{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:14:59Z","timestamp":1775258099355,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030019495","type":"print"},{"value":"9783030019501","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01950-1_49","type":"book-chapter","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T19:16:51Z","timestamp":1540495011000},"page":"793-804","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Micropaying to a Distributed Payee with Instant Confirmation"],"prefix":"10.1007","author":[{"given":"Peifang","family":"Ni","sequence":"first","affiliation":[]},{"given":"Hongda","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dongxue","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"49_CR1","unstructured":"Bitcoinj: Working with micropayment channels. (2013). https:\/\/bitcoinj.github.io\/working-with-micropayments"},{"key":"49_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-662-46447-2_5","volume-title":"Public-Key Cryptography \u2013 PKC 2015","author":"F Baldimtsi","year":"2015","unstructured":"Baldimtsi, F., Chase, M., Fuchsbauer, G., Kohlweiss, M.: Anonymous transferable E-Cash. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 101\u2013124. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46447-2_5"},{"key":"49_CR3","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s00145-007-9011-9","volume":"22","author":"A Bender","year":"2008","unstructured":"Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and constructions without random oracles. J. Cryptol. 22, 114\u2013138 (2008)","journal-title":"J. Cryptol."},{"key":"49_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1988","author":"D Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319\u2013327. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34799-2_25"},{"key":"49_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-319-56614-6_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"A Chiesa","year":"2017","unstructured":"Chiesa, A., Green, M., Liu, J., Miao, P., Miers, I., Mishra, P.: Decentralized anonymous micropayments. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 609\u2013642. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_21"},{"key":"49_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21741-3_1","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"C Decker","year":"2015","unstructured":"Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3\u201318. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21741-3_1"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M.: Zaps and their applications. In: Symposium on Foundations of Computer Science, p. 283 (2000)","DOI":"10.1109\/SFCS.2000.892117"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The millicent protocol for inexpensive electronic commerce (1995)","DOI":"10.1145\/3592626.3592675"},{"key":"49_CR9","unstructured":"Hearn, M., S.J.: Bitcoin contracts (2012). https:\/\/en.bitcoin.it\/wiki\/Contract"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: Tumblebit: an untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23086"},{"key":"49_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-662-53357-4_4","volume-title":"Financial Cryptography and Data Security","author":"E Heilman","year":"2016","unstructured":"Heilman, E., Baldimtsi, F., Goldberg, S.: Blindly signed contracts: anonymous on-blockchain and off-blockchain bitcoin transactions. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 43\u201360. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_4"},{"key":"49_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/3-540-45760-7_11","volume-title":"Topics in Cryptology \u2014 CT-RSA 2002","author":"S Micali","year":"2002","unstructured":"Micali, S., Rivest, R.L.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 149\u2013163. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45760-7_11"},{"key":"49_CR13","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Pedersen, T.P.: Electronic payments of small amounts 24(495), 59\u201368 (1996)","DOI":"10.7146\/dpb.v24i495.7023"},{"key":"49_CR15","unstructured":"PeterTodd: near-zero fee transactions with hub-and-spoke micropayments (2014)"},{"key":"49_CR16","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: SCALABLE off-chain instant payments"},{"key":"49_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/3-540-63594-7_87","volume-title":"Financial Cryptography","author":"RL Rivest","year":"1997","unstructured":"Rivest, R.L.: Electronic lottery tickets as micropayments. In: Hirschfeld, R. (ed.) FC 1997. LNCS, vol. 1318, pp. 307\u2013314. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-63594-7_87"},{"key":"49_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-62494-5_6","volume-title":"Security Protocols","author":"RL Rivest","year":"1997","unstructured":"Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 69\u201387. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-62494-5_6"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Kate, A.: Liar, liar, coins on fire!: Penalizing equivocation by loss of bitcoins. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 219\u2013230 (2015)","DOI":"10.1145\/2810103.2813686"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Shelat, A., Shelat, A.: Micropayments for decentralized currencies. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 207\u2013218 (2015)","DOI":"10.1145\/2810103.2813713"},{"key":"49_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-62494-5_7","volume-title":"Security Protocols","author":"D Wheeler","year":"1997","unstructured":"Wheeler, D.: Transactions using bets. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 89\u201392. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-62494-5_7"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01950-1_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:51:59Z","timestamp":1775253119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01950-1_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030019495","9783030019501"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01950-1_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lille","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conference.imt-lille-douai.fr\/icics2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}