{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:55:33Z","timestamp":1774540533030,"version":"3.50.1"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030783747","type":"print"},{"value":"9783030783754","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78375-4_13","type":"book-chapter","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T08:12:10Z","timestamp":1623226330000},"page":"311-337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["SoK: Auditability and Accountability in Distributed Payment Systems"],"prefix":"10.1007","author":[{"given":"Panagiotis","family":"Chatzigiannis","sequence":"first","affiliation":[]},{"given":"Foteini","family":"Baldimtsi","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Chalkias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,10]]},"reference":[{"key":"13_CR1","unstructured":"Bitgo announces \u201cverified by bitgo\u201d proof of asset service. https:\/\/www.businesswire.com\/news\/home\/20150630005466\/en\/BitGo-Announces-%E2%80%9CVerified-BitGo%E2%80%9D-Proof-Asset-Service#.VZKYwO1Viko"},{"key":"13_CR2","unstructured":"Bitstamp proof of reserves. https:\/\/www.bitstamp.net\/s\/documents\/Bitstamp_proof_of_reserves_statement.pdf"},{"key":"13_CR3","unstructured":"CSBS state regulatory requirements for virtual currency activities. https:\/\/www.csbs.org\/sites\/default\/files\/2017-11\/CSBS%20Draft%20Model%20Regulatory%20Framework%20for%20Virtual%20Currency%20Proposal%20-%20Dec.%2016%202014.pdf"},{"key":"13_CR4","unstructured":"Deloitte COINIA and the future of audit. https:\/\/www2.deloitte.com\/us\/en\/pages\/audit\/articles\/impact-of-blockchain-in-accounting.html"},{"key":"13_CR5","unstructured":"FATF travel rule: What you need to know. https:\/\/complyadvantage.com\/knowledgebase\/fatf-travel-rule\/"},{"key":"13_CR6","unstructured":"IRS is trying to deanonymize privacy coins like monero and zcash. https:\/\/www.forbes.com\/sites\/shehanchandrasekera\/2020\/07\/06\/irs-is-trying-to-deanonymize-privacy-coins-like-monero-and-zcash\/#4607506c4174"},{"key":"13_CR7","unstructured":"Maxwell summation trees. https:\/\/bitcointalk.org\/index.php?topic=595180.0"},{"key":"13_CR8","unstructured":"Proof of solvency: Technical overview. https:\/\/medium.com\/iconominet\/proof-of-solvency-technical-overview-d1d0e8a8a0b8"},{"key":"13_CR9","unstructured":"Tether: Fiat currencies on the bitcoin blockchain. https:\/\/tether.to\/wp-content\/uploads\/2016\/06\/TetherWhitePaper.pdf"},{"key":"13_CR10","unstructured":"Tether\u2019s bank says it invests customer funds in bitcoin. https:\/\/www.coindesk.com\/tethers-bank-says-it-invests-customer-funds-in-bitcoin"},{"key":"13_CR11","unstructured":"On blockchain auditability (2016). https:\/\/bitfury.com\/content\/downloads\/bitfury_white_paper_on_blockchain_auditability.pdf"},{"key":"13_CR12","unstructured":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation). Official Journal of the European Union L119, pp. 1\u201388 (2016)"},{"key":"13_CR13","unstructured":"Deloitte\u2019s 2020 global blockchain survey (2020). https:\/\/www2.deloitte.com\/content\/dam\/insights\/us\/articles\/6608_2020-global-blockchain-survey\/DI_CIR%202020%20global%20blockchain%20survey.pdf"},{"key":"13_CR14","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, 23\u201326 April 2018, pp. 30:1\u201330:15 (2018)"},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"Androulaki, E., Camenisch, J., Caro, A.D., Dubovitskaya, M., Elkhiyaoui, K., Tackmann, B.: Privacy-preserving auditable token payments in a permissioned blockchain system. In: AFT 2020: 2nd ACM Conference on Advances in Financial Technologies, New York, NY, USA, 21\u201323 October 2020, pp. 255\u2013267. ACM (2020). https:\/\/doi.org\/10.1145\/3419614.3423259","DOI":"10.1145\/3419614.3423259"},{"key":"13_CR16","unstructured":"Barki, A., Gouget, A.: Achieving privacy and accountability in traceable digital currency. Cryptology ePrint Archive, Report 2020\/1565 (2020). https:\/\/eprint.iacr.org\/2020\/1565"},{"key":"13_CR17","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE Computer Society Press, May 2014. https:\/\/doi.org\/10.1109\/SP.2014.36","DOI":"10.1109\/SP.2014.36"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-642-36594-2_18","volume-title":"Theory of Cryptography","author":"N Bitansky","year":"2013","unstructured":"Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O., Ostrovsky, R.: Succinct non-interactive arguments via linear interactive proofs. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 315\u2013333. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36594-2_18"},{"key":"13_CR19","unstructured":"Bogatov, D., De Caro, A., Elkhiyaoui, K., Tackmann, B.: Anonymous transactions with revocation and auditing in hyperledger fabric. Cryptology ePrint Archive, Report 2019\/1097 (2019). https:\/\/eprint.iacr.org\/2019\/1097"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 93","author":"S Brands","year":"1994","unstructured":"Brands, S.: Untraceable off-line cash in wallet with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302\u2013318. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_26"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy, pp. 315\u2013334. IEEE Computer Society Press, May 2018. https:\/\/doi.org\/10.1109\/SP.2018.00020","DOI":"10.1109\/SP.2018.00020"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Cecchetti, E., Zhang, F., Ji, Y., Kosba, A.E., Juels, A., Shi, E.: Solidus: confidential distributed ledger transactions via PVORM. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, pp. 701\u2013717. ACM Press, October\/November 2017. https:\/\/doi.org\/10.1145\/3133956.3134010","DOI":"10.1145\/3133956.3134010"},{"key":"13_CR23","unstructured":"Chalkias, K., Lewi, K., Mohassel, P., Nikolaenko, V.: Distributed auditing proofs of liabilities. Cryptology ePrint Archive, Report 2020\/468 (2020). https:\/\/eprint.iacr.org\/2020\/468"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-662-53015-3_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"M Chase","year":"2016","unstructured":"Chase, M., Ganesh, C., Mohassel, P.: Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9816, pp. 499\u2013530. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53015-3_18"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Chatzigiannis, P., Baldimtsi, F.: Miniledger: compact-sized anonymous and auditable distributed payments. In: ESORICS 2021 (2021)","DOI":"10.1007\/978-3-030-88418-5_20"},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-030-58951-6_29","volume-title":"Computer Security \u2013 ESORICS 2020","author":"Yu Chen","year":"2020","unstructured":"Chen, Yu., Ma, X., Tang, C., Au, M.H.: PGC: decentralized confidential payment system with auditability. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 591\u2013610. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_29"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutor. 20(4), 3416\u20133452 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2842460","DOI":"10.1109\/COMST.2018.2842460"},{"key":"13_CR28","doi-asserted-by":"publisher","unstructured":"Dagher, G.G., B\u00fcnz, B., Bonneau, J., Clark, J., Boneh, D.: Provisions: privacy-preserving proofs of solvency for bitcoin exchanges. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015, pp. 720\u2013731. ACM Press, October 2015. https:\/\/doi.org\/10.1145\/2810103.2813674","DOI":"10.1145\/2810103.2813674"},{"key":"13_CR29","unstructured":"Damg\u00e5rd, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C., Siniscalchi, L.: Balancing privacy and accountability in blockchain identity management. Cryptology ePrint Archive, Report 2020\/1511 (2020). https:\/\/eprint.iacr.org\/2020\/1511"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-319-24177-7_28","volume-title":"Computer Security \u2013 ESORICS 2015","author":"C Decker","year":"2015","unstructured":"Decker, C., Guthrie, J., Seidel, J., Wattenhofer, R.: Making bitcoin exchanges transparent. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015, Part II. LNCS, vol. 9327, pp. 561\u2013576. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_28"},{"key":"13_CR31","unstructured":"Doerner, J., Shelat, A., Evans, D.: Zeroledge: proving solvency with privacy (2015)"},{"key":"13_CR32","doi-asserted-by":"publisher","unstructured":"Dutta, A., Vijayakumaran, S.: Mprove: a proof of reserves protocol for monero exchanges. In: 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2019, Stockholm, Sweden, 17\u201319 June 2019, pp. 330\u2013339. IEEE (2019). https:\/\/doi.org\/10.1109\/EuroSPW.2019.00043","DOI":"10.1109\/EuroSPW.2019.00043"},{"key":"13_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"key":"13_CR34","unstructured":"Frankle, J., Park, S., Shaar, D., Goldwasser, S., Weitzner, D.J.: Practical accountability of secret processes. In: Enck, W., Felt, A.P. (eds.) USENIX Security 2018, pp. 657\u2013674. USENIX Association, August 2018"},{"key":"13_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/978-3-030-17653-2_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"G Fuchsbauer","year":"2019","unstructured":"Fuchsbauer, G., Orr\u00f9, M., Seurin, Y.: Aggregate cash systems: a cryptographic investigation of mimblewimble. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part I. LNCS, vol. 11476, pp. 657\u2013689. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_22"},{"key":"13_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-030-40186-3_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2020","author":"J Garay","year":"2020","unstructured":"Garay, J., Kiayias, A.: SoK: a consensus taxonomy in the blockchain era. In: Jarecki, S. (ed.) CT-RSA 2020. LNCS, vol. 12006, pp. 284\u2013318. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40186-3_13"},{"key":"13_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-662-54970-4_5","volume-title":"Financial Cryptography and Data Security","author":"C Garman","year":"2017","unstructured":"Garman, C., Green, M., Miers, I.: Accountable privacy for decentralized anonymous payments. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 81\u201398. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_5"},{"key":"13_CR38","doi-asserted-by":"publisher","unstructured":"Goldwasser, S., Park, S.: Public accountability vs. secret laws: can they coexist?: a cryptographic proposal. In: Thuraisingham, B.M., Lee, A.J. (eds.) Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, 30 October\u20133 November 2017, pp. 99\u2013110. ACM (2017). https:\/\/doi.org\/10.1145\/3139550.3139565","DOI":"10.1145\/3139550.3139565"},{"key":"13_CR39","doi-asserted-by":"publisher","unstructured":"Graf, M., K\u00fcsters, R., Rausch, D.: Accountability in a permissioned blockchain: formal analysis of hyperledger fabric, pp. 236\u2013255 (2020). https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00023","DOI":"10.1109\/EuroSP48549.2020.00023"},{"key":"13_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/11496137_32","volume-title":"Applied Cryptography and Network Security","author":"J Groth","year":"2005","unstructured":"Groth, J.: Non-interactive zero-knowledge arguments for voting. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 467\u2013482. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_32"},{"key":"13_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016, Part II. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"13_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-04444-1_11","volume-title":"Computer Security \u2013 ESORICS 2009","author":"N Guts","year":"2009","unstructured":"Guts, N., Fournet, C., Zappa Nardelli, F.: Reliable evidence: auditability by typing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 168\u2013183. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04444-1_11"},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: TumbleBit: an untrusted bitcoin-compatible anonymous payment hub. In: NDSS 2017. The Internet Society, February\/March 2017","DOI":"10.14722\/ndss.2017.23086"},{"key":"13_CR44","doi-asserted-by":"publisher","unstructured":"Hu, K., Zhang, Z., Guo, K.: Breaking the binding: attacks on the merkle approach to prove liabilities and its applications. Comput. Secur. 87 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.101585","DOI":"10.1016\/j.cose.2019.101585"},{"key":"13_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"13_CR46","doi-asserted-by":"publisher","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: Accountability: definition and relationship to verifiability. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, pp. 526\u2013535. ACM Press, October 2010. https:\/\/doi.org\/10.1145\/1866307.1866366","DOI":"10.1145\/1866307.1866366"},{"issue":"3","key":"13_CR47","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R.E., Pease, M.C.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"13_CR48","unstructured":"Maxwell, G.: Coinjoin: Bitcoin privacy for the real world (2013). https:\/\/bitcointalk.org\/index.php?topic=279249.0"},{"key":"13_CR49","doi-asserted-by":"publisher","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Papagiannaki, K., Gummadi, P.K., Partridge, C. (eds.) Proceedings of the 2013 Internet Measurement Conference, IMC 2013, Barcelona, Spain, 23\u201325 October 2013, pp. 127\u2013140. ACM (2013). https:\/\/doi.org\/10.1145\/2504730.2504747","DOI":"10.1145\/2504730.2504747"},{"key":"13_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-39884-1_3","volume-title":"Financial Cryptography and Data Security","author":"T Moore","year":"2013","unstructured":"Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25\u201333. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_3"},{"key":"13_CR51","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"13_CR52","unstructured":"Narula, N., Vasquez, W., Virza, M.: zkledger: privacy-preserving auditing for distributed ledgers. In: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2018), Renton, WA, pp. 65\u201380. USENIX Association, April 2018. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/narula"},{"key":"13_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_9"},{"key":"13_CR54","unstructured":"Poelstra, A.: Mimblewimble (2016). https:\/\/download.wpsoftware.net\/bitcoin\/wizardry\/mimblewimble.pdf"},{"key":"13_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-662-58820-8_4","volume-title":"Financial Cryptography and Data Security","author":"A Poelstra","year":"2019","unstructured":"Poelstra, A., Back, A., Friedenbach, M., Maxwell, G., Wuille, P.: Confidential assets. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 43\u201363. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_4"},{"key":"13_CR56","unstructured":"Roose, S.: Standardizing bitcoin proof of reserves. https:\/\/blockstream.com\/2019\/02\/04\/en-standardizing-bitcoin-proof-of-reserves\/"},{"key":"13_CR57","unstructured":"Van Saberhagen, N.: Cryptonote v 2.0 (2013). https:\/\/cryptonote.org\/whitepaper.pdf"},{"key":"13_CR58","doi-asserted-by":"publisher","unstructured":"Wang, H., He, D., Ji, Y.: Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. Future Gener. Comput. Syst. 107, 854\u2013862 (2020). https:\/\/doi.org\/10.1016\/j.future.2017.06.028","DOI":"10.1016\/j.future.2017.06.028"},{"key":"13_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-030-32101-7_11","volume-title":"Financial Cryptography and Data Security","author":"K W\u00fcst","year":"2019","unstructured":"W\u00fcst, K., Kostiainen, K., \u010capkun, V., \u010capkun, S.: PRCash: fast, private and regulated transactions for digital currencies. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 158\u2013178. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_11"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78375-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T11:40:12Z","timestamp":1672400412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78375-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030783747","9783030783754"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78375-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kamakura","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"186","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.89","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7.81","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference took place virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}