{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:08:33Z","timestamp":1768968513447,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319271514","type":"print"},{"value":"9783319271521","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27152-1_1","type":"book-chapter","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T04:55:10Z","timestamp":1449636910000},"page":"3-20","source":"Crossref","is-referenced-by-count":12,"title":["Authenticated Key Exchange over Bitcoin"],"prefix":"10.1007","author":[{"given":"Patrick","family":"McCorry","sequence":"first","affiliation":[]},{"given":"Siamak F.","family":"Shahandashti","sequence":"additional","affiliation":[]},{"given":"Dylan","family":"Clarke","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"1_CR1","unstructured":"ISO\/IEC 14888: Information technology - Security techniques - Digital signatures with appendix (2008)"},{"key":"1_CR2","unstructured":"Andersen, G.: Conversation about OP_SCHNORRVERIFY. Freenode IRC bitcoin-wizards, October 2014. \n                      https:\/\/botbot.me\/freenode\/bitcoin-wizards\/"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better \u2014 how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012)"},{"key":"1_CR5","unstructured":"BBC: New Paypal partnership enables limited Bitcoin payments (2015). \n                      http:\/\/www.bbc.co.uk\/news\/technology-29341886\n                      \n                    . Accessed 06 January 2015"},{"key":"1_CR6","unstructured":"Research, Certicom: SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Group, September 2000"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-32946-3_28","volume-title":"Financial Cryptography and Data Security","author":"J Clark","year":"2012","unstructured":"Clark, J., Essex, A.: CommitCoin: carbon dating commitments with bitcoin. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 390\u2013398. Springer, Heidelberg (2012)"},{"key":"1_CR8","unstructured":"Corallo, M.: [Bitcoin-development] Warning to rawtx creators: bug in SIGHASH_SINGLE (2012). \n                      http:\/\/sourceforge.net\/p\/bitcoin\/mailman\/message\/29699385\/\n                      \n                    . Accessed 16 September 2015"},{"key":"1_CR9","unstructured":"Dell: Were Now Accepting Bitcoin on Dell.com (2015). \n                      http:\/\/en.community.dell.com\/dell-blogs\/direct2dell\/b\/direct2dell\/archive\/2014\/07\/18\/we-re-now-accepting-bitcoin-on-dell-com\n                      \n                    . Accessed January 06 2015"},{"key":"1_CR10","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable (2013). arXiv preprint \n                      arXiv:1311.0243"},{"key":"1_CR11","series-title":"Springer Professional Computing","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Vanstone, S., Menezes, A.: Guide to Elliptic Curve Cryptography. Springer Professional Computing. Springer, New York (2004)"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-14577-3_33","volume-title":"Financial Cryptography and Data Security","author":"F Hao","year":"2010","unstructured":"Hao, F.: On robust key agreement based on public key authentication. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 383\u2013390. Springer, Heidelberg (2010)"},{"issue":"1","key":"1_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906\u2013917. ACM (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"1_CR15","unstructured":"Lo, S., Wang, J.: Bitcoin as money? current policy and perspectives, September 2014"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36492-7_1","volume-title":"Selected Areas in Cryptography","author":"J Malone-Lee","year":"2003","unstructured":"Malone-Lee, J., Smart, N.P.: Modifications of ECDSA. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 1\u201312. Springer, Heidelberg (2003)"},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1080\/10350330.2013.777594","volume":"23","author":"B Maurer","year":"2013","unstructured":"Maurer, B., Nelms, T., Swartz, L.: When perhaps the real problem is money itself!: the practical materiality of Bitcoin. Soc. Semiot. 23(2), 261\u2013277 (2013)","journal-title":"Soc. Semiot."},{"key":"1_CR18","unstructured":"Merrill, N.: The Calyx institute: privacy by design for everyone (2015). \n                      https:\/\/www.calyxinstitute.org\/support-us\/donate-via-bitcoin\n                      \n                    . Accessed January 06 2015"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.: Zerocoin: anonymous distributed E-cash from Bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology of CRYPTO \u201985","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"1_CR21","unstructured":"Mozilla: Help protect the open Web (2015). \n                      https:\/\/sendto.mozilla.org\/page\/content\/give-bitcoin\/\n                      \n                    . Accessed January 06 2015"},{"key":"1_CR22","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: 2011 IEEE Third International Conference on Social Computing (socialcom) Privacy, Security, Risk and Trust (Passat), pp. 1318\u20131326, October 2011","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"1_CR24","unstructured":"Rizzo, P.: Expedia exec says bitcoin spending has exceeded estimates (2015). \n                      http:\/\/www.coindesk.com\/expedia-exec-bitcoin-payments-have-exceeded-estimates\/\n                      \n                    . Accessed January 06 2015"},{"key":"1_CR25","first-page":"Q3","volume":"54","author":"A Robleh","year":"2014","unstructured":"Robleh, A., Barrdear, J., Clews, R., Southgate, J.: The economics of digital currencies. Q. Bull. 54, Q3 (2014)","journal-title":"Q. Bull."},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013)"},{"key":"1_CR27","unstructured":"Tor: Make A Donation. 2015. \n                      https:\/\/www.torproject.org\/donate\/donate.html.en\n                      \n                    . Accessed January 06 2015"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-36288-6_23","volume-title":"Public Key Cryptography - PKC 2003","author":"S Vaudenay","year":"2002","unstructured":"Vaudenay, S.: The security of DSA and ECDSA. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 309\u2013323. Springer, Heidelberg (2002)"},{"key":"1_CR29","unstructured":"Woo, D., Gordon, I., Iaralov, V.: Bitcoin: a first assessment. Bank of America Merrill Lynch, December 2013"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27152-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T21:13:21Z","timestamp":1559337201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27152-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271514","9783319271521"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27152-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}