{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T04:47:00Z","timestamp":1778906820486,"version":"3.51.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319690834","type":"print"},{"value":"9783319690841","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69084-1_19","type":"book-chapter","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T23:30:06Z","timestamp":1507246206000},"page":"282-297","source":"Crossref","is-referenced-by-count":218,"title":["On Security Analysis of Proof-of-Elapsed-Time (PoET)"],"prefix":"10.1007","author":[{"given":"Lin","family":"Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nolan","family":"Shah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhimin","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weidong","family":"Shi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,10,7]]},"reference":[{"key":"19_CR1","unstructured":"Intel Software Guard Extensions Programming Reference, October 2014. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf"},{"key":"19_CR2","unstructured":"ARM: ARM security technology building a secure system using trustzone technology (2009)"},{"issue":"1","key":"19_CR3","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1090\/S0002-9947-1941-0003498-3","volume":"49","author":"AC Berry","year":"1941","unstructured":"Berry, A.C.: The accuracy of the gaussian approximation to the sum of independent variates. Trans. Am. Math. Soc. 49(1), 122\u2013136 (1941)","journal-title":"Trans. Am. Math. Soc."},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R Canetti","year":"2004","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM (JACM) 51(4), 557\u2013594 (2004)","journal-title":"J. ACM (JACM)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Chen, L., Xu, L., Shah, N., Diallo, N., Gao, Z., Lu, Y., Shi, W.: Unraveling blockchain based crypto-currency system supporting oblivious transactions: a formalized approach. In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 23\u201328 (2017)","DOI":"10.1145\/3055518.3055528"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-319-70278-0_29","volume-title":"Financial Cryptography and Data Security","author":"Lin Chen","year":"2017","unstructured":"Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., Shi, W.: Decentralized execution of smart contracts: agent model perspective and its implications (2017)"},{"key":"19_CR7","first-page":"282","volume-title":"Lecture Notes in Computer Science","author":"Lin Chen","year":"2017","unstructured":"Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., Shi, W.: On security analysis of proof-of-elapsed-time (PoET) (full version) (2017). http:\/\/i2c.cs.uh.edu\/tiki-download_wiki_attachment.php?attId=70&download=y"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Emirdag, P., Nagy, D.A.: Could bitcoin transactions be 100x faster? In: 2014 11th International Conference on Security and Cryptography (SECRYPT), pp. 1\u20136. IEEE (2014)","DOI":"10.5220\/0005102804260431"},{"key":"19_CR9","unstructured":"Kaplan, D., Powell, J., Woller, T.: AMD memory encryption. Whitepaper, April 2016"},{"key":"19_CR10","unstructured":"Duembgen, L.: Bounding standard Gaussian tail probabilities. arXiv preprint arXiv:1012.2063 (2010)"},{"key":"19_CR11","unstructured":"Duong, T., Fan, L., Zhou, H.S.: 2-hop blockchain: combining proof-of-work and proof-of-stake securely (2016)"},{"key":"19_CR12","volume-title":"On the Liapounoff Limit of Error in the Theory of Probability","author":"CG Esseen","year":"1942","unstructured":"Esseen, C.G.: On the Liapounoff Limit of Error in the Theory of Probability. Almqvist & Wiksell, Stockholm (1942)"},{"key":"19_CR13","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., Van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016, pp. 45\u201359 (2016)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45472-5_28"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46803-6_10"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316. ACM (2016)","DOI":"10.1145\/2976749.2978341"},{"issue":"3","key":"19_CR17","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1214\/aoms\/1177731721","volume":"12","author":"RD Gordon","year":"1941","unstructured":"Gordon, R.D.: Values of Mills\u2019 ratio of area to bounding ordinate and of the normal probability integral for large values of the argument. Ann. Math. Stat. 12(3), 364\u2013366 (1941)","journal-title":"Ann. Math. Stat."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"G\u00f6tzfried, J., Eckert, M., Schinzel, S., M\u00fcller, T.: Cache attacks on Intel SGX. In: Proceedings of the 10th European Workshop on Systems Security, p. 2. ACM (2017)","DOI":"10.1145\/3065913.3065915"},{"key":"19_CR19","unstructured":"Intel: Sawtooth Lake (2017). https:\/\/intelledger.github.io\/"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Koutsoupias, E., Kyropoulou, M., Tselekounis, Y.: Blockchain mining games. In: Proceedings of the 2016 ACM Conference on Economics and Computation, pp. 365\u2013382. ACM (2016)","DOI":"10.1145\/2940716.2940773"},{"key":"19_CR21","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. Technical report, Cryptology ePrint Archive, Report 2016\/889 (2016). http:\/\/eprint.iacr.org\/2016\/889"},{"issue":"1\/2","key":"19_CR22","doi-asserted-by":"publisher","first-page":"180","DOI":"10.2307\/2332232","volume":"30","author":"D Lawley","year":"1938","unstructured":"Lawley, D.: A generalization of Fisher\u2019s z test. Biometrika 30(1\/2), 180\u2013187 (1938)","journal-title":"Biometrika"},{"key":"19_CR23","unstructured":"Lee, J., Jang, J., Jang, Y., Kwak, N., Choi, Y., Choi, C., Kim, T., Peinado, M., Kang, B.B.: Hacking in darkness: return-oriented programming against secure enclaves. In: USENIX Security (2017)"},{"key":"19_CR24","unstructured":"Luu, L., Narayanan, V., Baweja, K., Zheng, C., Gilbert, S., Saxena, P.: SCP: a computationally-scalable byzantine consensus protocol for blockchains. Technical report, Cryptology ePrint Archive, Report 2015\/1168 (2015)"},{"key":"19_CR25","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"19_CR26","first-page":"454","volume":"2016","author":"R Pass","year":"2016","unstructured":"Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. IACR Cryptol. ePrint Arch. 2016, 454 (2016)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"19_CR27","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. arXiv preprint arXiv:1507.06183 (2015)"},{"key":"19_CR28","volume-title":"Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World","author":"D Tapscott","year":"2016","unstructured":"Tapscott, D., Tapscott, A.: Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World. Penguin, City of Westminster (2016)"},{"issue":"3","key":"19_CR29","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1070\/RM2010v065n03ABEH004688","volume":"65","author":"IS Tyurin","year":"2010","unstructured":"Tyurin, I.S.: An improvement of upper estimates of the constants in the Lyapunov theorem. Russ. Math. Surv. 65(3), 201\u2013202 (2010)","journal-title":"Russ. Math. Surv."},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-39028-4_9","volume-title":"Open Problems in Network Security","author":"M Vukoli\u0107","year":"2016","unstructured":"Vukoli\u0107, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdo\u011fan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112\u2013125. Springer, Cham (2016). doi: 10.1007\/978-3-319-39028-4_9"},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-319-45744-4_22","volume-title":"Computer Security \u2013 ESORICS 2016","author":"N Weichbrodt","year":"2016","unstructured":"Weichbrodt, N., Kurmus, A., Pietzuch, P., Kapitza, R.: AsyncShock: exploiting synchronisation bugs in intel SGX enclaves. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 440\u2013457. Springer, Cham (2016). doi: 10.1007\/978-3-319-45744-4_22"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69084-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T05:17:20Z","timestamp":1570166240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69084-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319690834","9783319690841"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69084-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}