{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:22:02Z","timestamp":1777591322923,"version":"3.51.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031477508","type":"print"},{"value":"9783031477515","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47751-5_18","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T17:02:23Z","timestamp":1701363743000},"page":"310-326","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Cryptoeconomic Security for\u00a0Data Availability Committees"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6061-9700","authenticated-orcid":false,"given":"Ertem Nusret","family":"Tas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0820-0421","authenticated-orcid":false,"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"18_CR1","unstructured":"Eigenlaye. https:\/\/www.layrlabs.com\/ Accessed 1 Aug 2022"},{"key":"18_CR2","unstructured":"Ethereum average gas price. https:\/\/ycharts.com\/indicators\/ethereum_average_gas_price Accessed 15 Jul 2022"},{"key":"18_CR3","unstructured":"Ethereum historical data. https:\/\/www.investing.com\/crypto\/ethereum\/historical-data Accessed 15 Jul 2022"},{"key":"18_CR4","unstructured":"StarkEx v4. https:\/\/docs.starkware.co\/starkex-v4\/ Accessed 1 Mar 2022"},{"key":"18_CR5","unstructured":"zkPorter: a breakthrough in L2 scaling (2021). https:\/\/blog.matter-labs.io\/zkporter-a-breakthrough-in-l2-scaling-ed5e48842fbf"},{"key":"18_CR6","unstructured":"Al-Bassam, M.: Lazyledger: a distributed data availability ledger with client-side smart contracts. arXiv:1905.09274 (2019)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-662-64331-0_15","volume-title":"Financial Cryptography and Data Security","author":"M Al-Bassam","year":"2021","unstructured":"Al-Bassam, M., Sonnino, A., Buterin, V., Khoffi, I.: Fraud and data availability proofs: detecting invalid blocks in light clients. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 279\u2013298. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_15"},{"key":"18_CR8","unstructured":"Anderrson, S.: ETH 2.0 crosses 300,000 validators, Ether deposits worth 28.9B already locked (2022). https:\/\/www.thecoinrepublic.com\/2022\/03\/05\/eth-2-0-crosses-300000-validators-ether-deposits-worth-28-9b-already-locked\/"},{"key":"18_CR9","unstructured":"Breidenbach, L., et al.: Chainlink 2.0: Next steps in the evolution of decentralized oracle networks. Whitepaper (2021). https:\/\/research.chain.link\/whitepaper-v2.pdf"},{"key":"18_CR10","unstructured":"Buterin, V.: On-chain scaling to potentially $$\\sim $$500 tx\/sec through mass tx validation (2018). https:\/\/ethresear.ch\/t\/on-chain-scaling-to-potentially-500-tx-sec-through-mass-tx-validation\/3477"},{"key":"18_CR11","unstructured":"Buterin, V.: 2D data availability with kate commitments (2020). https:\/\/ethresear.ch\/t\/2d-data-availability-with-kate-commitments\/8081"},{"key":"18_CR12","unstructured":"Buterin, V.: Proto-danksharding faq (2022)"},{"key":"18_CR13","unstructured":"Buterin, V., Griffith, V.: Casper the friendly finality gadget. arXiv:1710.09437 (2019). https:\/\/arxiv.org\/abs\/1710.09437"},{"key":"18_CR14","unstructured":"Drake, J.: Starkex validium ransom attack (2020). https:\/\/notes.ethereum.org\/DD7GyItYQ02d0ax_X-UbWg?view"},{"key":"18_CR15","unstructured":"Ellis, S., Juels, A., Nazarov, S.: Chainlink a decentralized oracle network. Whitepaper (2017). https:\/\/research.chain.link\/whitepaper-v1.pdf"},{"key":"18_CR16","unstructured":"Feist, D.: Proofs of custody (2021). https:\/\/dankradfeist.de\/ethereum\/2021\/09\/30\/proofs-of-custody.html"},{"key":"18_CR17","unstructured":"Feist, D.: New sharding design with tight beacon and shard block integration (2022). https:\/\/notes.ethereum.org\/@dankrad\/new_sharding"},{"key":"18_CR18","unstructured":"Fisch, B.: Poreps: Proofs of space on useful data. Cryptology ePrint Archive:2018\/678 (2018). https:\/\/eprint.iacr.org\/2018\/678"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-030-51280-4_12","volume-title":"Financial Cryptography and Data Security","author":"L Gudgeon","year":"2020","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: layer-two blockchain protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 201\u2013226. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_12"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"A Kate","year":"2010","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177\u2013194. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_11"},{"key":"18_CR21","unstructured":"McCorry, P., Buckland, C., Yee, B., Song, D.: Sok: validating bridges as a scaling solution for blockchains. Cryptology ePrint Archive:2021\/1589 (2021). https:\/\/eprint.iacr.org\/2021\/1589"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: Repurposing bitcoin work for data preservation. In: IEEE Symposium on Security and Privacy, pp. 475\u2013490. IEEE Computer Society (2014)","DOI":"10.1109\/SP.2014.37"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Nazirkhanova, K., Neu, J., Tse, D.: Information dispersal with provable retrievability for rollups. arXiv:2111.12323 (2021). in ACM Advances in Financial Technologies - AFT 2022","DOI":"10.1145\/3558535.3559778"},{"key":"18_CR24","unstructured":"Polygon: Avail - the data availability blockchain (2021). https:\/\/github.com\/maticnetwork\/data-availability"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Psaras, Y., Dias, D.: The interplanetary file system and the filecoin network. In: DSN (Supplements), p. 80. IEEE (2020)","DOI":"10.1109\/DSN-S50200.2020.00043"},{"key":"18_CR26","unstructured":"Sriram, A., Adler, J.: The Ethereum Off-Chain Data Availability Landscape (2022). https:\/\/blog.celestia.org\/ethereum-off-chain-data-availability-landscape\/"},{"key":"18_CR27","unstructured":"Sriram, A., Adler, J., Al-Bassam, M.: Quantum gravity bridge: Secure off-chain data availability for ethereum l2s with celestia (2022). https:\/\/blog.celestia.org\/celestiums\/"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Tas, E.N., Boneh, D.: Cryptoeconomic security for data availability committees. arXiv:2208.02999 (2022)","DOI":"10.1007\/978-3-031-47751-5_18"},{"key":"18_CR29","unstructured":"Williams, S., Diordiiev, V., Berman, L., Raybould, I., Uemlianin, I.: Arweave: A protocol for economically sustainable information permanence. Yellow paper (2019). https:\/\/www.arweave.org\/yellow-paper.pdf"},{"key":"18_CR30","unstructured":"Yee, B., Song, D., McCorry, P., Buckland, C.: Shades of finality and layer 2 scaling. arXiv:2201.07920 (2022)"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Yu, M., Sahraei, S., Li, S., Avestimehr, S., Kannan, S., Viswanath, P.: Coded merkle tree: solving data availability attacks in blockchains. In: Financial Cryptography. Lecture Notes in Computer Science, vol. 12059, pp. 114\u2013134. Springer (2020)","DOI":"10.1007\/978-3-030-51280-4_8"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47751-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T02:30:59Z","timestamp":1703644259000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47751-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031477508","9783031477515"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47751-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bol, Bra\u010d","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc23.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"182","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 7 full papers have been accepted from 18 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}