{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:20:02Z","timestamp":1775229602691,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319457406","type":"print"},{"value":"9783319457413","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45741-3_14","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:50:25Z","timestamp":1473828625000},"page":"261-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts"],"prefix":"10.1007","author":[{"given":"Wac\u0142aw","family":"Banasik","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Dziembowski","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Malinowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"JH An","year":"2002","unstructured":"An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83\u2013107. Springer, Heidelberg (2002)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: Fair two-party computations via bitcoin deposits. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 105\u2013121. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-44774-1_8. http:\/\/dx.doi.org\/10.1007\/978-3-662-44774-1_8. ISBN: 978-3-662-44773-4"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-48051-9_1","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2015","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: On the malleability of bitcoin transactions. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015 Workshops. LNCS, vol. 8976, pp. 1\u201318. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-48051-9. http:\/\/dx.doi.org\/10.1007\/978-3-662-48051-9. ISBN: 978-3-662-48050-2"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 443\u2013458. IEEE Computer Society Press, Berkeley (2014). doi:10.1109\/SP.2014.35","DOI":"10.1109\/SP.2014.35"},{"key":"14_CR5","volume-title":"Mastering Bitcoin: Unlocking Digital Crypto-Currencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies, 1st edn. O\u2019Reilly Media, Inc., Sebastopol (2014). ISBN: 1449374042, 9781449374044","edition":"1"},{"key":"14_CR6","unstructured":"Back, A., Bentov, I.: Note on fair coin toss via Bitcoin. CoRR abs\/1402.3698 (2014). http:\/\/arxiv.org\/abs\/1402.3698"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Banasik, W., Dziembowski, S., Malinowski, D.: Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts. Cryptology ePrint Archive (2016). http:\/\/eprint.iacr.org\/2016\/451.pdf","DOI":"10.1007\/978-3-319-45741-3_14"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/3-540-48071-4_28","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"M Bellare","year":"1993","unstructured":"Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390\u2013420. Springer, Heidelberg (1993)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62\u201373. ACM Press, Fairfax (1993)","DOI":"10.1145\/168588.168596"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE Computer Society Press, Berkeley (2014). doi:10.1109\/SP.2014.36","DOI":"10.1109\/SP.2014.36"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-44381-1_24"},{"key":"14_CR12","unstructured":"Bitcoin Wiki: Constract"},{"key":"14_CR13","unstructured":"Bitcoin Wiki: Script"},{"key":"14_CR14","unstructured":"Bitcoin Wiki: Secp256k1"},{"key":"14_CR15","unstructured":"Bitcoin Wiki: Transaction"},{"key":"14_CR16","unstructured":"Bitcoin Wiki: Zero Knowledge Contingent Payment"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-44598-6_15","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"D Boneh","year":"2000","unstructured":"Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236\u2013254. Springer, Heidelberg (2000)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11745853_15","volume-title":"Public Key Cryptography - PKC 2006","author":"D Boneh","year":"2006","unstructured":"Boneh, D., Shen, E., Waters, B.: Strongly unforgeable signatures based on computational diffie-hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 229\u2013240. Springer, Heidelberg (2006)"},{"key":"14_CR19","unstructured":"Brown, D.R.L.: Standards for Efficient Cryptography SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0 (2010)"},{"key":"14_CR20","unstructured":"Damgard, I.: On Sigma-Protocols (2015). http:\/\/www.cs.au.dk\/~ivan\/Sigma.pdf"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"14_CR22","unstructured":"Filippi, P.D.: Tomorrow\u2019s apps will come from brilliant (and risky) Bitcoin code. Wired magazine"},{"key":"14_CR23","unstructured":"Goldfeder, S., Gennario, R., Kalodner, H., Bonneau, J., Felten, E.W., Kroll, J.A., Narayanan, A.: Securing bitcoin wallets via a new DSA\/ECDSA threshold signature scheme (manuscript, 2015)"},{"key":"14_CR24","volume-title":"Foundations of Cryptography","author":"O Goldreich","year":"2006","unstructured":"Goldreich, O.: Foundations of Cryptography, vol. 1. Cambridge University Press, New York (2006). ISBN: 0521035368"},{"issue":"1","key":"14_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"14_CR26","volume-title":"Introduction to Modern Cryptography (Chapman & Hall\/Crc Cryptography and Network Security Series)","author":"J Katz","year":"2007","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapman & Hall\/Crc Cryptography and Network Security Series). Chapman & Hall\/CRC, Boca Raton (2007). ISBN: 1584885513"},{"key":"14_CR27","doi-asserted-by":"publisher","unstructured":"Kumaresan, R., Moran, T., Bentov, I.: How to use bitcoin to play decentralized poker. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, pp. 195\u2013206. ACM, 12\u201316 October 2015. doi:10.1145\/2810103.2813712. http:\/\/doi.acm.org\/10.1145\/2810103.2813712. ISBN: 978-1-4503-3832-5","DOI":"10.1145\/2810103.2813712"},{"key":"14_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-19571-6_20","volume-title":"Theory of Cryptography","author":"Y Lindell","year":"2011","unstructured":"Lindell, Y., Pinkas, B.: Secure two-party computation via cut-and-choose oblivious transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329\u2013346. Springer, Heidelberg (2011)"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: ACM CCS 2015, pp. 706\u2013719. ACM Press (2015)","DOI":"10.1145\/2810103.2813659"},{"issue":"3\u20134","key":"14_CR30","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10207-004-0041-0","volume":"2","author":"P MacKenzie","year":"2004","unstructured":"MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. English. Int. J. Inf. Secur. 2(3\u20134), 218\u2013239 (2004). doi:10.1007\/s10207-004-0041-0. http:\/\/dx.doi.org\/10.1007\/s10207-004-0041-0. ISSN: 1615-5262","journal-title":"English. Int. J. Inf. Secur."},{"key":"14_CR31","unstructured":"Maxwell, G.: The first successful Zero-Knowledge Contingent Payment (2016)"},{"key":"14_CR32","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2009). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"14_CR33","unstructured":"Pagnia, H., Gartner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report Darmstadt University of Technology (1999)"},{"issue":"1","key":"14_CR34","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/comjnl\/46.1.55","volume":"46","author":"H Pagnia","year":"2003","unstructured":"Pagnia, H., Vogt, H., G\u00e4rtner, F.C.: Fair Exchange. Comput. J. 46(1), 55\u201375 (2003). doi:10.1093\/comjnl\/46.1.55. http:\/\/dx.doi.org\/10.1093\/comjnl\/46.1.55","journal-title":"Comput. J."},{"key":"14_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"14_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"TP Pedersen","year":"1991","unstructured":"Pedersen, T.P.: A Threshold cryptosystem without a trusted party (Extended Abstract) (Rump Session). In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522\u2013526. Springer, Heidelberg (1991)"},{"key":"14_CR37","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release Crypto. Technical report Cambridge, MA, USA (1996)"},{"key":"14_CR38","unstructured":"Todd, P.: OP_CHECKLOCKTIMEVERIFY. Bitcoin Improvement Proposal 0062. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0062.mediawiki"},{"key":"14_CR39","unstructured":"Wuille, P.: Bitcoin Improvement Proposal 062: Dealing with malleability"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45741-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T02:46:00Z","timestamp":1631673960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45741-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457406","9783319457413"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45741-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}