{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T10:06:36Z","timestamp":1777025196461,"version":"3.51.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491509","type":"print"},{"value":"9783319491516","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_6","type":"book-chapter","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T22:09:46Z","timestamp":1478210986000},"page":"79-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["KopperCoin \u2013 A Distributed File Storage with Financial Incentives"],"prefix":"10.1007","author":[{"given":"Henning","family":"Kopp","sequence":"first","affiliation":[]},{"given":"Christoph","family":"B\u00f6sch","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"6_CR1","volume-title":"Mastering Bitcoin, Unlocking Digital Cryptocurrencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin, Unlocking Digital Cryptocurrencies. O\u2019Reilly Media, Sebastopol (2014)"},{"key":"6_CR2","unstructured":"Aspnes, J., Jackson, C., Krishnamurthy, A.: Exposing computationally-challenged Byzantine impostors. Technical report YALEU\/DCS\/TR-1332, Yale University Department of Computer Science (2005)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Bonacina, I., Faonio, A., Galesi, N.: Proofs of Space: When Space is of the Essence. Cryptology ePrint Archive, Report 2013\/805 (2013)","DOI":"10.1007\/978-3-319-10879-7_31"},{"key":"6_CR4","unstructured":"Bennett, K., Stef, T., Grothoff, C., Horozov, T., Patrascu, I.: The GNeT whitepaper, June 2002"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing Privacy Enhancing Technologies","author":"I Clarke","year":"2001","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: a distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46\u201366. Springer, Heidelberg (2001). doi:\n                    10.1007\/3-540-44702-4_4"},{"key":"6_CR6","unstructured":"Dziembowski, S., Faust, S., Kolmogorov, V., Pietrzak, K.: Proofs of space. Cryptology ePrint Archive, Report 2013\/796 (2013)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). doi:\n                    10.1007\/978-3-662-45472-5_28"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO 1986","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). doi:\n                    10.1007\/3-540-47721-7_12"},{"key":"6_CR9","unstructured":"filecoin.io: Filecoin: a cryptocurrency operated file storage network (2014). \n                    http:\/\/filecoin.io\/filecoin.pdf"},{"key":"6_CR10","unstructured":"King, S.: Primecoin: cryptocurrency with prime number proof-of-work (2013). \n                    http:\/\/primecoin.io\/bin\/primecoin-paper.pdf"},{"key":"6_CR11","unstructured":"King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake (2012). \n                    https:\/\/peercoin.net\/whitepaper"},{"issue":"5","key":"6_CR12","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TNET.2006.882904","volume":"14","author":"RTB Ma","year":"2006","unstructured":"Ma, R.T.B., Lee, S.C.M., Lui, J.C.S., Yau, D.K.Y.: Incentive and service differentiation in P2P networks: a game theoretic approach. IEEE\/ACM Trans. Netw. 14(5), 978\u2013991 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). doi:\n                    10.1007\/3-540-45748-8_5"},{"key":"6_CR14","unstructured":"Merkle, R.C.: Method of providing digital signatures. US Patent 4,309,569, 5 Jan 1982. \n                    https:\/\/www.google.com\/patents\/US4309569"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO 1987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988). doi:\n                    10.1007\/3-540-48184-2_32"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: Security and Privacy, pp. 475\u2013490. IEEE (2014)","DOI":"10.1109\/SP.2014.37"},{"key":"6_CR17","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). \n                    https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"6_CR18","unstructured":"Sengupta, B., Bag, S., Ruj, S., Sakurai, K.: Retricoin: Bitcoin based on compact proofs of retrievability. ICDCN 2016. ACM (2016). \n                    http:\/\/doi.acm.org\/10.1145\/2833312.2833317"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008). doi:\n                    10.1007\/978-3-540-89255-7_7"},{"issue":"4","key":"6_CR20","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"I Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31(4), 149\u2013160 (2001)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR21","unstructured":"Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. Cryptology ePrint Archive, Report 2015\/464 (2015)"},{"key":"6_CR22","unstructured":"Wilkinson, S., Buterin, V.: Storj: peer-to-peer cloud storage network (2014). \n                    https:\/\/storj.io\/storj.pdf"},{"key":"6_CR23","unstructured":"Yoo, S.Y.: How a NASHX transaction works (2013). \n                    http:\/\/nashx.com\/HowItWorks"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BFb0054114","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"A Young","year":"1998","unstructured":"Young, A., Yung, M.: Auto-recoverable auto-certifiable cryptosystems. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 17\u201331. Springer, Heidelberg (1998). doi:\n                    10.1007\/BFb0054114"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:35:11Z","timestamp":1558316111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}