{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:41:36Z","timestamp":1757540496994,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031709029"},{"type":"electronic","value":"9783031709036"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70903-6_3","type":"book-chapter","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:04:30Z","timestamp":1725487470000},"page":"45-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Plug-and-Play Long-Range Defense System for\u00a0Proof-of-Stake Blockchains"],"prefix":"10.1007","author":[{"given":"Lucien K. L.","family":"Ng","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Chatzigiannis","sequence":"additional","affiliation":[]},{"given":"Duc V.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Minaei","sequence":"additional","affiliation":[]},{"given":"Ranjit","family":"Kumaresan","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Zamani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"key":"3_CR1","unstructured":"Ethereum validator queue. https:\/\/www.validatorqueue.com\/"},{"key":"3_CR2","unstructured":"Ethereum withdrawals: a comprehensive faq. https:\/\/figment.io\/insights\/ethereum-withdrawals-a-comprehensive-faq\/"},{"key":"3_CR3","unstructured":"Hierarchical finality gadget. https:\/\/ethresear.ch\/t\/hierarchical-finality-gadget\/6829"},{"key":"3_CR4","unstructured":"Randomx benchmark. https:\/\/xmrig.com\/benchmark\/1"},{"key":"3_CR5","unstructured":"Randomx github repository. https:\/\/github.com\/tevador\/RandomX"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-031-30617-4_10","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"H Abusalah","year":"2023","unstructured":"Abusalah, H., Cini, V.: An incremental posw for general weight distributions. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14005, pp. 282\u2013311. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-30617-4_10"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Abusalah, H., Fuchsbauer, G., Ga\u017ei, P., Klein, K.: SNACKs: leveraging proofs of sequential work for blockchain light clients. Cryptology ePrint Archive, Report 2022\/240 (2022). https:\/\/eprint.iacr.org\/2022\/240","DOI":"10.1007\/978-3-031-22963-3_27"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-030-17656-3_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"H Abusalah","year":"2019","unstructured":"Abusalah, H., Kamath, C., Klein, K., Pietrzak, K., Walter, M.: Reversible proofs of sequential work. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11477, pp. 277\u2013291. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17656-3_10"},{"key":"3_CR9","unstructured":"Azouvi, S., Cachin, C., Le, D.V., Vukolic, M., Zanolini, L.: Modeling resources in permissionless longest-chain total-order broadcast. In: OPODIS. LIPIcs, vol.\u00a0253, pp. 19:1\u201319:23. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2022)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Azouvi, S., Danezis, G., Nikolaenko, V.: Winkle: foiling long-range attacks in proof-of-stake systems. Cryptology ePrint Archive, Report 2019\/1440 (2019)","DOI":"10.1145\/3419614.3423260"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Azouvi, S., Vukolic, M.: Pikachu: securing pos blockchains from long-range attacks by checkpointing into bitcoin pow using taproot. CoRR arxiv:2208.05408 (2022)","DOI":"10.1145\/3560829.3563563"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/978-3-319-96884-1_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Bonneau, J., B\u00fcnz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 757\u2013788. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_25"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"B\u00fcnz, B., Kiffer, L., Luu, L., Zamani, M.: FlyClient: super-light clients for cryptocurrencies. In: 2020 IEEE Symposium on Security and Privacy, pp. 928\u2013946. IEEE Computer Society Press (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00049","DOI":"10.1109\/SP40000.2020.00049"},{"key":"3_CR14","unstructured":"Buterin, V., Griffith, V.: Casper the friendly finality gadget (2019)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-319-78375-8_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"B Cohen","year":"2018","unstructured":"Cohen, B., Pietrzak, K.: Simple proofs of sequential work. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 451\u2013467. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_15"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Deb, S., Kannan, S., Tse, D.: Posat: proof-of-work availability and unpredictability, without the work. In: Borisov, N., D\u00edaz, C. (eds.) FC (2021)","DOI":"10.1007\/978-3-662-64331-0_6"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-030-17656-3_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"N D\u00f6ttling","year":"2019","unstructured":"D\u00f6ttling, N., Lai, R.W.F., Malavolta, G.: Incremental proofs of sequential work. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11477, pp. 292\u2013323. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17656-3_11"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-030-45727-3_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"N Ephraim","year":"2020","unstructured":"Ephraim, N., Freitag, C., Komargodski, I., Pass, R.: Continuous verifiable delay functions. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12107, pp. 125\u2013154. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45727-3_5"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Fitzi, M., Wang, X., Kannan, S., Kiayias, A., Leonardos, N., Viswanath, P., Wang, G.: Minotaur: Multi-resource blockchain consensus. Cryptology ePrint Archive, Report 2022\/104 (2022). https:\/\/eprint.iacr.org\/2022\/104","DOI":"10.1145\/3548606.3559356"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1007\/978-3-031-38554-4_25","volume-title":"CRYPTO 2023","author":"RWF Lai","year":"2023","unstructured":"Lai, R.W.F., Malavolta, G.: Lattice-based timed cryptography. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023. LNCS, vol. 14085, pp. 782\u2013804. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-38554-4_25"},{"key":"3_CR22","unstructured":"Lewis-Pye, A., Roughgarden, T.: Permissionless consensus. arXiv preprint arXiv:2304.14701 (2023)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Mahmoody, M., Moran, T., Vadhan, S.P.: Publicly verifiable proofs of sequential work. In: Kleinberg, R.D. (ed.) Innovations in Theoretical Computer Science, ITCS 2013, Berkeley, CA, USA, 9\u201312 January 2013, pp. 373\u2013388. ACM (2013)","DOI":"10.1145\/2422436.2422479"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Mahmoody, M., Moran, T., Vadhan, S.P.: Publicly verifiable proofs of sequential work. In: Kleinberg, R.D. (ed.) ITCS 2013, pp. 373\u2013388. ACM (2013)","DOI":"10.1145\/2422436.2422479"},{"key":"3_CR25","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"3_CR26","unstructured":"Pietrzak, K.: Simple verifiable delay functions. In: Blum, A. (ed.) ITCS 2019, vol.\u00a0124, pp. 60:1\u201360:15. LIPIcs (2019)"},{"key":"3_CR27","unstructured":"Tas, E.N., Tse, D., Yu, F., Kannan, S.: Babylon: reusing bitcoin mining to enhance proof-of-stake security. Cryptology ePrint Archive, Report 2022\/076 (2022)"},{"key":"3_CR28","unstructured":"Tas, E.N., Zindros, D., Yang, L., Tse, D.: Light clients for lazy blockchains. arXiv preprint arXiv:2203.15968 (2022)"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-030-17659-4_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"B Wesolowski","year":"2019","unstructured":"Wesolowski, B.: Efficient verifiable delay functions. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11478, pp. 379\u2013407. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17659-4_13"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70903-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:48:10Z","timestamp":1732736890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70903-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031709029","9783031709036"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70903-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}