{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:57:39Z","timestamp":1753441059980,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030614669"},{"type":"electronic","value":"9783030614676"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61467-6_3","type":"book-chapter","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T05:04:26Z","timestamp":1603688666000},"page":"25-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Bitcoin Covenants Unchained"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Lande","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"3_CR1","unstructured":"Bitcoin Wiki - contracts - assurance contracts (2012). https:\/\/en.bitcoin.it\/wiki\/Contract#Example_3:_Assurance_contracts"},{"key":"3_CR2","unstructured":"ERC-20 token standard (2015). https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-20.md"},{"key":"3_CR3","unstructured":"King of the Ether Throne (2016). https:\/\/web.archive.org\/web\/20160211005112\/https:\/\/www.kingoftheether.com\/"},{"key":"3_CR4","unstructured":"Understanding the DAO attack, June 2016. http:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/"},{"key":"3_CR5","unstructured":"Bitcoin Wiki - Pay-to-Script Hash (2017). https:\/\/en.bitcoinwiki.org\/wiki\/Pay-to-Script_Hash"},{"key":"3_CR6","unstructured":"BALZaC: Bitcoin abstract language, analyzer and compiler (2018). https:\/\/blockchain.unica.it\/balzac\/"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: Fair two-party computations via Bitcoin deposits. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105\u2013121. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_8"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-319-10512-3_2","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: Modeling Bitcoin contracts by timed automata. In: Legay, A., Bozga, M. (eds.) FORMATS 2014. LNCS, vol. 8711, pp. 7\u201322. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10512-3_2"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on Bitcoin. In: IEEE S&P, pp. 443\u2013458 (2014). https:\/\/doi.org\/10.1109\/SP.2014.35","DOI":"10.1109\/SP.2014.35"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-89722-6_9","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2018","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T., Lande, S., Zunino, R.: SoK: unraveling Bitcoin smart contracts. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 217\u2013242. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_9"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Atzei, N., Bartoletti, M., Lande, S., Yoshida, N., Zunino, R.: Developing secure Bitcoin contracts with BitML. In: ESEC\/FSE (2019). https:\/\/doi.org\/10.1145\/3338906.3341173","DOI":"10.1145\/3338906.3341173"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-662-58387-6_29","volume-title":"Financial Cryptography and Data Security","author":"N Atzei","year":"2018","unstructured":"Atzei, N., Bartoletti, M., Lande, S., Zunino, R.: A formal model of Bitcoin transactions. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 541\u2013560. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_29"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-45741-3_14","volume-title":"Computer Security \u2013 ESORICS 2016","author":"W Banasik","year":"2016","unstructured":"Banasik, W., Dziembowski, S., Malinowski, D.: Efficient zero-knowledge contingent payments in cryptocurrencies without scripts. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 261\u2013280. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_14"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Future Gener. Comput. Syst. 102, 259\u2013277 (2020). https:\/\/doi.org\/10.1016\/j.future.2019.08.014","journal-title":"Future Gener. Comput. Syst."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Cimoli, T., Zunino, R.: Fun with Bitcoin smart contracts. In: ISoLA, pp. 432\u2013449 (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6 32","DOI":"10.1007\/978-3-030-03427-6"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-030-50029-0_17","volume-title":"Coordination Models and Languages","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti, M., Murgia, M., Zunino, R.: Renegotiation and recursion in Bitcoin contracts. In: Bliudze, S., Bocchi, L. (eds.) COORDINATION 2020. LNCS, vol. 12134, pp. 261\u2013278. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50029-0_17"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-70278-0_15","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Zunino, R.: Constant-deposit multiparty lotteries on bitcoin. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 231\u2013247. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_15"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Bartoletti, M., Zunino, R.: BitML: a calculus for Bitcoin smart contracts. In: ACM CCS (2018). https:\/\/doi.org\/10.1145\/3243734.3243795","DOI":"10.1145\/3243734.3243795"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-030-17138-4_10","volume-title":"Principles of Security and Trust","author":"M Bartoletti","year":"2019","unstructured":"Bartoletti, M., Zunino, R.: Verifying liquidity of Bitcoin contracts. In: Nielson, F., Sands, D. (eds.) POST 2019. LNCS, vol. 11426, pp. 222\u2013247. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17138-4_10"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"Iddo Bentov","year":"2014","unstructured":"Bentov, Iddo, Kumaresan, Ranjit: How to use Bitcoin to design fair protocols. In: Garay, Juan A., Gennaro, Rosario (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-44598-6_15","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"D Boneh","year":"2000","unstructured":"Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236\u2013254. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44598-6_15"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Br\u00fcnjes, L., Gabbay, M.J.: UTxO- vs account-based smart contract blockchain programming paradigms. CoRR abs\/2003.14271 (2020)","DOI":"10.1007\/978-3-030-61467-6_6"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-54455-3_37","volume-title":"Financial Cryptography and Data Security","author":"MMT Chakravarty","year":"2020","unstructured":"Chakravarty, M.M.T., Chapman, J., MacKenzie, K., Melkonian, O., Peyton Jones, M., Wadler, P.: The extended UTXO model. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 525\u2013539. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_37"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Chakravarty, M.M., et al.: Native custom tokens in the extended UTXO model. In: ISoLA (2020). To appear","DOI":"10.1007\/978-3-030-54455-3_37"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Chakravarty, M.M., et al.: UTXO$${}_{\\rm ma}$$: UTXO with multi-asset support. In: ISoLA (2020). To appear","DOI":"10.1007\/978-3-030-61467-6_8"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on Ethereum: towards healthier blockchain technology. In: WWW, pp. 1409\u20131418. ACM (2018). https:\/\/doi.org\/10.1145\/3178876.3186046","DOI":"10.1145\/3178876.3186046"},{"key":"3_CR27","unstructured":"Dashjr, L.: BIP 0002 (2016). https:\/\/en.bitcoin.it\/wiki\/BIP_0002"},{"key":"3_CR28","unstructured":"Kalis, R.: Cashscript \u2013 writing covenants (2019). https:\/\/cashscript.org\/docs\/guides\/covenants\/"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Kumaresan, R., Bentov, I.: How to use Bitcoin to incentivize correct computations. In: ACM CCS, pp. 30\u201341 (2014). https:\/\/doi.org\/10.1145\/2660267.2660380","DOI":"10.1145\/2660267.2660380"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Kumaresan, R., Moran, T., Bentov, I.: How to use Bitcoin to play decentralized poker. In: ACM CCS, pp. 195\u2013206 (2015). https:\/\/doi.org\/10.1145\/2810103.2813712","DOI":"10.1145\/2810103.2813712"},{"key":"3_CR31","unstructured":"Maxwell, G.: CoinCovenants using SCIP signatures, an amusingly bad idea (2013). https:\/\/bitcointalk.org\/index.php?topic=278122.0"},{"key":"3_CR32","doi-asserted-by":"publisher","unstructured":"Miller, A., Bentov, I.: Zero-collateral lotteries in Bitcoin and Ethereum. In: EuroS&P Workshops, pp. 4\u201313 (2017). https:\/\/doi.org\/10.1109\/EuroSPW.2017.44","DOI":"10.1109\/EuroSPW.2017.44"},{"key":"3_CR33","doi-asserted-by":"publisher","unstructured":"M\u00f6ser, M., Eyal, I., Sirer, E.G.: Bitcoin covenants. In: Financial Cryptography Workshops. LNCS, vol. 9604, pp. 126\u2013141. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_9","DOI":"10.1007\/978-3-662-53357-4_9"},{"key":"3_CR34","unstructured":"Nick, J., Poelstra, A., Sanders, G.: Liquid: a Bitcoin sidechain (2020). https:\/\/blockstream.com\/assets\/downloads\/pdf\/liquid-whitepaper.pdf"},{"key":"3_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-70278-0_12","volume-title":"Financial Cryptography and Data Security","author":"R O\u2019Connor","year":"2017","unstructured":"O\u2019Connor, R., Piekarska, M.: Enhancing Bitcoin transactions with covenants. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 191\u2013198. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_12"},{"key":"3_CR36","unstructured":"Wuille, P., Nick, J., Towns, A.: Taproot: SegWit version 1 spending rules, BIP 341 (2020). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0341.mediawiki"},{"key":"3_CR37","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable off-chain instant payments (2015). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"3_CR38","unstructured":"Rubin, J.: CHECKTEMPLATEVERIFY, BIP 119 (2020). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0119.mediawiki"},{"key":"3_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-030-03427-6_27","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"P Lamela Seijas","year":"2018","unstructured":"Lamela Seijas, P., Thompson, S.: Marlowe: financial contracts on blockchain. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 356\u2013375. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6_27"},{"key":"3_CR40","unstructured":"Swambo, J., Hommel, S., McElrath, B., Bishop, B.: Bitcoin covenants: three ways to control the future. CoRR abs\/2006.16714 (2020)"},{"key":"3_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-662-47854-7_4","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2015","unstructured":"Vasek, M., Moore, T.: There\u2019s no free lunch, even using Bitcoin: tracking the popularity and profits of virtual currency scams. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 44\u201361. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47854-7_4"},{"key":"3_CR42","unstructured":"Zahnentferner, J.: An abstract model of UTxO-based cryptocurrencies with scripts. Cryptology ePrint Archive 2018\/469 (2018). https:\/\/eprint.iacr.org\/2018\/469"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61467-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T12:08:49Z","timestamp":1618056529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61467-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030614669","9783030614676"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61467-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"27 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isola-conference.org\/isola2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}