{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:56:45Z","timestamp":1743130605699,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030034269"},{"type":"electronic","value":"9783030034276"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03427-6_29","type":"book-chapter","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T16:54:48Z","timestamp":1540832088000},"page":"389-404","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Blockchains as Kripke Models: An Analysis of Atomic Cross-Chain Swap"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2076-2750","authenticated-orcid":false,"given":"Yoichi","family":"Hirai","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,30]]},"reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-89722-6_9","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2018","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T., Lande, S., Zunino, R.: SoK: unraveling bitcoin smart contracts. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 217\u2013242. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_9"},{"key":"29_CR2","unstructured":"Bitcoin Wiki: Script (2010\u20132018). https:\/\/en.bitcoin.it\/wiki\/Script. Accessed 13 Mar 2018"},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"TD Chandra","year":"1996","unstructured":"Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. J. ACM 43(2), 225\u2013267 (1996)","journal-title":"J. ACM"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/BF01843569","volume":"1","author":"KM Chandy","year":"1986","unstructured":"Chandy, K.M., Misra, J.: How processes learn. Distrib. Comput. 1(1), 40\u201352 (1986)","journal-title":"Distrib. Comput."},{"key":"29_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-02962-6","volume-title":"Logic and Structure","author":"D van Dalen","year":"1994","unstructured":"van Dalen, D.: Logic and Structure. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/978-3-662-02962-6"},{"key":"29_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-5839-4","volume-title":"Dynamic Epistemic Logic","author":"H van Ditmarsch","year":"2007","unstructured":"van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic, 1st edn. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-1-4020-5839-4","edition":"1"},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/0167-6423(83)90017-5","volume":"2","author":"E Emerson","year":"1982","unstructured":"Emerson, E., Clarke, E.M.: Using branching time temporal logic to synthesize synchronization skeletons. Sci. Comput. Program. 2(3), 241\u2013266 (1982)","journal-title":"Sci. Comput. Program."},{"key":"29_CR8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning About Knowledge","author":"R Fagin","year":"1995","unstructured":"Fagin, R., Halpern, J.Y., Vardi, M.Y., Moses, Y.: Reasoning About Knowledge. MIT Press, Cambridge (1995)"},{"issue":"2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"MJ Fischer","year":"1985","unstructured":"Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374\u2013382 (1985)","journal-title":"J. ACM"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-319-70972-7_22","volume-title":"Financial Cryptography and Data Security","author":"AE Gencer","year":"2017","unstructured":"Gencer, A.E., van Renesse, R., Sirer, E.G.: Short paper: service-oriented sharding for blockchains. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 393\u2013401. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_22"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-40184-8_16","volume-title":"CONCUR 2013 \u2013 Concurrency Theory","author":"K von Gleissenthall","year":"2013","unstructured":"von Gleissenthall, K., Rybalchenko, A.: An epistemic perspective on consistency of concurrent computations. In: D\u2019Argenio, P.R., Melgratti, H. (eds.) CONCUR 2013. LNCS, vol. 8052, pp. 212\u2013226. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40184-8_16"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Halpern, J.Y., Pass, R.: A knowledge-based analysis of the blockchain protocol. In: TARK 2017. EPTCS, vol. 251, pp. 324\u2013335 (2017)","DOI":"10.4204\/EPTCS.251.22"},{"key":"29_CR13","unstructured":"Hirai, Y.: An intuitionistic epistemic logic for asynchronous communication. Master\u2019s thesis, the University of Tokyo (2010)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-17511-4_16","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"Y Hirai","year":"2010","unstructured":"Hirai, Y.: An intuitionistic epistemic logic for sequential consistency on shared memory. In: Clarke, E.M., Voronkov, A. (eds.) LPAR 2010. LNCS (LNAI), vol. 6355, pp. 272\u2013289. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17511-4_16"},{"issue":"2","key":"29_CR15","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/279227.279229","volume":"16","author":"L Lamport","year":"1998","unstructured":"Lamport, L.: The part-time parliament. ACM Trans. Comput. Syst. 16(2), 133\u2013169 (1998)","journal-title":"ACM Trans. Comput. Syst."},{"key":"29_CR16","unstructured":"Lundeberg, M.B.: Advisory: secret size attack on cross-chain hash lock smart contracts (2018). https:\/\/gist.github.com\/markblundeberg\/7a932c98179de2190049f5823907c016. Accessed 07 Mar 2018"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: CCS 2016, pp. 254\u2013269. ACM (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 17\u201330. CCS 2016. ACM (2016)","DOI":"10.1145\/2976749.2978389"},{"key":"29_CR19","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf. Accessed 20 Mar 2018"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Nikolic, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. ArXiv e-prints (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"29_CR21","unstructured":"Nolan, T.: Re: Alt chains and atomic transfers (2013). https:\/\/bitcointalk.org\/index.php?topic=193281.msg2224949#msg2224949. Accessed 12 Mar 2018"},{"key":"29_CR22","unstructured":"Poon, J., Buterin, V.: Plasma: scalable autonomous smart contracts (2017). https:\/\/plasma.io\/plasma.pdf. Accessed 07 Mar 2018"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1007\/978-3-319-70278-0_30","volume-title":"Financial Cryptography and Data Security","author":"I Sergey","year":"2017","unstructured":"Sergey, I., Hobor, A.: A concurrent perspective on smart contracts. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 478\u2013493. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_30"},{"key":"29_CR24","volume-title":"Constructivism in Mathematics: An Introduction","author":"AS Troelstra","year":"1988","unstructured":"Troelstra, A.S., Van Dalen, D.: Constructivism in Mathematics: An Introduction, vol. 1. Elsevier, Amsterdam (1988)"},{"key":"29_CR25","unstructured":"Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework (2016). https:\/\/github.com\/w3f\/polkadot-white-paper\/blob\/master\/PolkaDotPaper.pdf. Accessed 07 Mar 2018"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03427-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T21:32:21Z","timestamp":1720733541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03427-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030034269","9783030034276"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03427-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"30 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isola-conference.org\/isola2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Equinocs","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"126","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"invitation-based event","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}