Validators can read the message content as either true or false.</p>
      <p>H2: Honest validators receive positive satisfaction from the acceptance of true blocks and the
rejection of false blocks (with the same satisfaction gain). Faulty validators receive positive satisfaction
from the acceptance of false blocks and the rejection of true blocks (with the same satisfaction gain).</p>
      <p>H3: Honest and faulty validators receive positive satisfaction for positive .</p>
      <p>With these basic elements of the blockchain, we can describe the utility functions of the faulty ( )
and honest () validators as , =  (, ) as follows:</p>
      <p>⎧
 ⎨⎪&gt; 0 if  =
′ = 
⎪⎩= 0 otherwise
{︃(1, 1) a true message is accepted</p>
      <p>(0, 0) a false message is rejected
′ =</p>
      <p>⎧
 ⎨⎪&gt; 0 if  =
 ⎪⎩= 0 otherwise
{︃(1, 0) a true message is accepted</p>
      <p>(0, 1) a false message is rejected</p>
      <p>In other words, these utility functions imply that the honest validator receive positive satisfaction
from the acceptance of a true block or the rejection of a false block, whereas the faulty validator
pursue the objective of false blocks accepted and true blocks rejected (H2). Note that the derivatives
are independent from the vote expressed by the validators. As to the reputation grade, both types of
validators have increasing utility from the reward (H3).</p>
      <p>′ =  &gt; 0
 ′ =  &gt; 0 (6)</p>
      <p>The remuneration scheme is fundamental in a mechanism design. Two diferent remuneration
schemes will be analysed, considering alternatively the payofs for all types of validators at the end of
the consensus process (final payofs), or in the while the consensus process is still running (expected
payofs), that is when the y value is still unknown. The final payofs are described in a strategic form, the
matrix representation of a simultaneous (two players) non cooperative game, with the validator as row
player and the State of Nature as column player, who selects the message proposed to validator. Payofs
are quantified only for the row player (the validator). Validator has two available actions/strategies
when receiving the message, corresponding to the values (1,0) chosen for the vote expressed with vi.
For each strategy, resulting payofs are reported according to the diferent States of Nature.
(3)
(4)
(5)</p>
      <p>Scheme A: the validator receives a positive  if the block is accepted, and the vote is  = 1.
No reward is provided for the ’no agreement’ vote.</p>
      <sec id="sec-3-1">
        <title>Final payofs – Scheme A</title>
        <p>Nevertheless, when validators give their vote, they know if the message content is true or false,
but they do not know if the message will be added to the block or not. They may have an expected
result , based on the PBFT hypothesis on faulty/honest nodes. If all faulty nodes vote 0 to true blocks
and 1 to false block, whereas honest nodes do the opposite, the probability of each type of block to be
accepted/rejected are:</p>
        <p>If they can recognize the true/false feature of the block, they can evaluate the expected payofs as
follows. Let’s consider first the expected values for honest nodes ( ) when facing true blocks.
{︃( 23  + 1)(′ + ′) if  = 1
( 23  + 1 − 1)′</p>
        <p>From the above descriptions it easy to verify that  = 1 is a dominant strategy for an honest node
facing true blocks. When coming at false blocks, the expected values are as follows.
{︃( 23  + 1 − 1)′ + ( 13  − 1 + 1)′
Here, one would expect that  = 0 is a dominant strategy, but this is true only if
 ′ &gt; 1
 ′ 3

(7)
(8)
(9)
(10)
(11)</p>
        <p>Consequently, the false block rejection will depend on the specific form of the utility function (the
validator preferences for honest behaviours and reward) and on the blockchain dimension n.</p>
        <p>When coming at the expected values for faulty nodes ( ), for true blocks it would be:
 (1, ) =</p>
        <p>( 13  − 1)′ 
{︃( 32  + 1 + 1)′  + ( 13  − 1 − 1)′ 
Whereas for false blocks, the faulty node has a dominant strategy in  = 1
{︃( 13  − 1)(′  + ′ ) if  = 1
( 13  − 1 − 1)′</p>
        <p>The results for the scheme put in evidence that for honest nodes facing true blocks the agreement
strategy is always dominant, but the rejection of false blocks is conditioned. Vice versa, faulty nodes will
always agree on false blocks, but the rejection of true blocks is conditioned. In this scheme more likely
could happen that both true and false blocks will be accepted, compared with the previous scheme.</p>
        <p>Scheme B: the validator receives a positive wi when the block is accepted and the vote is
vi=1; a positive wi is also received when the block is rejected, and the vote is vi=0.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Final payofs – Scheme B</title>
        <p>It easy to verify that  = 1 is a dominant strategy for an honest node facing true blocks. When
coming at false blocks, the expected values are as follows.
{︃( 23  + 1)(′ + ′)
( 23  + 1 − 1)′ + ( 13  − 1 + 1)′ if  = 0
{︃( 23  + 1 − 1)′ + ( 13  − 1 + 1)′ if  = 1
( 23  + 1)(′ + ′) if  = 0
(12)
(13)
(14)
(15)
(16)
 ′  &gt; 1
 ′  3</p>
        <p>+ 3
 ′  &gt; 1
 ′  3
 + 3</p>
        <p>It easy to verify that  = 0 is a dominant strategy for an honest node facing false blocks. When
coming at the expected values for faulty nodes ( ), for true blocks it would be:
{︃( 32  + 1 − 1)′  + ( 13  − 1 − 1)′</p>
        <p>Whereas for false blocks, the faulty node has a dominant strategy in vi=1, if the same conditions as
above holds.</p>
        <p>(0, ) =
{︃( 13  − 1)(′  + ′ )
( 13  − 1 − 1)′  + ( 23  + 1 + 1)′</p>
        <p>If the remuneration scheme award both positive votes for accepted blocks and negative votes for
rejected blocks, the honest validators are always incentivized to behave correctly, by agreeing on true
blocks and rejecting the false ones. On the other hand, the faulty nodes will be incentivized to behave
maliciously only if their motivation is strong enough, that is if
(17)
(18)
(19)
(20)</p>
        <p>The above discussion shows that the remuneration scheme A is not incentive compatible for honest
nodes, who will prefer to accept also false blocks, also when considering expected payofs. The false
block rejection will depend on the validator’s preferences and on the blockchain dimension. Conversely,
the second scheme (B) is incentive compatible for honest nodes, who have a dominant strategy in
accepting true blocks and rejecting false blocks. Faulty nodes will always agree on false block acceptance,
whereas the rejection of true blocks is conditioned.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Concluding remarks</title>
      <p>This paper starts from the idea that, to widely employ non-cryptocurrency permissioned blockchain in
business and organizational applications, it is important to consider that nodes are not abstract entities,
but economic agents who behave pursuing their own interests.</p>
      <p>With this perspective, the consensus protocol must be designed considering efective incentive
compatibility constraints, at least for those currently defined as honest nodes. The proposed analysis
of individual behaviour is based on two diferent types of agents, with diferent objective function. It
compares two diferent remuneration schemes, showing that the design of mechanisms may be relevant
for addressing individual choices toward protocol integrity and secure network environment.</p>
      <p>The model we consider for incentive compatibility constraints is inherently static, as the
decisionmaking of each validator is contingent solely upon its conduct within the current round, without regard
to its past performance or prevailing network conditions. Such a static approach may entail potential
ineficiencies and vulnerabilities within the system. Transitioning from a static to a dynamic model
necessitates several adjustments to accommodate the evolving dynamics of validator participation,
potentially fortifying the consensus system within the framework of voting-based blockchains. The
dynamic model permits the system to adapt to changing conditions or alterations in validator engagement,
thereby enhancing the system’s resilience and adaptability.</p>
      <p>Within the dynamic model, the reputation of validators becomes subject to fluctuations over time
based on their actions and performance. Active participation, consistent voting patterns, and
constructive contributions to consensus can lead to an augmentation of a validator’s reputation. Conversely,
unethical behaviour, erratic voting, or inadequate participation may result in a deterioration of
reputation. Dynamic reputation is contingent upon metrics such as voting consistency, adherence to
consensus commitments, and overall participation. This framework creates incentives for validators to
cultivate a positive, enduring reputation, fostering trust within the network.</p>
      <p>Furthermore, the dynamic model takes into consideration the interactions among validators during
various consensus phases. For instance, a validator altering its vote during the preparation phase
without a valid justification might incur a reputation penalty. Interactions among validators can shape
the interpretation of votes and decisions during the consensus process.</p>
      <p>Should the incentive compatibility constraints model evolve into a dynamic framework, mechanisms
could be implemented to assess the trustworthiness of each validator based on historical behaviour,
network participation, quality of service, reputation, and other relevant factors. This augmentation
could bolster the security and eficiency of the protocol, rendering it more resistant to potential attacks
and scalable. The dynamic model, by incorporating the evolution of validators’ actions and decisions
over time, introduces a temporal and adaptive component into the consensus system. Time assumes
a pivotal role in this model, as past and present actions of validators influence their reputation and,
consequently, their future rewards, thereby encouraging consistent and reliable conduct over time.</p>
      <p>
        Situations characterized by a framework akin to the one recently delineated find representation in
game theory through repeated games [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. However, despite existing literature applying game theory to
blockchain, none of these works delve into the interaction among validators using an infinitely repeated
game theoretical approach to address the issue. Infinitely repeated games provide insights into the
structure of individual behaviour when interacting repeatedly, as the outcomes of prior interactions
influence their future behaviours. Such games contribute to reinforcing cooperative behaviour [10]. In
this form of interaction, players strive to optimize rewards in both the short and long term.
      </p>
      <p>
        Within an infinitely repeated prisoner’s dilemma, the "grim trigger strategy" has been identified as
a mechanism to encourage cooperation among players [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ][
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In a grim strategy, a player initiates
cooperation (playing honestly) and continues to cooperate unless the other player deviates (acting
maliciously) at a certain point. This could potentially represent a future evolution within the context
of our work, as a player must commence with cooperation and persist in cooperation to build their
reputation.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Abeyratne</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Monfared</surname>
          </string-name>
          , “
          <article-title>Blockchain ready manufacturing supply chain using distributed ledger</article-title>
          ,”
          <source>International journal of research in engineering and technology</source>
          , vol.
          <volume>5</volume>
          , no.
          <issue>9</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>I.</given-names>
            <surname>Abraham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Dolev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gonen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Halpern</surname>
          </string-name>
          , “
          <article-title>Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation,” in Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing</article-title>
          ,
          <year>2006</year>
          , pp.
          <fpage>53</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Abraham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Malkhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Nayak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Spiegelman</surname>
          </string-name>
          , “
          <article-title>Solida: A blockchain protocol based on reconfigurable byzantine consensus</article-title>
          ,
          <source>” arXiv preprint arXiv:1612.02916</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Amoussou-Guenou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Biais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potop-Butucaru</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Tucci-Piergiovanni</surname>
          </string-name>
          , “
          <article-title>Committee-based blockchains as games between opportunistic players and adversaries,” The Review of Financial Studies</article-title>
          , vol.
          <volume>37</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>409</fpage>
          -
          <lpage>443</lpage>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ante</surname>
          </string-name>
          , “
          <article-title>A place next to satoshi: Foundations of blockchain and cryptocurrency research in business and economics</article-title>
          ,” Scientometrics, vol.
          <volume>124</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1305</fpage>
          -
          <lpage>1333</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Axelrod</surname>
          </string-name>
          and
          <string-name>
            <given-names>W. D.</given-names>
            <surname>Hamilton</surname>
          </string-name>
          , “
          <article-title>The evolution of cooperation,” science</article-title>
          , vol.
          <volume>211</volume>
          , no.
          <issue>4489</issue>
          , pp.
          <fpage>1390</fpage>
          -
          <lpage>1396</lpage>
          ,
          <year>1981</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bissias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Ozisik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. N.</given-names>
            <surname>Levine</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Liberatore</surname>
          </string-name>
          , “
          <article-title>Sybil-resistant mixing for bitcoin,”</article-title>
          <source>in Proceedings of the 13th Workshop on Privacy in the Electronic Society</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>158</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. W.</given-names>
            <surname>Cong</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiao</surname>
          </string-name>
          , “
          <article-title>A brief introduction to blockchain economics,” in Information for Eficient Decision Making: Big Data, Blockchain</article-title>
          and Relevance , World Scientific,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9] [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Dib</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-L. Brousmiche</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Durand</surname>
            , E. Thea, and
            <given-names>E. B.</given-names>
          </string-name>
          <string-name>
            <surname>Hamida</surname>
          </string-name>
          , “
          <article-title>Consortium blockchains: Overview, applications</article-title>
          and challenges,
          <source>” Int. J. Adv. Telecommun</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>64</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>WW</given-names>
            <surname>Norton</surname>
          </string-name>
          &amp; Company,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Eatwell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Milgate</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Newman</surname>
          </string-name>
          , Allocation, information and markets. Springer,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Engelhardt</surname>
          </string-name>
          , “
          <article-title>Hitching healthcare to the chain: An introduction to blockchain technology in the healthcare sector</article-title>
          ,
          <source>” Technology Innovation Management Review</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>10</issue>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>C.-P. Fan</surname>
          </string-name>
          , “
          <article-title>Teaching children cooperation-an application of experimental game theory</article-title>
          ,
          <source>” Journal of Economic Behavior &amp; Organization</source>
          , vol.
          <volume>41</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>209</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>K.</given-names>
            <surname>Gilani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ghafari</surname>
          </string-name>
          , E. Bertin, and
          <string-name>
            <given-names>N.</given-names>
            <surname>Crespi</surname>
          </string-name>
          , “
          <article-title>Self-sovereign identity management framework using smart contracts,” in NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium</article-title>
          , IEEE,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jøsang</surname>
          </string-name>
          , “
          <article-title>Identity management and trusted interaction in internet and mobile computing,” IET Information Security</article-title>
          , vol.
          <volume>8</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>79</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Kamvar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Schlosser</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Garcia-Molina</surname>
          </string-name>
          , “
          <article-title>Incentives for combatting freeriding on p2p networks,” in Euro-Par 2003</article-title>
          <source>Parallel Processing: 9th International Euro-Par Conference Klagenfurt, Austria, August 26-29</source>
          ,
          <year>2003</year>
          Proceedings 9, Springer,
          <year>2003</year>
          , pp.
          <fpage>1273</fpage>
          -
          <lpage>1279</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Korpela</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hallikas</surname>
          </string-name>
          , and T. Dahlberg, “
          <article-title>Digital supply chain transformation toward blockchain integration</article-title>
          ,”
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kothapalli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and N.</given-names>
            <surname>Borisov</surname>
          </string-name>
          , “
          <article-title>Smartcast: An incentive compatible consensus protocol using smart contracts,” in Financial Cryptography and Data Security: FC 2017 International Workshops</article-title>
          ,
          <string-name>
            <surname>WAHC</surname>
          </string-name>
          , BITCOIN, VOTING, WTSC, and
          <string-name>
            <surname>TA</surname>
          </string-name>
          , Sliema, Malta, April 7,
          <year>2017</year>
          ,
          <source>Revised Selected Papers 21</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>536</fpage>
          -
          <lpage>552</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Goyal</surname>
          </string-name>
          , “
          <article-title>Administration of digital identities using blockchain,”</article-title>
          <source>in 2022 5th International Conference on Contemporary Computing and Informatics (IC3I)</source>
          , IEEE,
          <year>2022</year>
          , pp.
          <fpage>2179</fpage>
          -
          <lpage>2183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>L.</given-names>
            <surname>Lamport</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shostak</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Pease</surname>
          </string-name>
          , “
          <article-title>The byzantine generals problem,” in Concurrency: the works of leslie lamport</article-title>
          ,
          <year>2019</year>
          , pp.
          <fpage>203</fpage>
          -
          <lpage>226</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>L.</given-names>
            <surname>Lao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Xiao</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Guo</surname>
          </string-name>
          , “
          <article-title>G-pbft: A location-based and scalable consensus protocol for iot-blockchain applications,” in 2020 IEEE international parallel and distributed processing symposium (IPDPS)</article-title>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>664</fpage>
          -
          <lpage>673</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , L. Xu, and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qi</surname>
          </string-name>
          , “
          <article-title>Reputation-based byzantine fault-tolerance for consortium blockchain,” in 2018 IEEE 24th international conference on parallel and distributed systems (ICPADS)</article-title>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>604</fpage>
          -
          <lpage>611</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>T.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          , et al., “
          <article-title>Rational protocols and attacks in blockchain system,” Security and Communication Networks</article-title>
          , vol.
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24] [25]
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cao</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Bai</surname>
          </string-name>
          , “
          <article-title>Game theory based compatible incentive mechanism design for non-cryptocurrency blockchain systems</article-title>
          ,
          <source>” Journal of Industrial Information Integration</source>
          , vol.
          <volume>31</volume>
          , p.
          <fpage>100</fpage>
          <lpage>426</lpage>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Mehar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. L.</given-names>
            <surname>Shier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Giambattista</surname>
          </string-name>
          , et al., “
          <article-title>Understanding a revolutionary and flawed grand experiment in blockchain: The dao attack</article-title>
          ,
          <source>” Journal of Cases on Information Technology (JCIT)</source>
          , vol.
          <volume>21</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>32</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Miao</surname>
          </string-name>
          , “
          <article-title>Secure and privacy-preserving voting system using zero-knowledge proofs</article-title>
          ,
          <source>” Applied and Computational Engineering</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>328</fpage>
          -
          <lpage>333</lpage>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .54254/
          <fpage>2755</fpage>
          -2721/8/20230181.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mitra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cortesi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Chaki</surname>
          </string-name>
          , “
          <article-title>A two-hop neighborhood based berserk detection algorithm for probabilistic model of consensus in distributed ledger systems</article-title>
          ,” in
          <source>International Conference on Computational Collective Intelligence</source>
          , Springer,
          <year>2023</year>
          , pp.
          <fpage>379</fpage>
          -
          <lpage>391</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nakamoto</surname>
          </string-name>
          , “
          <article-title>Bitcoin: A peer-to-peer electronic cash system,” Decentralized business review</article-title>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Nash</surname>
          </string-name>
          et al.,
          <string-name>
            <surname>“</surname>
          </string-name>
          Non-cooperative games,”
          <year>1950</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pazaitis</surname>
          </string-name>
          , P. De Filippi, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Kostakis</surname>
          </string-name>
          , “
          <article-title>Blockchain and value systems in the sharing economy: The illustrative case of backfeed,” Technological Forecasting and Social Change</article-title>
          , vol.
          <volume>125</volume>
          , pp.
          <fpage>105</fpage>
          -
          <lpage>115</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Platt</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>McBurney</surname>
          </string-name>
          , “
          <article-title>Sybil in the haystack: A comprehensive review of blockchain consensus mechanisms in search of strong sybil attack resistance,” Algorithms</article-title>
          , vol.
          <volume>16</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>34</fpage>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Popov</surname>
          </string-name>
          and
          <string-name>
            <given-names>W. J.</given-names>
            <surname>Buchanan</surname>
          </string-name>
          , “
          <article-title>Fpc-bi: Fast probabilistic consensus within byzantine infrastructures</article-title>
          ,
          <source>” Journal of Parallel and Distributed Computing</source>
          , vol.
          <volume>147</volume>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>86</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>S.</given-names>
            <surname>Popov</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Müller</surname>
          </string-name>
          , “
          <article-title>Voting-based probabilistic consensuses and their applications in distributed ledgers</article-title>
          ,
          <source>” Annals of Telecommunications</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Rahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Indrakusuma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Widodo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Nuryadin</surname>
          </string-name>
          , “
          <article-title>Dogecoin price volatility after economic recovery on covid-19 pandemic</article-title>
          ,”
          <source>International Journal of Advanced Economics</source>
          , vol.
          <volume>5</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>137</lpage>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shermin</surname>
          </string-name>
          , “
          <article-title>Disrupting governance with blockchains and smart contracts,” Strategic change</article-title>
          , vol.
          <volume>26</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>499</fpage>
          -
          <lpage>509</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          , “
          <article-title>Attacks and countermeasures on blockchains: A survey from layering perspective,” Computer Networks</article-title>
          , vol.
          <volume>191</volume>
          , p.
          <fpage>107</fpage>
          <lpage>978</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Tang</surname>
          </string-name>
          , “
          <article-title>The dao attack paradoxes in propositional logic,” in 2017 4th international conference on systems and informatics (ICSAI)</article-title>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>1743</fpage>
          -
          <lpage>1746</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Fang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>An improved proof-of-trust consensus algorithm for credible crowdsourcing blockchain services</article-title>
          ,
          <source>” IEEE Access</source>
          , vol.
          <volume>8</volume>
          , pp.
          <volume>102</volume>
          <fpage>177</fpage>
          -
          <lpage>102</lpage>
          187,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>