{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:47:48Z","timestamp":1726001268500},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030032500"},{"type":"electronic","value":"9783030032517"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03251-7_15","type":"book-chapter","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T07:12:07Z","timestamp":1542957127000},"page":"132-141","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Incentives in Security Protocols"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Azouvi","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Hicks","sequence":"additional","affiliation":[]},{"given":"Steven J.","family":"Murdoch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,24]]},"reference":[{"key":"15_CR1","unstructured":"Ethereum Classic. https:\/\/ethereumclassic.github.io\/"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the Twenty-fifth Annual ACM Symposium on Principles of Distributed Computing, pp. 53\u201362, PODC 2006. ACM, New York (2006). https:\/\/doi.org\/10.1145\/1146381.1146393","DOI":"10.1145\/1146381.1146393"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-540-78524-8_17","volume-title":"Theory of Cryptography","author":"I Abraham","year":"2008","unstructured":"Abraham, I., Dolev, D., Halpern, J.Y.: Lower bounds on implementing robust and resilient mediators. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 302\u2013319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78524-8_17"},{"key":"15_CR4","unstructured":"Abraham, I., Malkhi, D., Nayak, K., Ren, L., Spiegelman, A.: Solidus: an incentive-compatible cryptocurrency based on permissionless Byzantine consensus. CoRR abs\/1612.02916 (2016). http:\/\/arxiv.org\/abs\/1612.02916"},{"key":"15_CR5","unstructured":"Abraham, I., Malkhi, D., Nayak, K., Ren, L., Spiegelman, A.: Solida: A blockchain protocol based on reconfigurable Byzantine consensus. In: OPODIS (2017). https:\/\/eprint.iacr.org\/2017\/1118"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-45126-6_7","volume-title":"Financial Cryptography","author":"A Acquisti","year":"2003","unstructured":"Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84\u2013102. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45126-6_7"},{"issue":"5","key":"15_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1095809.1095816","volume":"39","author":"AS Aiyer","year":"2005","unstructured":"Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.P., Porth, C.: BAR fault tolerance for cooperative services. SIGOPS Oper. Syst. Rev. 39(5), 45\u201358 (2005). https:\/\/doi.org\/10.1145\/1095809.1095816","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why information security is hard - an economic perspective. In: Annual Computer Security Applications Conference, pp. 358\u2013365 (2001)","DOI":"10.1109\/ACSAC.2001.991552"},{"issue":"6","key":"15_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2602321","volume":"57","author":"R Anderson","year":"2014","unstructured":"Anderson, R., Murdoch, S.J.: EMV: why payment systems fail. Commun. ACM 57(6), 24\u201328 (2014). https:\/\/doi.org\/10.1145\/2602321","journal-title":"Commun. ACM"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-78375-8_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"Christian Badertscher","year":"2018","unstructured":"Badertscher, C., Garay, J., Maurer, U., Tschudi, D., Zikas, V.: But why does it work? A rational protocol design treatment of Bitcoin. Technical report, Cryptology ePrint Archive, Report 2018\/138 (2018). https:\/\/eprint.iacr.org\/2018\/138"},{"key":"15_CR11","first-page":"919","volume":"2016","author":"I Bentov","year":"2016","unstructured":"Bentov, I., Pass, R., Shi, E.: Snow white: provably secure proofs of stake. IACR Cryptol. ePrint Arch. 2016, 919 (2016)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-662-53357-4_2","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2016","unstructured":"Bonneau, J.: Why buy when you can rent? In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 19\u201326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_2"},{"key":"15_CR13","unstructured":"Caballero-Gil, P., Hern\u00e1ndez-Goya, C., Bruno-Casta\u00f1eda, C.: A rational approach to cryptographic protocols. CoRR abs\/1005.0082 (2010). http:\/\/arxiv.org\/abs\/1005.0082"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of Bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154\u2013167, CCS 2016. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978408","DOI":"10.1145\/2976749.2978408"},{"key":"15_CR15","unstructured":"CoinMarketCap: Cryptocurrency market capitalizations. https:\/\/coinmarketcap.com\/ . Accessed 15 Jan 2018"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-642-14577-3_19","volume-title":"Financial Cryptography and Data Security","author":"T-W \u201cJohnny\u201d Ngan","year":"2010","unstructured":"\u201cJohnny\u201d Ngan, T.-W., Dingledine, R., Wallach, D.S.: Building incentives into tor. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 238\u2013256. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_19"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Eyal, I.: The miner\u2019s dilemma. In: IEEE Symposium on Security and Privacy (2015)","DOI":"10.1109\/SP.2015.13"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Financial Cryptography and Data Security (2013)","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"15_CR19","unstructured":"Garay, J., Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Rational protocol design: cryptography against incentive-driven adversaries. Cryptology ePrint Archive, Report 2013\/496 (2013). http:\/\/eprint.iacr.org\/2013\/496"},{"key":"15_CR20","unstructured":"Ghosh, M., Richardson, M., Ford, B., Jansen, R.: A TorPath to TorCoin: proof of bandwidth altcoins for compensating relays. Technical report NRL (2014)"},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1086\/468061","volume":"29","author":"U Gneezy","year":"2000","unstructured":"Gneezy, U., Rustichini, A.: A fine is a price. J. Legal Stud. 29(1), 1\u201317 (2000)","journal-title":"J. Legal Stud."},{"key":"15_CR22","unstructured":"Halpern, J.Y.: Beyond Nash equilibrium: solution concepts for the 21st century. CoRR abs\/0806.2139 (2008). http:\/\/arxiv.org\/abs\/0806.2139"},{"key":"15_CR23","unstructured":"Halpern, J.Y., Pass, R.: Game theory with costly computation. arXiv preprint arXiv:0809.0024 (2008)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Jansen, R., Hopper, N.: Shadow: running Tor in a box for accurate and efficient experimentation. In: Proceedings of the 19th Symposium on Network and Distributed System Security (NDSS). Internet Society, February 2012","DOI":"10.21236\/ADA559181"},{"key":"15_CR25","unstructured":"Jansen, R., Miller, A., Syverson, P., Ford, B.: From onions to shallots: rewarding Tor relays with TEARS. Technical report NRL (2014)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. In: Handbook of the fundamentals of financial decision making: Part I, pp. 99\u2013127. World Scientific (2013)","DOI":"10.1142\/9789814417358_0006"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-319-70278-0_34","volume-title":"Financial Cryptography and Data Security","author":"A Kothapalli","year":"2017","unstructured":"Kothapalli, A., Miller, A., Borisov, N.: SmartCast: an incentive compatible consensus protocol using smart contracts. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 536\u2013552. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_34"},{"key":"15_CR29","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: WEIS (2013)"},{"key":"15_CR30","doi-asserted-by":"publisher","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: Computer and Communications Security, CCS 2015, pp. 706\u2013719. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2810103.2813659","DOI":"10.1145\/2810103.2813659"},{"key":"15_CR31","first-page":"98","volume":"6","author":"SJ Murdoch","year":"2009","unstructured":"Murdoch, S.J.: Reliability of chip & PIN evidence in banking disputes. Digital Evid. Electron. Signat. Law Rev. 6, 98 (2009)","journal-title":"Digital Evid. Electron. Signat. Law Rev."},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-662-45472-5_2","volume-title":"Financial Cryptography and Data Security","author":"SJ Murdoch","year":"2014","unstructured":"Murdoch, S.J., Anderson, R.: Security protocols and evidence: where many payment systems fail. In: Christin, N., Safavi-Naini, R. (eds.) Financial Cryptography and Data Security, vol. 8437, pp. 21\u201332. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_2"},{"key":"15_CR33","unstructured":"Park, S., Pietrzak, K., Kwon, A., Alwen, J., Fuchsbauer, G., Gai, P.: SpaceMint: a cryptocurrency based on proofs of space. Cryptology ePrint Archive, Report 2015\/528 (2015). https:\/\/eprint.iacr.org\/2015\/528"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Pass, R., Shi, E.: Fruitchains: a fair blockchain. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, pp. 315\u2013324. ACM (2017)","DOI":"10.1145\/3087801.3087809"},{"key":"15_CR35","unstructured":"Poon, J., Dryja, T.: The Bitcoin lightning network: scalable off-chain instant payments. Technical Report (draft) (2015)"},{"key":"15_CR36","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-662-54970-4_30","volume-title":"Financial Cryptography and Data Security","author":"A Sapirshtein","year":"2017","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) Financial Cryptography and Data Security, pp. 515\u2013532. Springer, Berlin Heidelberg, Berlin, Heidelberg (2017)"},{"key":"15_CR37","unstructured":"Siegel, D.: Understanding the DAO attack, June 2016. https:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXVI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03251-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T23:06:57Z","timestamp":1572995217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03251-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030032500","9783030032517"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03251-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"Security Protocols","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge International Workshop on Security Protocols","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 March 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 March 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spw2018.crocs.fi.muni.cz","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"the workshop is invitation only","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"email","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"N\/A% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"the workshop is invitation only","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}