{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T14:50:14Z","timestamp":1758120614167,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030314996"},{"type":"electronic","value":"9783030315009"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31500-9_11","type":"book-chapter","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T23:26:53Z","timestamp":1568935613000},"page":"177-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network"],"prefix":"10.1007","author":[{"given":"Marc","family":"Leinweber","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Grundmann","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Sch\u00f6nborn","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"11_CR1","unstructured":"BOLT 3: Bitcoin Transaction and Script Formats (2018). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/914ebab9080ccccb0ff176\/03-transactions.md"},{"key":"11_CR2","unstructured":"Anati, I., Gueron, S., Johnson, S., Scarlata, V.: Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. HASP 2013, ACM, New York (2013)"},{"key":"11_CR3","unstructured":"Avarikioti, G., Kogias, E.K., Wattenhofer, R.: Brick: asynchronous state channels. arXiv preprint arXiv:1905.11360, May 2019"},{"key":"11_CR4","unstructured":"Avarikioti, G., Laufenberg, F., Sliwinski, J., Wang, Y., Wattenhofer, R.: Towards secure and efficient payment channels. arXiv preprint arXiv:1811.12740 (2018)"},{"key":"11_CR5","unstructured":"Bentov, I., et al.: Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. IACR Cryptology ePrint Archive 2017, 1153 (2017)"},{"key":"11_CR6","unstructured":"Bulck, J.V., et al.: Foreshadow: extracting the Keys to the Intel SGX Kingdom with transient out-of-order execution. In: 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD (2018)"},{"key":"11_CR7","unstructured":"Das, P., et al.: FastKitten: practical smart contracts on bitcoin. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 801\u2013818. USENIX Association, Santa Clara. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/das"},{"key":"11_CR8","unstructured":"Decker, C., Russell, R., Osuntokun, O.: eltoo: a simple Layer2 protocol for Bitcoin. White paper (2018). https:\/\/blockstream.com\/eltoo.pdf"},{"key":"11_CR9","unstructured":"Dryja, T.: Unlinkable Outsourced Channel Monitoring (10 2016), talk at Scaling Bitcoin, Milano (2016)"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Grundmann, M., Leinweber, M., Hartenstein, H.: Banklaves: concept for a trustworthy decentralized payment service for Bitcoin. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 268\u2013276, May 2019. https:\/\/doi.org\/10.1109\/BLOC.2019.8751394, https:\/\/publikationen.bibliothek.kit.edu\/1000092459","DOI":"10.1109\/BLOC.2019.8751394"},{"key":"11_CR11","unstructured":"Intel: PoET 1.0 Specification (2015). https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/latest\/architecture\/poet.html"},{"key":"11_CR12","unstructured":"Kaplan, D., Powell, J., Woller, T.: AMD Memory Encryption (2016). http:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Lee, D., Kohlbrenner, D., Shinde, S., Song, D., Asanovi\u0107, K.: Keystone: A Framework for Architecting TEEs. arXiv preprint arXiv:1907.10119 (2019)","DOI":"10.1145\/3342195.3387532"},{"key":"11_CR14","unstructured":"Lind, J., Eyal, I., Kelbert, F., Naor, O., Pietzuch, P.R., Sirer, E.G.: Teechain: Scalable Blockchain Payments using Trusted Execution Environments (2017). http:\/\/arxiv.org\/abs\/1707.05454"},{"key":"11_CR15","unstructured":"Matetic, S., et al.: ROTE: Rollback Protection for Trusted Execution, pp. 1289\u20131306, August 2017. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/matetic"},{"key":"11_CR16","unstructured":"McCorry, P., Bakshi, S., Bentov, I., Miller, A., Meiklejohn, S.: Pisa: Arbitration Outsourcing for State Channels. IACR Cryptology ePrint Archive 2018, 582 (2018)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. HASP 2013. ACM, New York (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Milutinovic, M., He, W., Wu, H., Kanwal, M.: Proof of luck: an efficient blockchain consensus protocol. In: Proceedings of the 1st Workshop on System Software for Trusted Execution. SysTEX 2016, pp. 2:1\u20132:6. ACM, New York (2016). https:\/\/doi.org\/10.1145\/3007788.3007790","DOI":"10.1145\/3007788.3007790"},{"key":"11_CR19","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"11_CR20","unstructured":"Osuntokun, O.: Hardening Lightning (01 2018), talk at Blockchain Protocol Analysis and Security Engineering (2018)"},{"key":"11_CR21","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments (2016). https:\/\/lightning.network\/lightning-network-paper.pdf"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31500-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:03:20Z","timestamp":1726790600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31500-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030314996","9783030315009"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31500-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CBT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cryptocurrencies and Blockchain Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cbt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2019.uni.lu\/workshops\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}