{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:22:09Z","timestamp":1772907729099,"version":"3.50.1"},"publisher-location":"Cham","reference-count":96,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031182822","type":"print"},{"value":"9783031182839","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18283-9_31","type":"book-chapter","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:23:03Z","timestamp":1666383783000},"page":"615-641","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["SoK: Blockchain Light Clients"],"prefix":"10.1007","author":[{"given":"Panagiotis","family":"Chatzigiannis","sequence":"first","affiliation":[]},{"given":"Foteini","family":"Baldimtsi","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Chalkias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"31_CR1","unstructured":"Ask about geth: snapshot acceleration. https:\/\/blog.ethereum.org\/2020\/07\/17\/ask-about-geth-snapshot-acceleration\/"},{"key":"31_CR2","unstructured":"Bitcoin blockchain data torrent. https:\/\/bitcointalk.org\/index.php?topic=145386.0"},{"key":"31_CR3","unstructured":"Bitcoin core client. https:\/\/bitcoin.org\/en\/bitcoin-core\/"},{"key":"31_CR4","unstructured":"Bitcoin wiki - clients. https:\/\/en.bitcoin.it\/wiki\/Clients"},{"key":"31_CR5","unstructured":"Bitcoin wiki - scalability. https:\/\/en.bitcoin.it\/wiki\/Scalability#Simplified_payment_verification"},{"key":"31_CR6","unstructured":"Blockchain light client. https:\/\/medium.com\/codechain\/blockchain-light-client-1171dfa1269a"},{"key":"31_CR7","unstructured":"Breadwallet SPV bitcoin C library. https:\/\/github.com\/breadwallet\/breadwallet-core"},{"key":"31_CR8","unstructured":"Consensus engine of binance smart chain. https:\/\/docs.binance.org\/smart-chain\/guides\/concepts\/consensus.html"},{"key":"31_CR9","unstructured":"Diem client SDKs. https:\/\/github.com\/diem\/client-sdks"},{"key":"31_CR10","unstructured":"Diem verifying client. https:\/\/github.com\/diem\/diem\/blob\/main\/sdk\/client\/src\/verifying_client.rs"},{"key":"31_CR11","unstructured":"Dodging a bullet: Ethereum state problems. https:\/\/blog.ethereum.org\/2021\/05\/18\/eth_state_problems\/"},{"key":"31_CR12","unstructured":"Electrum docs - frequently asked questions. https:\/\/electrum.readthedocs.io\/en\/latest\/faq.html"},{"key":"31_CR13","unstructured":"Eth 2.0 specs - minimal light client. https:\/\/github.com\/ethereum\/eth2.0-specs\/blob\/dev\/specs\/altair\/sync-protocol.md"},{"key":"31_CR14","unstructured":"The ethereum-blockchain size will not exceed 1TB anytime soon. https:\/\/dev.to\/5chdn\/the-ethereum-blockchain-size-will-not-exceed-1tb-anytime-soon-58a"},{"key":"31_CR15","unstructured":"Ethereum nodes and clients. https:\/\/ethereum.org\/en\/developers\/docs\/nodes-and-clients\/"},{"key":"31_CR16","unstructured":"Explaining flyclient. https:\/\/electriccoin.co\/blog\/explaining-flyclient\/"},{"key":"31_CR17","unstructured":"How to run a light node with geth. https:\/\/ethereum.org\/en\/developers\/tutorials\/run-light-node-geth\/"},{"key":"31_CR18","unstructured":"An incomplete guide to rollups. https:\/\/vitalik.ca\/general\/2021\/01\/05\/rollup.html"},{"key":"31_CR19","unstructured":"Introducing heartwood. https:\/\/electriccoin.co\/blog\/introducing-heartwood\/"},{"key":"31_CR20","unstructured":"Mina documentation. https:\/\/docs.minaprotocol.com\/en"},{"key":"31_CR21","unstructured":"Mina protocol - a succinct blockchain. https:\/\/masked.medium.com\/the-coda-protocol-bbcb4b212b13"},{"key":"31_CR22","unstructured":"Nakamoto: a new bitcoin light-client. https:\/\/cloudhead.io\/nakamoto\/"},{"key":"31_CR23","unstructured":"The official diem client SDK for python. https:\/\/github.com\/diem\/client-sdk-python"},{"key":"31_CR24","unstructured":"Run a light client to join binance chain. https:\/\/docs.binance.org\/light-client.html"},{"key":"31_CR25","unstructured":"The stateless client concept. https:\/\/ethresear.ch\/t\/the-stateless-client-concept\/172"},{"key":"31_CR26","unstructured":"Storing UTXOs in a balanced Merkle tree. https:\/\/bitcointalk.org\/index.php?topic=101734.msg1117428"},{"key":"31_CR27","unstructured":"A suggestion for a light-client wallet (like the BTC SPV wallet with Merkle tree). https:\/\/forum.algorand.org\/t\/a-suggestion-for-a-light-client-wallet-like-the-btc-spv-wallet-with-merkle-tree\/1092\/4"},{"key":"31_CR28","unstructured":"Ultimate blockchain compression w\/ trust-free lite nodes. https:\/\/bitcointalk.org\/index.php?topic=88208.0\/"},{"key":"31_CR29","unstructured":"What is a light client and why you should care? https:\/\/www.parity.io\/blog\/what-is-a-light-client\/"},{"key":"31_CR30","unstructured":"Amsden, Z., et al.: The libra blockchain (2019). https:\/\/developers.libra.org\/docs\/assets\/papers\/the-libra-blockchain.pdf"},{"key":"31_CR31","doi-asserted-by":"publisher","unstructured":"Ashritha, K., Sindhu, M., Lakshmy, K.: Redactable blockchain using enhanced chameleon hash function. In: 2019 5th International Conference on Advanced Computing Communication Systems (ICACCS), pp. 323\u2013328 (2019). https:\/\/doi.org\/10.1109\/ICACCS.2019.8728524","DOI":"10.1109\/ICACCS.2019.8728524"},{"key":"31_CR32","doi-asserted-by":"publisher","unstructured":"Ateniese, G., Magri, B., Venturi, D., Andrade, E.R.: Redactable blockchain - or - rewriting history in bitcoin and friends. In: 2017 IEEE European Symposium on Security and Privacy, EuroS &P 2017, Paris, France, 26\u201328 April 2017, pp. 111\u2013126. IEEE (2017). https:\/\/doi.org\/10.1109\/EuroSP.2017.37","DOI":"10.1109\/EuroSP.2017.37"},{"key":"31_CR33","unstructured":"Aumasson, J.P., Shlomovits, O.: Attacking threshold wallets. Cryptology ePrint Archive, Report 2020\/1052 (2020). https:\/\/eprint.iacr.org\/2020\/1052"},{"key":"31_CR34","doi-asserted-by":"publisher","unstructured":"Badertscher, C., Gazi, P., Kiayias, A., Russell, A., Zikas, V.: Ouroboros genesis: composable proof-of-stake blockchains with dynamic availability. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018, pp. 913\u2013930. ACM Press, October 2018. https:\/\/doi.org\/10.1145\/3243734.3243848","DOI":"10.1145\/3243734.3243848"},{"key":"31_CR35","doi-asserted-by":"publisher","unstructured":"Baldimtsi, F., et al.: Accumulators with applications to anonymity-preserving revocation. In: 2017 IEEE European Symposium on Security and Privacy, EuroS &P 2017, Paris, France, 26\u201328 April 2017, pp. 301\u2013315. IEEE (2017). https:\/\/doi.org\/10.1109\/EuroSP.2017.13","DOI":"10.1109\/EuroSP.2017.13"},{"key":"31_CR36","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE Computer Society Press, May 2014. https:\/\/doi.org\/10.1109\/SP.2014.36","DOI":"10.1109\/SP.2014.36"},{"key":"31_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-030-26948-7_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"D Boneh","year":"2019","unstructured":"Boneh, D., B\u00fcnz, B., Fisch, B.: Batching techniques for accumulators with applications to IOPs and stateless blockchains. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019, Part I. LNCS, vol. 11692, pp. 561\u2013586. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_20"},{"key":"31_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"key":"31_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514\u2013532. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_30"},{"key":"31_CR40","unstructured":"Bonneau, J., Meckler, I., Rao, V., Shapiro, E.: Coda: decentralized cryptocurrency at scale. Cryptology ePrint Archive, Report 2020\/352 (2020). https:\/\/eprint.iacr.org\/2020\/352"},{"key":"31_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-030-67087-0_22","volume-title":"Networked Systems","author":"F Bonnet","year":"2021","unstructured":"Bonnet, F., Bramas, Q., D\u00e9fago, X.: Stateless distributed ledgers. In: Georgiou, C., Majumdar, R. (eds.) NETYS 2020. LNCS, vol. 12129, pp. 349\u2013354. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-67087-0_22"},{"key":"31_CR42","unstructured":"Braithwaite, S., et al.: A tendermint light client. CoRR abs\/2010.07031 (2020). https:\/\/arxiv.org\/abs\/2010.07031"},{"key":"31_CR43","unstructured":"Bruce, J.: The mini-blockchain scheme (2017). https:\/\/cryptonite.info\/files\/mbc-scheme-rev3.pdf"},{"key":"31_CR44","unstructured":"Buchman, E., Kwon, J., Milosevic, Z.: The latest gossip on BFT consensus. CoRR abs\/1807.04938 (2018). https:\/\/arxiv.org\/abs\/1807.04938"},{"key":"31_CR45","doi-asserted-by":"publisher","unstructured":"B\u00fcnz, B., Kiffer, L., Luu, L., Zamani, M.: FlyClient: super-light clients for cryptocurrencies. In: 2020 IEEE Symposium on Security and Privacy, pp. 928\u2013946. IEEE Computer Society Press, May 2020. https:\/\/doi.org\/10.1109\/SP40000.2020.00049","DOI":"10.1109\/SP40000.2020.00049"},{"key":"31_CR46","doi-asserted-by":"crossref","unstructured":"Canetti, R., Gennaro, R., Goldfeder, S., Makriyannis, N., Peled, U.: UC non-interactive, proactive, threshold ECDSA with identifiable aborts. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1769\u20131787 (2020)","DOI":"10.1145\/3372297.3423367"},{"key":"31_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-36362-7_5","volume-title":"Public-Key Cryptography \u2013 PKC 2013","author":"D Catalano","year":"2013","unstructured":"Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 55\u201372. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36362-7_5"},{"key":"31_CR48","unstructured":"Chaidos, P., Kiayias, A.: Mithril: stake-based threshold multisignatures. Cryptology ePrint Archive, Report 2021\/916 (2021). https:\/\/ia.cr\/2021\/916"},{"key":"31_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-030-75539-3_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2021","author":"K Chalkias","year":"2021","unstructured":"Chalkias, K., Garillot, F., Kondi, Y., Nikolaenko, V.: Non-interactive half-aggregation of EdDSA and variants of schnorr signatures. In: Paterson, K.G. (ed.) CT-RSA 2021. LNCS, vol. 12704, pp. 577\u2013608. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75539-3_24"},{"key":"31_CR50","doi-asserted-by":"crossref","unstructured":"Chatzigiannis, P., Baldimtsi, F.: Miniledger: compact-sized anonymous and auditable distributed payments. Cryptology ePrint Archive, Report 2021\/869 (2021). https:\/\/eprint.iacr.org\/2021\/869","DOI":"10.1007\/978-3-030-88418-5_20"},{"key":"31_CR51","unstructured":"Chatzigiannis, P., Chalkias, K.: Proof of assets in the diem blockchain. Cryptology ePrint Archive, Report 2021\/598 (2021). https:\/\/eprint.iacr.org\/2021\/598"},{"key":"31_CR52","unstructured":"Chen, W., Chiesa, A., Dauterman, E., Ward, N.P.: Reducing participation costs via incremental verification for ledger systems. Cryptology ePrint Archive, Report 2020\/1522 (2020). https:\/\/ia.cr\/2020\/1522"},{"key":"31_CR53","unstructured":"Chepurnoy, A., Larangeira, M., Ojiganov, A.: Rollerchain, a blockchain with safely pruneable full blocks (2016)"},{"key":"31_CR54","unstructured":"Chepurnoy, A., Papamanthou, C., Zhang, Y.: Edrax: a cryptocurrency with stateless transaction validation. Cryptology ePrint Archive, Report 2018\/968 (2018). https:\/\/eprint.iacr.org\/2018\/968"},{"key":"31_CR55","doi-asserted-by":"crossref","unstructured":"Derler, D., Samelin, K., Slamanig, D., Striecks, C.: Fine-grained and controlled rewriting in blockchains: chameleon-hashing gone attribute-based. In: NDSS 2019. The Internet Society, February 2019","DOI":"10.14722\/ndss.2019.23066"},{"key":"31_CR56","doi-asserted-by":"publisher","unstructured":"Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In: 2019 IEEE Symposium on Security and Privacy, pp. 124\u2013138. IEEE Computer Society Press, May 2019. https:\/\/doi.org\/10.1109\/SP.2019.00039","DOI":"10.1109\/SP.2019.00039"},{"key":"31_CR57","unstructured":"Dryja, T.: Utreexo: a dynamic hash-based accumulator optimized for the bitcoin UTXO set. Cryptology ePrint Archive, Report 2019\/611 (2019). https:\/\/eprint.iacr.org\/2019\/611"},{"key":"31_CR58","unstructured":"Gabizon, A., et al.: Plumo: towards scalable interoperable blockchains using ultra light validation systems (2020)"},{"key":"31_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-319-76581-5_16","volume-title":"Public-Key Cryptography \u2013 PKC 2018","author":"JA Garay","year":"2018","unstructured":"Garay, J.A., Kiayias, A., Leonardos, N., Panagiotakos, G.: Bootstrapping the blockchain, with applications to consensus and fast PKI setup. In: Abdalla, M., Dahab, R. (eds.) PKC 2018, Part II. LNCS, vol. 10770, pp. 465\u2013495. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76581-5_16"},{"key":"31_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-030-84242-0_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2021","author":"F Garillot","year":"2021","unstructured":"Garillot, F., Kondi, Y., Mohassel, P., Nikolaenko, V.: Threshold schnorr with stateless deterministic signing from standard assumptions. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 127\u2013156. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84242-0_6"},{"key":"31_CR61","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Woo, S.L.M.: Establishing software root of trust unconditionally. In: NDSS 2019. The Internet Society, February 2019","DOI":"10.14722\/ndss.2019.23170"},{"key":"31_CR62","unstructured":"Goes, C.: The interblockchain communication protocol: an overview. CoRR abs\/2006.15918 (2020). https:\/\/arxiv.org\/abs\/2006.15918"},{"key":"31_CR63","doi-asserted-by":"publisher","unstructured":"Gorbunov, S., Reyzin, L., Wee, H., Zhang, Z.: Pointproofs: aggregating proofs for multiple vector commitments. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020, pp. 2007\u20132023. ACM Press, November 2020. https:\/\/doi.org\/10.1145\/3372297.3417244","DOI":"10.1145\/3372297.3417244"},{"key":"31_CR64","unstructured":"Groth, J.: Introducing noninteractive distributed key generation. https:\/\/medium.com\/dfinity\/applied-crypto-one-public-key-for-the-internet-computer-ni-dkg-4af800db869d"},{"key":"31_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016, Part II. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"31_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-030-51280-4_12","volume-title":"Financial Cryptography and Data Security","author":"L Gudgeon","year":"2020","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: layer-two blockchain protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 201\u2013226. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_12"},{"key":"31_CR67","doi-asserted-by":"publisher","first-page":"125244","DOI":"10.1109\/ACCESS.2020.3007251","volume":"8","author":"A Hafid","year":"2020","unstructured":"Hafid, A., Hafid, A.S., Samih, M.: Scaling blockchains: a comprehensive survey. IEEE Access 8, 125244\u2013125262 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3007251","journal-title":"IEEE Access"},{"key":"31_CR68","unstructured":"Hanke, T., Movahedi, M., Williams, D.: Dfinity technology overview series, consensus system (2018)"},{"key":"31_CR69","unstructured":"Hearn, M., Brown, R.G.: Corda: a distributed ledger (2019). https:\/\/www.corda.net\/wp-content\/uploads\/2019\/08\/corda-technical-whitepaper-August-29-2019.pdf"},{"key":"31_CR70","unstructured":"Karakostas, D., Karayannidis, N., Kiayias, A.: Efficient state management in distributed ledgers. Cryptology ePrint Archive, Report 2021\/183 (2021). https:\/\/eprint.iacr.org\/2021\/183"},{"key":"31_CR71","unstructured":"Karantias, K.: SoK: a taxonomy of cryptocurrency wallets. Cryptology ePrint Archive, Report 2020\/868 (2020). https:\/\/eprint.iacr.org\/2020\/868"},{"key":"31_CR72","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"A Kate","year":"2010","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177\u2013194. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_11"},{"key":"31_CR73","unstructured":"Kattis, A., Bonneau, J.: Proof of necessary work: succinct state verification with fairness guarantees. Cryptology ePrint Archive, Report 2020\/190 (2020). https:\/\/eprint.iacr.org\/2020\/190"},{"key":"31_CR74","doi-asserted-by":"crossref","unstructured":"Khaburzaniya, I., Chalkias, K., Lewi, K., Malvai, H.: Aggregating hash-based signatures using starks. Cryptology ePrint Archive, Report 2021\/1048 (2021). https:\/\/ia.cr\/2021\/1048","DOI":"10.1145\/3488932.3524128"},{"key":"31_CR75","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-030-51280-4_27","volume-title":"Financial Cryptography and Data Security","author":"A Kiayias","year":"2020","unstructured":"Kiayias, A., Miller, A., Zindros, D.: Non-interactive proofs of proof-of-work. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 505\u2013522. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_27"},{"key":"31_CR76","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Polydouri, A., Zindros, D.: The velvet path to superlight blockchain clients. Cryptology ePrint Archive, Report 2020\/1122 (2020). https:\/\/eprint.iacr.org\/2020\/1122","DOI":"10.1145\/3479722.3480999"},{"key":"31_CR77","doi-asserted-by":"publisher","unstructured":"Kim, J., Lee, J., Koo, Y., Park, S., Moon, S.: Ethanos: efficient bootstrapping for full nodes on account-based blockchain. In: Barbalace, A., Bhatotia, P., Alvisi, L., Cadar, C. (eds.) EuroSys 2021: Sixteenth European Conference on Computer Systems, Online Event, United Kingdom, 26\u201328 April 2021, pp. 99\u2013113. ACM (2021). https:\/\/doi.org\/10.1145\/3447786.3456231","DOI":"10.1145\/3447786.3456231"},{"key":"31_CR78","doi-asserted-by":"publisher","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: OmniLedger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy, pp. 583\u2013598. IEEE Computer Society Press, May 2018. https:\/\/doi.org\/10.1109\/SP.2018.000-5","DOI":"10.1109\/SP.2018.000-5"},{"key":"31_CR79","unstructured":"Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. Cryptology ePrint Archive, Report 1998\/010 (1998). https:\/\/eprint.iacr.org\/1998\/010"},{"key":"31_CR80","doi-asserted-by":"crossref","unstructured":"Leung, D., Suhl, A., Gilad, Y., Zeldovich, N.: Vault: fast bootstrapping for the algorand cryptocurrency. In: NDSS 2019. The Internet Society, February 2019","DOI":"10.14722\/ndss.2019.23313"},{"key":"31_CR81","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/978-3-030-59013-0_35","volume-title":"Computer Security \u2013 ESORICS 2020","author":"Y Lu","year":"2020","unstructured":"Lu, Y., Tang, Q., Wang, G.: Generic superlight client for permissionless blockchains. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020, Part II. LNCS, vol. 12309, pp. 713\u2013733. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59013-0_35"},{"key":"31_CR82","doi-asserted-by":"publisher","unstructured":"Manevich, Y., Barger, A., Assa, G.: Redacting transactions from execute-order-validate blockchains. In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, Sydney, Australia, 3\u20136 May 2021, pp. 1\u20139. IEEE (2021). https:\/\/doi.org\/10.1109\/ICBC51069.2021.9461093","DOI":"10.1109\/ICBC51069.2021.9461093"},{"key":"31_CR83","doi-asserted-by":"publisher","unstructured":"Marsalek, A., Zefferer, T., Fasllija, E., Ziegler, D.: Tackling data inefficiency: compressing the bitcoin blockchain. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 626\u2013633 (2019). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2019.00089","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00089"},{"key":"31_CR84","unstructured":"Matzutt, R., Kalde, B., Pennekamp, J., Drichel, A., Henze, M., Wehrle, K.: How to securely prune bitcoin\u2019s blockchain. In: 2020 IFIP Networking Conference, Networking 2020, Paris, France, 22\u201326 June 2020, pp. 298\u2013306. IEEE (2020). https:\/\/ieeexplore.ieee.org\/document\/9142720"},{"key":"31_CR85","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-48184-2_32"},{"key":"31_CR86","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"31_CR87","doi-asserted-by":"publisher","unstructured":"Palm, E., Schel\u00e9n, O., Bodin, U.: Selective blockchain transaction pruning and state derivability. In: Crypto Valley Conference on Blockchain Technology, CVCBT 2018, Zug, Switzerland, 20\u201322 June 2018, pp. 31\u201340. IEEE (2018). https:\/\/doi.org\/10.1109\/CVCBT.2018.00009","DOI":"10.1109\/CVCBT.2018.00009"},{"key":"31_CR88","doi-asserted-by":"publisher","unstructured":"Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238\u2013252. IEEE Computer Society Press, May 2013. https:\/\/doi.org\/10.1109\/SP.2013.47","DOI":"10.1109\/SP.2013.47"},{"key":"31_CR89","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-319-70972-7_21","volume-title":"Financial Cryptography and Data Security","author":"L Reyzin","year":"2017","unstructured":"Reyzin, L., Meshkov, D., Chepurnoy, A., Ivanov, S.: Improving authenticated dynamic dictionaries, with applications to cryptocurrencies. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 376\u2013392. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_21"},{"key":"31_CR90","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-319-44618-9_16","volume-title":"Security and Cryptography for Networks","author":"L Reyzin","year":"2016","unstructured":"Reyzin, L., Yakoubov, S.: Efficient asynchronous accumulators for distributed PKI. In: Zikas, V., De Prisco, R. (eds.) SCN 2016. LNCS, vol. 9841, pp. 292\u2013309. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44618-9_16"},{"key":"31_CR91","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"V Shoup","year":"2000","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207\u2013220. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_15"},{"key":"31_CR92","unstructured":"Srinivasan, S., Chepurnoy, A., Papamanthou, C., Tomescu, A., Zhang, Y.: Hyperproofs: aggregating and maintaining proofs in vector commitments. Cryptology ePrint Archive, Report 2021\/599 (2021). https:\/\/eprint.iacr.org\/2021\/599"},{"key":"31_CR93","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-57990-6_3","volume-title":"Security and Cryptography for Networks","author":"A Tomescu","year":"2020","unstructured":"Tomescu, A., Abraham, I., Buterin, V., Drake, J., Feist, D., Khovratovich, D.: Aggregatable subvector commitments for stateless cryptocurrencies. In: Galdi, C., Kolesnikov, V. (eds.) SCN 2020. LNCS, vol. 12238, pp. 45\u201364. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57990-6_3"},{"key":"31_CR94","unstructured":"White, B.: A theory for lightweight cryptocurrency ledgers (2015). https:\/\/raw.githubusercontent.com\/input-output-hk\/qeditas-ledgertheory\/master\/lightcrypto.pdf"},{"key":"31_CR95","unstructured":"Wood, G.: Ethereum: A secure decentralized generalised transaction ledger (2021). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf. Accessed 14 Feb 2021"},{"key":"31_CR96","doi-asserted-by":"crossref","unstructured":"Zamyatin, A., Avarikioti, Z., Perez, D., Knottenbelt, W.J.: TxChain: efficient cryptocurrency light clients via contingent transaction aggregation. Cryptology ePrint Archive, Report 2020\/580 (2020). https:\/\/eprint.iacr.org\/2020\/580","DOI":"10.1007\/978-3-030-66172-4_18"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18283-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:28:06Z","timestamp":1666384086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18283-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031182822","9783031182839"],"references-count":96,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18283-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}