{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T04:56:39Z","timestamp":1773896199567,"version":"3.50.1"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319566139","type":"print"},{"value":"9783319566146","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56614-6_21","type":"book-chapter","created":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T22:31:20Z","timestamp":1490913080000},"page":"609-642","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Decentralized Anonymous Micropayments"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Chiesa","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Green","sequence":"additional","affiliation":[]},{"given":"Jingcheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Peihan","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Miers","sequence":"additional","affiliation":[]},{"given":"Pratyush","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,1]]},"reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better \u2014 how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32946-3_29"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza. M.: Zerocash: decentralized anonymous payments from Bitcoin. In: SP 2014 (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"21_CR3","unstructured":"Bitcoinj: Working with micropayment channels (2013). https:\/\/bitcoinj.github.io\/working-with-micropayments"},{"key":"21_CR4","unstructured":"Block Chain Analysis: Block chain analysis (2014). http:\/\/www.block-chain-analysis.com\/"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/0-387-34805-0_48","volume-title":"Advances in Cryptology \u2014 CRYPTO 1989 Proceedings","author":"M Bellare","year":"1990","unstructured":"Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547\u2013557. Springer, New York (1990). doi: 10.1007\/0-387-34805-0_48"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-662-47854-7_27","volume-title":"Financial Cryptography and Data Security","author":"A Biryukov","year":"2015","unstructured":"Biryukov, A., Pustogarov, I.: Proof-of-work as anonymous micropayment: rewarding a tor relay. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 445\u2013455. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-47854-7_27"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/PL00003819","volume":"12","author":"M Bellare","year":"1999","unstructured":"Bellare, M., Rivest, R.L.: Translucent cryptography - an alternative to key escrow, and its implementation via fractional oblivious transfer. J. Cryptology 12(2), 117\u2013139 (1999)","journal-title":"J. Cryptology"},{"key":"21_CR8","unstructured":"Caldwell, M.: Sustainable nanopayment idea: probabilistic payments (2012). https:\/\/bitcointalk.org\/index.php?topic=62558.0"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T., (eds.) CRYPTO 1982. Springer, New York (1982)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"21_CR10","unstructured":"Chainalysis: Chainalysis inc. (2015). https:\/\/chainalysis.com\/"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/11426639_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"J Camenisch","year":"2005","unstructured":"Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302\u2013321. Springer, Heidelberg (2005). doi: 10.1007\/11426639_18"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio Coin: building Zerocoin from a succinct pairing-based proof system. In: PETShop 2013 (2013)","DOI":"10.1145\/2517872.2517878"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21741-3_1","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"C Decker","year":"2015","unstructured":"Decker, C., Wattenhofer, R.: A fast and scalable payment network with Bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3\u201318. Springer, Cham (2015). doi: 10.1007\/978-3-319-21741-3_1"},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"21_CR15","unstructured":"Elliptic: Elliptic enterprises limited (2013). https:\/\/www.elliptic.co\/"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Green, M., Miers, I.: Bolt: anonymous payment channels for decentralized currencies. ePrint 2016\/701 (2016)","DOI":"10.1145\/3133956.3134093"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: TumbleBit: an untrusted Bitcoin-compatible anonymous payment hub. ePrint 2016\/575 (2016)","DOI":"10.14722\/ndss.2017.23086"},{"key":"21_CR18","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin\u2019s peer-to-peer network. In: Security 2015 (2015)"},{"key":"21_CR19","unstructured":"Hearn, M., Spilman, J.: Bitcoin contracts (2012). https:\/\/en.bitcoin.it\/wiki\/Contract"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Kosba, A.E., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: SP 2016 (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055469","volume-title":"Financial Cryptography","author":"RJ Lipton","year":"1998","unstructured":"Lipton, R.J., Ostrovsky, R.: Micro-payments via efficient coin-flipping. In: Hirchfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 1\u201315. Springer, Heidelberg (1998). doi: 10.1007\/BFb0055469"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-662-48051-9_2","volume-title":"Financial Cryptography and Data Security","author":"M M\u00f6ser","year":"2015","unstructured":"M\u00f6ser, M., B\u00f6hme, R.: Trends, tips, tolls: a longitudinal study of bitcoin transaction fees. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 19\u201333. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48051-9_2"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from Bitcoin. In: SP 2013 (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"21_CR24","unstructured":"Micali, S.: Universal payment systems (2014). https:\/\/www.youtube.com\/watch?v=xgA6TO7drok"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of Bitcoins: characterizing payments among men with no names. In: IMC 2013 (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"21_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/3-540-45760-7_11","volume-title":"Topics in Cryptology \u2014 CT-RSA 2002","author":"S Micali","year":"2002","unstructured":"Micali, S., Rivest, R.L.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 149\u2013163. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45760-7_11"},{"key":"21_CR27","unstructured":"Micali, S., Rabin, M.O., Kilian, J.: Zero-knowledge sets. In: FOCS 2003 (2003)"},{"key":"21_CR28","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"21_CR29","unstructured":"Poon, J., Dryja, T.: The Bitcoin lightning network: scalable off-chain instant payments (2016). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"21_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992). doi: 10.1007\/3-540-46766-1_9"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Pass, R., Shelat, A.: Micropayments for decentralized currencies. In: CCS 2015 (2015)","DOI":"10.1145\/2810103.2813713"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Pass, R., Shelat, A.: Micropayments for decentralized currencies. ePrint 2016\/332 (2016)","DOI":"10.1145\/2810103.2813713"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: SocialCom\/PASSAT 2011 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"21_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/3-540-63594-7_87","volume-title":"Financial Cryptography","author":"RL Rivest","year":"1997","unstructured":"Rivest, R.L.: Electronic lottery tickets as micropayments. In: Hirschfeld, R. (ed.) FC 1997. LNCS, vol. 1318, pp. 307\u2013314. Springer, Heidelberg (1997). doi: 10.1007\/3-540-63594-7_87"},{"key":"21_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-27809-2_2","volume-title":"Financial Cryptography","author":"RL Rivest","year":"2004","unstructured":"Rivest, R.L.: Peppercoin micropayments. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 2\u20138. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-27809-2_2"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Kate, A., Schr\u00f6der, D.: Liar, liar, coins on fire!: penalizing equivocation by loss of Bitcoins. In: CCS 2015 (2015)","DOI":"10.1145\/2810103.2813686"},{"key":"21_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39884-1_2"},{"key":"21_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/3-540-48405-1_35","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"T Sander","year":"1999","unstructured":"Sander, T., Ta-Shma, A.: Auditable, anonymous electronic cash. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 555\u2013572. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_35"},{"key":"21_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-45126-6_5","volume-title":"Financial Cryptography","author":"N Someren","year":"2003","unstructured":"Someren, N., Odlyzko, A., Rivest, R., Jones, T., Goldie-Scot, D.: Does anyone really need micropayments? In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 69\u201376. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45126-6_5"},{"key":"21_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-62494-5_7","volume-title":"Security Protocols","author":"D Wheeler","year":"1997","unstructured":"Wheeler, D.: Transactions using bets. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 89\u201392. Springer, Heidelberg (1997). doi: 10.1007\/3-540-62494-5_7"},{"key":"21_CR41","unstructured":"Chi-Chih Yao, A.: Probabilistic computations: toward a unified measure of complexity. In: FOCS 1977 (1977)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2017"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56614-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T08:02:27Z","timestamp":1568966547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56614-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319566139","9783319566146"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56614-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"1 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUROCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 April 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eurocrypt2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eurocrypt2017.di.ens.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}