{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:23:27Z","timestamp":1743071007409,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031376788"},{"type":"electronic","value":"9783031376795"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37679-5_13","type":"book-chapter","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T20:31:15Z","timestamp":1689193875000},"page":"285-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Maraved\u00ed: A Secure and\u00a0Practical Protocol to\u00a0Trade Risk for\u00a0Instantaneous Finality"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7168-898X","authenticated-orcid":false,"given":"Mario","family":"Larangeira","sequence":"first","affiliation":[]},{"given":"Maxim","family":"Jourenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"13_CR1","unstructured":"Avarikioti, G., Thyfronitis Litos, O.S., Wattenhofer, R.: Cerberus channels: incentivizing watchtowers for bitcoin. Cryptology ePrint Archive, Report 2019\/1092 (2019). https:\/\/eprint.iacr.org\/2019\/1092"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-030-51280-4_19","volume-title":"Financial Cryptography and Data Security","author":"Z Avarikioti","year":"2020","unstructured":"Avarikioti, Z., Thyfronitis Litos, O.S., Wattenhofer, R.: Cerberus channels: incentivizing watchtowers for bitcoin. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 346\u2013366. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_19"},{"key":"13_CR3","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance (1999)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-78375-8_3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"B David","year":"2018","unstructured":"David, B., Ga\u017ei, P., Kiayias, A., Russell, A.: Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 66\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_3"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-030-57990-6_2","volume-title":"Security and Cryptography for Networks","author":"T Dinsdale-Young","year":"2020","unstructured":"Dinsdale-Young, T., Magri, B., Matt, C., Nielsen, J.B., Tschudi, D.: Afgjort: a partially synchronous finality layer for blockchains. In: Galdi, C., Kolesnikov, V. (eds.) SCN 2020. LNCS, vol. 12238, pp. 24\u201344. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57990-6_2"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Eckey, L., Faust, S., Malinowski, D.: Perun: virtual payment hubs over cryptocurrencies. In: 2019 IEEE Symposium on Security and Privacy, 19\u201323 May 2019, pp. 106\u2013123, San Francisco, CA, USA. IEEE Computer Society Press (2019)","DOI":"10.1109\/SP.2019.00020"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Faust, S., Host\u00e1kov\u00e1, K.: General state channel networks. In: Lie, D., Mannan, M., Backes, M., Wang, X.F. (eds.) 25th Conference on Computer and Communications Security (ACM CCS 2018), 15\u201319 October 2018, pp. 949\u2013966, Toronto, ON, Canada. ACM Press (2018)","DOI":"10.1145\/3243734.3243856"},{"key":"13_CR8","unstructured":"Cardano Stack Exchange. Confusion about the time until true immutability (2022). https:\/\/cardano.stackexchange.com\/questions\/8943\/confusion-about-the-time-until-true-immutability. Accessed 12 Sept 2022"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles (SOSP 2017), pp. 51\u201368, New York, NY, USA. ACM (2017)","DOI":"10.1145\/3132747.3132757"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/3-540-39568-7_37","volume-title":"Advances in Cryptology","author":"S Goldwasser","year":"1985","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A \u201cparadoxical\u2019\u2019 solution to the signature problem. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, p. 467. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_37"},{"key":"13_CR11","unstructured":"Pay Hub: Payments hub. https:\/\/paymentshub.io. Accessed Feb 2023"},{"key":"13_CR12","unstructured":"Jourenko, M., Kurazumi, K., Larangeira, M., Tanaka, K.: SoK: a taxonomy for layer-2 scalability related protocols for cryptocurrencies. Cryptology ePrint Archive, Report 2019\/352 (2019). https:\/\/eprint.iacr.org\/2019\/352"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-030-65411-5_18","volume-title":"Cryptology and Network Security","author":"M Jourenko","year":"2020","unstructured":"Jourenko, M., Larangeira, M., Tanaka, K.: Lightweight virtual payment channels. In: Krenn, S., Shulman, H., Vaudenay, S. (eds.) CANS 2020. LNCS, vol. 12579, pp. 365\u2013384. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65411-5_18"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-662-64331-0_10","volume-title":"Financial Cryptography and Data Security","author":"M Jourenko","year":"2021","unstructured":"Jourenko, M., Larangeira, M., Tanaka, K.: Payment trees: low collateral payments for payment channel networks. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 189\u2013208. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_10"},{"key":"13_CR15","unstructured":"Khalil, R., Zamyatin, A., Felley, G., Moreno-Sanchez, P., Gervais, A.: Commit-chains: secure, scalable off-chain payments. Cryptology ePrint Archive, Paper 2018\/642 (2018). https:\/\/eprint.iacr.org\/2018\/642"},{"key":"13_CR16","unstructured":"Kiayias, A., Litos, O.S.T.: A composable security treatment of the lightning network. Cryptology ePrint Archive, Report 2019\/778 (2019). https:\/\/eprint.iacr.org\/2019\/778"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) 24th Conference on Computer and Communications Security (ACM CCS 2017), 31 October\u20132 November 2017, pp. 455\u2013471, Dallas, TX, USA. ACM Press (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-030-32101-7_30","volume-title":"Financial Cryptography and Data Security","author":"A Miller","year":"2019","unstructured":"Miller, A., Bentov, I., Bakshi, S., Kumaresan, R., McCorry, P.: Sprites and state channels: payment networks that go faster than lightning. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 508\u2013526. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_30"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-662-64331-0_9","volume-title":"Financial Cryptography and Data Security","author":"A Mizrahi","year":"2021","unstructured":"Mizrahi, A., Zohar, A.: Congestion attacks in payment channel networks. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 170\u2013188. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_9"},{"key":"13_CR20","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-78375-8_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"R Pass","year":"2018","unstructured":"Pass, R., Shi, E.: Thunderella: blockchains with optimistic instant confirmation. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 3\u201333. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_1"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11780656_18","volume-title":"Information Security and Privacy","author":"KG Paterson","year":"2006","unstructured":"Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 207\u2013222. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11780656_18"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-030-51280-4_14","volume-title":"Financial Cryptography and Data Security","author":"C P\u00e9rez-Sol\u00e0","year":"2020","unstructured":"P\u00e9rez-Sol\u00e0, C., Ranchal-Pedrosa, A., Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Garcia-Alfaro, J.: LockDown: balance availability attack against lightning network channels. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 245\u2013263. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_14"},{"key":"13_CR24","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"13_CR25","unstructured":"Sedgwick, K.: No, Visa doesn\u2019t handle 24,000 TPS and neither does your pet blockchain (2018). https:\/\/news.bitcoin.com\/no-visa-doesnt-handle-24000-tps-and-neither-does-your-pet-blockchain\/. Accessed 12 Sept 2022"},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"key":"13_CR27","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37679-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T20:31:45Z","timestamp":1689193905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37679-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031376788","9783031376795"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37679-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sousse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}