{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T10:16:28Z","timestamp":1777630588807,"version":"3.51.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319678153","type":"print"},{"value":"9783319678160","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_17","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T10:43:16Z","timestamp":1505212996000},"page":"297-315","source":"Crossref","is-referenced-by-count":189,"title":["Securing Proof-of-Stake Blockchain Protocols"],"prefix":"10.1007","author":[{"given":"Wenting","family":"Li","sequence":"first","affiliation":[]},{"given":"S\u00e9bastien","family":"Andreina","sequence":"additional","affiliation":[]},{"given":"Jens-Matthias","family":"Bohli","sequence":"additional","affiliation":[]},{"given":"Ghassan","family":"Karame","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Reaching Agreement in the Presence of Faults 27, 228\u2013234 (1980). http:\/\/doi.acm.org\/10.1145\/322186.322188%5Cndl.acm.org\/ft_gateway.cfm?id=322188&type=pdf","DOI":"10.1145\/322186.322188"},{"key":"17_CR2","unstructured":"Bentov, I., Pass, R., Shi, E.: Snow white: Provably secure proofs of stake. IACR Cryptology ePrint Archive 2016, 919 (2016)"},{"key":"17_CR3","unstructured":"Buterin, V.: Slasher: A punitive proof-of-stake algorithm. https:\/\/blog.ethereum.org\/2014\/01\/15\/slasher-a-punitive-proof-of-stake-algorithm\/ . Accessed June 2017"},{"key":"17_CR4","unstructured":"Buterin, V.: Validator ordering and randomness in pos. http:\/\/vitalik.ca\/files\/randomness.html"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-48910-X_8","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"J Camenisch","year":"1999","unstructured":"Camenisch, J., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107\u2013122. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_8"},{"key":"17_CR6","unstructured":"Chen, J., Micali, S.: Algorand: the efficient and democratic ledger. arXiv preprint arXiv:1607.01341 (2016)"},{"key":"17_CR7","unstructured":"Cloak posa v3.0 - a trustless, anonymous transaction system for cloakcoin. https:\/\/bravenewcoin.com\/assets\/Whitepapers\/CloakCoin-posa3wp.pdf . Accessed June 2017"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-30580-4_28","volume-title":"Public Key Cryptography - PKC 2005","author":"Y Dodis","year":"2005","unstructured":"Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416\u2013431. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-30580-4_28"},{"key":"17_CR9","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. https:\/\/people.csail.mit.edu\/nickolai\/papers\/gilad-algorand-eprint.pdf"},{"key":"17_CR10","unstructured":"Ethereum - prrof of stake faq - how does validator selection work, and what is stake grinding? https:\/\/github.com\/ethereum\/wiki\/wiki\/Proof-of-Stake-FAQ#how-does-validator-selection-work-and-what-is-stake-grinding"},{"key":"17_CR11","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. Technical report, Cryptology ePrint Archive, Report 2016\/889, 2016 (2016). http:\/\/eprint.iacr.org\/2016\/889"},{"key":"17_CR12","unstructured":"King, S., Nadal, S.: Ppcoin: Peer-to-peer crypto-currency with proof-of-stake (2012). https:\/\/peercoin.net\/assets\/paper\/peercoin-paper.pdf . Accessed June 2017"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Micali, S., Rabin, M., Vadhan, S.: Verifiable random functions. In: 40th Annual Symposium on Foundations of Computer Science, pp. 120\u2013130. IEEE (1999)","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"17_CR14","unstructured":"Non-interactive zero-knowledge proof. https:\/\/en.wikipedia.org\/wiki\/Non-interactive_zero-knowledge_proof . Accessed June 2017"},{"key":"17_CR15","unstructured":"Novacoin - proof of stake. https:\/\/github.com\/novacoin-project\/novacoin\/wiki\/Proof-of-stake . Accessed June 2017"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"O\u2019Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint (2014)","DOI":"10.1049\/cp.2014.0699"},{"key":"17_CR17","unstructured":"Pike, D., Nosker, P., Boehm, D., Grisham, D., Woods, S., Marston, J.: Proof-of-stake-time whitepaper. https:\/\/www.vericoin.info\/downloads\/VeriCoinPoSTWhitePaper10May2015.pdf . Accessed June 2017"},{"key":"17_CR18","unstructured":"Schuh, F., Larimer, D.: Bitshares 2.0: General overview. http:\/\/docs.bitshares.org\/_downloads\/bitshares-general.pdf . Accessed June 2017"},{"key":"17_CR19","unstructured":"Vasin, P.: Blackcoin\u2019s proof-of-stake protocol v2. https:\/\/blackcoin.co\/blackcoin-pos-protocol-v2-whitepaper.pdf . Accessed June 2017"},{"key":"17_CR20","unstructured":"Kravitz, D.W.: Digital signature algorithm (1993). US Patent 5,231,668"},{"key":"17_CR21","unstructured":"Wiki, N.: Whitepaper: nxt \u2013 nxt wiki (2016). https:\/\/nxtwiki.org\/mediawiki\/index.php?title=Whitepaper:Nxt . Accessed June 2017"},{"key":"17_CR22","unstructured":"Zamfir, V.: Introducing casper the friendly ghost. https:\/\/blog.ethereum.org\/2015\/08\/01\/introducing-casper-friendly-ghost\/ . Accessed June 2017"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T18:33:33Z","timestamp":1659465213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}