{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:51:54Z","timestamp":1768071114978,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319690834","type":"print"},{"value":"9783319690841","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69084-1_26","type":"book-chapter","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T23:30:06Z","timestamp":1507246206000},"page":"361-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Scalable Funding of Bitcoin Micropayment Channel Networks"],"prefix":"10.1007","author":[{"given":"Conrad","family":"Burchert","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Decker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roger","family":"Wattenhofer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,10,7]]},"reference":[{"key":"26_CR1","unstructured":"Bairn, A.: Ionization protocol: flood routing (2015). \n                    http:\/\/lists.linuxfoundation.org\/pipermail\/lightning-dev\/2015-September\/000212.html"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a snack, pay with bitcoins. In: 13th IEEE International Conference on Peer-to-Peer Computing (2013)","DOI":"10.1109\/P2P.2013.6688717"},{"issue":"2","key":"26_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.Y.: High-speed high-security signatures. J. Cryptographic Eng. 2(2), 77\u201389 (2012)","journal-title":"J. Cryptographic Eng."},{"key":"26_CR4","unstructured":"BtcDrak, Friedenbach, M., Lombrozo, E.: Bip 112: Checksequenceverify (2015). \n                    https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0112.mediawiki"},{"key":"26_CR5","unstructured":"Corallo, M.: Bip 152: compact block relay (2016). \n                    https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","volume-title":"Financial Cryptography and Data Security","author":"Kyle Croman","year":"2016","unstructured":"Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., G\u00fcn, E.: On scaling decentralized blockchains. In: 3rd Workshop on Bitcoin Research (2016). \n                    http:\/\/www.tik.ee.ethz.ch\/file\/74bc987e6ab4a8478c04950616612f69\/main.pdf"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 13th IEEE International Conference on Peer-to-Peer Computing, September 2013","DOI":"10.1109\/P2P.2013.6688704"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21741-3_1","volume-title":"Lecture Notes in Computer Science","author":"Christian Decker","year":"2015","unstructured":"Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3\u201318. Springer, Cham (2015). doi:\n                    10.1007\/978-3-319-21741-3_1\n                    \n                  . \n                    http:\/\/www.tik.ee.ethz.ch\/file\/716b955c130e6c703fac336ea17b1670\/duplex-micropayment-channels.pdf"},{"key":"26_CR9","unstructured":"Dryja, T.: Scalability of lightning with different bips and some back-of-the-envelope calculations (2015). \n                    http:\/\/diyhpl.us\/wiki\/transcripts\/scalingbitcoin\/hong-kong\/overview-of-bips-necessary-for-lightning\/"},{"key":"26_CR10","unstructured":"Friedenbach, M., BtcDrak, Dorier, N., kinoshitajona: Bip 68: Relative lock-time using consensus-enforced sequence numbers (2015). \n                    https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0068.mediawiki"},{"key":"26_CR11","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: 23rd ACM Conference on Computer and Communications Security (2016). \n                    http:\/\/dl.acm.org\/citation.cfm?doid=2976749.2978341"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: Conference on Computer and Communications Security (2015)","DOI":"10.1145\/2810103.2813655"},{"key":"26_CR13","unstructured":"Hearn, M.: Low bandwidth block relay using thin blocks (2015). \n                    https:\/\/github.com\/bitcoinxt\/bitcoinxt\/pull\/91"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. In: Conference on Computer and Communications Security (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"26_CR15","unstructured":"Luu, L., Narayanan, V., Baweja, K., Zheng, C., Gilbert, S., Saxena, P.: SCP: a Computationally-Scalable Byzantine Consensus Protocol for Blockchains (2015)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978389"},{"key":"26_CR17","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). \n                    https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"26_CR18","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016). \n                    https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"26_CR19","unstructured":"Prihodko, P., Zhigulin, S., Sahno, M., Ostrovskiy, A., Osuntokun, O.: Flare: an approach to routing (2016). \n                    http:\/\/bitfury.com\/content\/5-white-papers-research\/whitepaper_flare_an_approach_to_routing_in_lightning_network_7_7_2016.pdf"},{"key":"26_CR20","unstructured":"Rosenfeld, M.: Analysis of hashrate-based double-spending (2012). \n                    https:\/\/bitcoil.co.il\/Doublespend.pdf"},{"key":"26_CR21","unstructured":"Russel, R.: Ionization protocol: flood routing (2015). \n                    http:\/\/lists.linuxfoundation.org\/pipermail\/lightning-dev\/2015-September\/000199.html"},{"key":"26_CR22","unstructured":"Russell, R.: Lightning networks part ii: Hashed timelock contracts (HTLCs) (2015). \n                    https:\/\/rusty.ozlabs.org\/?p=462"},{"key":"26_CR23","unstructured":"Russell, R.: Reaching the ground with lightning (2015). \n                    https:\/\/github.com\/ElementsProject\/lightning\/blob\/master\/doc\/deployable-lightning.pdf"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. (1991)","DOI":"10.1007\/BF00196725"},{"key":"26_CR25","unstructured":"Sompolinsky, Y., Zohar, A.: Accelerating bitcoin\u2019s transaction processing (fast money grows on trees, not chains) (2013)"},{"key":"26_CR26","unstructured":"Towns, A.: Network topology and routing (2015). \n                    https:\/\/lists.linuxfoundation.org\/pipermail\/lightning-dev\/2015-September\/000188.html"},{"key":"26_CR27","unstructured":"Wuille, P.: Elliptic curve schnorr-based signatures in bitcoin (2016). \n                    https:\/\/scalingbitcoin.org\/transcript\/milan2016\/schnorr-signatures"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69084-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T17:24:46Z","timestamp":1578504286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69084-1_26"}},"subtitle":["Regular Submission"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319690834","9783319690841"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69084-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"7 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Stabilization, Safety, and Security of Distributed Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boston, MA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sss2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cs.bgu.ac.il\/~fradmin\/SSS17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}