{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:56:42Z","timestamp":1743130602267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030371098"},{"type":"electronic","value":"9783030371104"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37110-4_9","type":"book-chapter","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T19:04:03Z","timestamp":1581620643000},"page":"117-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Committing to Quantum Resistance, Better: A Speed-and-Risk-Configurable Defence for Bitcoin Against a Fast Quantum Computing Attack"],"prefix":"10.1007","author":[{"given":"Dragos I.","family":"Ilie","sequence":"first","affiliation":[]},{"given":"William J.","family":"Knottenbelt","sequence":"additional","affiliation":[]},{"given":"Iain D.","family":"Stewart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"issue":"6","key":"9_CR1","doi-asserted-by":"publisher","first-page":"180410","DOI":"10.1098\/rsos.180410","volume":"5","author":"I Stewart","year":"2018","unstructured":"Stewart, I., Ilie, D., Zamyatin, A., Werner, S., Torshizi, M., Knottenbelt, W.J.: Committing to quantum resistance: a slow defence for bitcoin against a fast quantum computing attack. R. Soc. Open Sci. 5(6), 180410 (2018)","journal-title":"R. Soc. Open Sci."},{"key":"9_CR2","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf (2008). Accessed 01 July 2015"},{"issue":"6\u201310","key":"9_CR3","first-page":"71","volume":"2","author":"M Crosby","year":"2016","unstructured":"Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al.: Blockchain technology: beyond bitcoin. Appl. Innov. 2(6\u201310), 71 (2016)","journal-title":"Appl. Innov."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: International Workshop on Fast Software Encryption, pp. 371\u2013388. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: On digital signatures and public-key cryptosystems. Technical Report, Massachusetts Inst of Tech Cambridge Lab for Computer Science (1977)","DOI":"10.21236\/ADA606588"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) Proceedings of the Advances in Cryptology\u2014CRYPTO \u201985, pp. 417\u2013426. Springer, Berlin, Heidelberg (1986)","DOI":"10.1007\/3-540-39799-X_31"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Kaye, P., Laflamme, R., Mosca, M.: An Introduction to Quantum Computing. Oxford University Press (2007)","DOI":"10.1093\/oso\/9780198570004.001.0001"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Feynman, R.: Theres plenty of room at the bottom. In: Feynman and computation, pp. 63\u201376. CRC Press (2018)","DOI":"10.1201\/9780429500459-7"},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"9_CR10","unstructured":"Schlosshauer, M.A.: Decoherence: And the Quantum-to-Classical Transition. Springer Science & Business Media, Berlin (2007)"},{"issue":"7614","key":"9_CR11","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1038\/nature18648","volume":"536","author":"S Debnath","year":"2016","unstructured":"Debnath, S., Linke, N.M., Figgatt, C., Landsman, K.A., Wright, K., Monroe, C.: Demonstration of a small programmable quantum computer with atomic qubits. Nature 536(7614), 63 (2016)","journal-title":"Nature"},{"issue":"7573","key":"9_CR12","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1038\/nature15263","volume":"526","author":"M Veldhorst","year":"2015","unstructured":"Veldhorst, M., Yang, C., Hwang, J., Huang, W., Dehollain, J., Muhonen, J., Simmons, S., Laucht, A., Hudson, F., Itoh, K., et al.: A two-qubit logic gate in silicon. Nature 526(7573), 410 (2015)","journal-title":"Nature"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Watson, T., Philips, S., Kawakami, E., Ward, D., Scarlino, P., Veldhorst, M., Savage, D., Lagally, M., Friesen, M., Coppersmith, S., et al.: A programmable two-qubit quantum processor in silicon. Nature 555, 633\u2013637 (2018)","DOI":"10.1038\/nature25766"},{"issue":"2","key":"9_CR14","first-page":"181","volume":"25","author":"S Bettelli","year":"2003","unstructured":"Bettelli, S., Calarco, T., Serafini, L.: Toward an architecture for quantum programming. Eur. Phys. J. D-At. Mol. Opt. Plasma Phys. 25(2), 181\u2013200 (2003)","journal-title":"Eur. Phys. J. D-At. Mol. Opt. Plasma Phys."},{"key":"9_CR15","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media, Inc. (2014)"},{"key":"9_CR16","unstructured":"Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and cryptocurrency technologies. Princeton University Press (2016)"},{"key":"9_CR17","unstructured":"Nielsen, M.A., Chuang, I.: Quantum computation and quantum information. Cambridge University Press (2000)"},{"issue":"7671","key":"9_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 9 (2017)","journal-title":"Nature"},{"key":"9_CR19","unstructured":"Bitcoin community. Elliptic Curve Digital Signature Algorithm. https:\/\/en.bitcoin.it\/wiki\/Elliptic_Curve_Digital_Signature_Algorithm . Accessed 18 Feb 2018"},{"key":"9_CR20","unstructured":"Jogenfors, J.: Quantum bitcoin: an anonymous and distributed currency secured by the no-cloning theorem of quantum mechanics. arXiv:1604.01383 (2016)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Mosca, M., Ekert, A.: The hidden subgroup problem and eigenvalue estimation on a quantum computer. In: NASA International Conference on Quantum Computing and Quantum Communications, pp. 174\u2013188. Springer, Berlin (1998)","DOI":"10.1007\/3-540-49208-9_15"},{"key":"9_CR22","unstructured":"Lavor, C., Manssur, L., Portugal, R.: Shor\u2019s algorithm for factoring large integers. arXiv: quant-ph\/0303175 (2003)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp. 212\u2013219. ACM (1996)","DOI":"10.1145\/237814.237866"},{"issue":"4\u20135","key":"9_CR24","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1002\/(SICI)1521-3978(199806)46:4\/5<493::AID-PROP493>3.0.CO;2-P","volume":"46","author":"M Boyer","year":"1998","unstructured":"Boyer, M., Brassard, G., H\u00f8yer, P., Tapp, A.: Tight bounds on quantum searching. Fortschritte der Physik 46(4\u20135), 493\u2013505 (1998)","journal-title":"Fortschritte der Physik"},{"key":"9_CR25","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin (2013)"},{"issue":"3","key":"9_CR26","first-page":"216","volume":"10","author":"DSA Elminaam","year":"2010","unstructured":"Elminaam, D.S.A., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. IJ Netw. Secur. 10(3), 216\u2013222 (2010)","journal-title":"IJ Netw. Secur."},{"issue":"9","key":"9_CR27","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MC.2017.3571056","volume":"50","author":"MB Taylor","year":"2017","unstructured":"Taylor, M.B.: The evolution of bitcoin hardware. Computer 50(9), 58\u201366 (2017)","journal-title":"Computer"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Proos, J., Zalka, C.: Shor\u2019s discrete logarithm quantum algorithm for elliptic curves. arXiv: quant-ph\/0301141 (2003)","DOI":"10.26421\/QIC3.4-3"},{"key":"9_CR29","unstructured":"Tessler, L., Byrnes, T.: Bitcoin and quantum computing. arXiv:1711.04235 (2017)"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings 2013 Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"9_CR31","unstructured":"Schneider, N.: Recovering bitcoin private keys using weak signatures from the blockchain. http:\/\/www.nilsschneider.net\/2013\/01\/28\/recovering-bitcoin-private-keys.html (2013). Accessed 18 Feb 2018"},{"key":"9_CR32","unstructured":"Bitcoin Cash. https:\/\/www.bitcoincash.org\/ . Accessed 18 Feb 2018"},{"key":"9_CR33","unstructured":"Bitcoin Gold. https:\/\/bitcoingold.org\/ . Accessed 18 Feb 2018"},{"key":"9_CR34","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network. https:\/\/lightning.network\/lightning-network-paper.pdf (2016). Accessed 07 July 2016"},{"key":"9_CR35","unstructured":"Lombrozo, E., Lau, J., Wuille, P.: BIP141: segregated witness (consensus layer). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0141.mediawiki (2012). Accessed 18 Feb 2018"},{"key":"9_CR36","unstructured":"Bitcoin community. OP_RETURN. https:\/\/en.bitcoin.it\/wiki\/OP_RETURN . Accessed 18 Feb 2018"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Eastlake III, D., Hansen, T.: US secure hash algorithms (SHA and HMAC-SHA) (2006)","DOI":"10.17487\/rfc4634"},{"key":"9_CR38","unstructured":"Adam Back. https:\/\/twitter.com\/adam3us\/status\/947900422697742337 . Accessed 18 Feb 2018"},{"key":"9_CR39","unstructured":"Ruffing, T.: https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2018-February\/015758.html . Accessed 18 Feb 2018"}],"container-title":["Springer Proceedings in Business and Economics","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37110-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T13:46:35Z","timestamp":1665841595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37110-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030371098","9783030371104"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37110-4_9","relation":{},"ISSN":["2198-7246","2198-7254"],"issn-type":[{"type":"print","value":"2198-7246"},{"type":"electronic","value":"2198-7254"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}