{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:20:59Z","timestamp":1759940459122,"version":"3.44.0"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032061751","type":"print"},{"value":"9783032061768","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06176-8_1","type":"book-chapter","created":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T15:58:08Z","timestamp":1758470288000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Unconditionally Safe Light Client"],"prefix":"10.1007","author":[{"given":"Niusha","family":"Moshrefi","sequence":"first","affiliation":[]},{"given":"Peiyao","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Soubhik","family":"Deb","sequence":"additional","affiliation":[]},{"given":"Sreeram","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,22]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Sheng, P., Wang, G., Nayak, K., Kannan, S., Viswanath, P.: BFT protocol forensics. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS 2021. ACM (2021). https:\/\/doi.org\/10.1145\/3460120.3484566","DOI":"10.1145\/3460120.3484566"},{"key":"1_CR2","unstructured":"Neu, J., Tas, E.N., Tse, D.: The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets. Cryptology ePrint Archive, Paper 2021\/628 (2021). https:\/\/eprint.iacr.org\/2021\/628"},{"key":"1_CR3","unstructured":"Lu, Y., Tang, Q., Wang, G.: Generic Superlight Client for Permissionless Blockchains. arXiv, vol. abs\/2003.06552 (2020). https:\/\/api.semanticscholar.org\/CorpusID:212725679"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-662-53357-4_5","volume-title":"Financial Cryptography and Data Security","author":"A Kiayias","year":"2016","unstructured":"Kiayias, A., Lamprou, N., Stouka, A.-P.: Proofs of proofs of work with sublinear complexity. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 61\u201378. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_5"},{"key":"1_CR5","unstructured":"Ethereum.org. Run a Node (2025). https:\/\/ethereum.org\/en\/run-a-node\/"},{"key":"1_CR6","unstructured":"Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S.M., Felten, E.W.: Arbitrum: scalable, private smart contracts. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 1353\u20131370 (2018)"},{"key":"1_CR7","unstructured":"Deb, S., Raynor, R., Kannan, S.: STAKESURE: Proof of Stake Mechanisms with Strong Cryptoeconomic Safety. arXiv preprint arXiv:2401.05797 (2024)"},{"key":"1_CR8","unstructured":"Kiayias, A., Miller, A., Zindros, D.: Non-Interactive Proofs of Proof-of-Work. Cryptology ePrint Archive, Paper 2017\/963 (2017). https:\/\/eprint.iacr.org\/2017\/963"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Kiayias, A., Polydouri, A., Zindros, D.: The velvet path to superlight blockchain clients. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 205\u2013218 (2021). https:\/\/doi.org\/10.1145\/3479722.3480999","DOI":"10.1145\/3479722.3480999"},{"key":"1_CR10","unstructured":"Braithwaite, S., et al.: A Tendermint Light Client (2020)"},{"key":"1_CR11","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Kiffer, L., Luu, L., Zamani, M.: Flyclient: super-light clients for cryptocurrencies. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 928\u2013946. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00049"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-030-51280-4_27","volume-title":"Financial Cryptography and Data Security","author":"A Kiayias","year":"2020","unstructured":"Kiayias, A., Miller, A., Zindros, D.: Non-interactive proofs of proof-of-work. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 505\u2013522. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_27"},{"key":"1_CR14","unstructured":"Agrawal, S., Neu, J., Tas, E.N., Zindros, D.: Proofs of Proof-of-Stake with Sublinear Complexity, arXiv preprint arXiv:2209.08673 (2022)"},{"key":"1_CR15","unstructured":"Infura Inc. Infura Documentation (2016). https:\/\/infura.io\/docs"},{"key":"1_CR16","unstructured":"Ethereum Foundation: Ethereum 2.0 Specifications (2023). https:\/\/github.com\/ethereum\/eth2.0-specs"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/978-3-030-59013-0_35","volume-title":"Computer Security \u2013 ESORICS 2020","author":"Y Lu","year":"2020","unstructured":"Lu, Y., Tang, Q., Wang, G.: Generic superlight client for permissionless blockchains. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12309, pp. 713\u2013733. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59013-0_35"},{"key":"1_CR18","unstructured":"Tas, E.N., Zindros, D., Yang, L., Tse, D.: Light Clients for Lazy Blockchains, arXiv preprint arXiv:2203.15968 (2022)"},{"key":"1_CR19","unstructured":"Al-Bassam, M., Sonnino, A., Buterin, V.: Fraud and Data Availability Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities, arXiv preprint arXiv:1809.09044 (2019)"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-030-51280-4_8","volume-title":"Financial Cryptography and Data Security","author":"M Yu","year":"2020","unstructured":"Yu, M., Sahraei, S., Li, S., Avestimehr, S., Kannan, S., Viswanath, P.: Coded merkle tree: solving data availability attacks in blockchains. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 114\u2013134. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_8"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-662-64331-0_16","volume-title":"Financial Cryptography and Data Security","author":"P Sheng","year":"2021","unstructured":"Sheng, P., Xue, B., Kannan, S., Viswanath, P.: ACeD: scalable data availability oracle. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 299\u2013318. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_16"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: a lightweight scalable blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 134, 180\u2013197 (2019)","DOI":"10.1016\/j.jpdc.2019.08.005"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Frey, D., Makkes, M.X., Roman, P.L., Ta\u00efani, F., Voulgaris, S.: Bringing secure bitcoin transactions to your smartphone. In: Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, pp. 1\u20136 (2016)","DOI":"10.1145\/3008167.3008170"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Gervais, A., Capkun, S., Karame, G.O., Gruber, D.: On the privacy provisions of bloom filters in lightweight bitcoin clients. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 326\u2013335 (2014)","DOI":"10.1145\/2664243.2664267"},{"key":"1_CR25","unstructured":"Bonneau, J., Meckler, I., Rao, V., Shapiro, E.: Coda: Decentralized Cryptocurrency at Scale, Cryptology ePrint Archive (2020)"},{"key":"1_CR26","unstructured":"Mina Foundation: Mina Documentation (2019). https:\/\/docs.minaprotocol.com\/en"},{"key":"1_CR27","unstructured":"Goes, C.: The Interblockchain Communication Protocol: An Overview, arXiv preprint arXiv:2006.15918 (2020)"},{"key":"1_CR28","unstructured":"Braithwaite, S., et al.: A Tendermint Light Client, arXiv preprint arXiv:2010.07031 (2020)"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Chatzigiannis, P., Baldimtsi, F., Chalkias, K.: SoK: blockchain light clients. In: International Conference on Financial Cryptography and Data Security, pp. 615\u2013641. Springer (2022)","DOI":"10.1007\/978-3-031-18283-9_31"},{"key":"1_CR30","unstructured":"Bowe, S., Grigg, J., Hopwood, D.: Recursive Proof Composition Without a Trusted Setup, Cryptology ePrint Archive (2019)"},{"key":"1_CR31","unstructured":"Buchman, E.: Tendermint: byzantine fault tolerance in the age of blockchains. Ph.D. dissertation, University of Guelph (2016)"},{"key":"1_CR32","unstructured":"Gabizon, A., et al.: Plumo: towards scalable interoperable blockchains using ultra light validation systems. In: Proceedings of the 3rd ZKProof Workshop, London, UK, vol. 20 (2020)"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: Recursive composition and bootstrapping for SNARKs and proof-carrying data. In: Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing, pp. 111\u2013120 (2013)","DOI":"10.1145\/2488608.2488623"},{"key":"1_CR34","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1007\/s00453-016-0221-0","volume":"79","author":"E Ben-Sasson","year":"2017","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., Virza, M.: Scalable zero knowledge via cycles of elliptic curves. Algorithmica 79, 1102\u20131160 (2017)","journal-title":"Algorithmica"},{"key":"1_CR35","unstructured":"Tang, W., Sheng, P., Roy, P., Wang, X., Fanti, G., Viswanath, P.: Raft-Forensics: High Performance CFT Consensus with Accountability for Byzantine Faults, arXiv preprint arXiv:2305.09123 (2023)"},{"key":"1_CR36","unstructured":"Civit, P., Gilbert, S., Gramoli, V.: Polygraph: Accountable Byzantine Agreement, Cryptology ePrint Archive, vol. 2019, p. 587 (2019)"},{"key":"1_CR37","unstructured":"Stewart, A., Kokoris-Kogia, E.: GRANDPA: A Byzantine Finality Gadget, arXiv preprint arXiv:2007.01560 (2020)"},{"key":"1_CR38","unstructured":"Buterin, V., Griffith, V.: Casper the Friendly Finality Gadget, arXiv preprint arXiv:1710.09437 (2017)"},{"key":"1_CR39","unstructured":"Al-Bassam, M.: Lazyledger: A Distributed Data Availability Ledger with Client-Side Smart Contracts, arXiv preprint arXiv:1905.09274 (2019)"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Bagaria, V., Kannan, S., Tse, D., Fanti, G., Viswanath, P.: Prism: deconstructing the blockchain to approach physical limits. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 585\u2013602 (2019)","DOI":"10.1145\/3319535.3363213"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Tas, E.N., Boneh, D.: Cryptoeconomic security for data availability committees. In: International Conference on Financial Cryptography and Data Security, pp. 310\u2013326. Springer (2023)","DOI":"10.1007\/978-3-031-47751-5_18"},{"key":"1_CR42","unstructured":"Sheng, P., Rana, R., Bala, S., Tyagi, H., Viswanath, P.: Proof of Diligence: Cryptoeconomic Security for Rollups, arXiv preprint arXiv:2402.07241 (2024)"},{"key":"1_CR43","unstructured":"Ethereum Validator Queue (2024). https:\/\/www.validatorqueue.com\/"},{"key":"1_CR44","unstructured":"EigenLabs: EigenLayer (2023). https:\/\/www.eigenlayer.xyz\/"},{"key":"1_CR45","unstructured":"Ethereum Foundation: Ethereum Wallets (2024). https:\/\/ethereum.org\/en\/wallets\/"},{"key":"1_CR46","unstructured":"Etherscan Team: Sepolia Etherscan (2024). https:\/\/sepolia.etherscan.io\/"},{"key":"1_CR47","unstructured":"Ethereum Foundation: go-ethereum (2024). https:\/\/github.com\/ethereum\/go-ethereum"},{"key":"1_CR48","unstructured":"Prysmatic Labs: Prysm (2024). https:\/\/github.com\/prysmaticlabs\/prysm"},{"key":"1_CR49","unstructured":"Unconditionally Safe Light Client (2024). https:\/\/github.com\/ForSubmissionOnly\/safe-light-client"},{"key":"1_CR50","doi-asserted-by":"publisher","unstructured":"Said, A., et al.: Detailed analysis of ethereum network on transaction behavior, community structure, and link prediction. PeerJ Comput. Sci. 7, e815 (2021). https:\/\/doi.org\/10.7717\/peerj-cs.815.","DOI":"10.7717\/peerj-cs.815."}],"container-title":["Lecture Notes in Computer Science","Blockchain \u2013 ICBC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06176-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T22:03:44Z","timestamp":1758492224000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06176-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,22]]},"ISBN":["9783032061751","9783032061768"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06176-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,22]]},"assertion":[{"value":"22 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icbc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}