{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T05:00:19Z","timestamp":1770354019626,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319702773","type":"print"},{"value":"9783319702780","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70278-0_11","type":"book-chapter","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T21:03:19Z","timestamp":1510952599000},"page":"182-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work"],"prefix":"10.1007","author":[{"given":"Philip","family":"Daian","sequence":"first","affiliation":[]},{"given":"Ittay","family":"Eyal","sequence":"additional","affiliation":[]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[]},{"given":"Emin G\u00fcn","family":"Sirer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,19]]},"reference":[{"key":"11_CR1","unstructured":"Back, A.: Hashcash - a denial of service counter-measure. \nhttp:\/\/www.hashcash.org\/papers\/hashcash.pdf\n\n (2002)"},{"key":"11_CR2","unstructured":"Back, A.: Hashcash-amortizable publicly auditable cost functions. Early draft of paper (2000)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-662-47854-7_27","volume-title":"Financial Cryptography and Data Security","author":"A Biryukov","year":"2015","unstructured":"Biryukov, A., Pustogarov, I.: Proof-of-work as anonymous micropayment: rewarding a Tor relay. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 445\u2013455. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-47854-7_27"},{"key":"11_CR4","unstructured":"Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in Bitcoin digital currency. arXiv preprint \narXiv:1402.1718\n\n (2014)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology \u2014 CRYPTO 1992","author":"C Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139\u2013147. Springer, Heidelberg (1993). \nhttps:\/\/doi.org\/10.1007\/3-540-48071-4_10"},{"key":"11_CR6","unstructured":"Ethereum Proof of Stake FAQ (2017). \nhttps:\/\/github.com\/ethereum\/wiki\/wiki\/Proof-of-Stake-FAQ\n\n. Accessed 28 Feb 2017"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Eyal, I.: The miner\u2019s dilemma. In: 2015 IEEE Symposium on Security and Privacy, pp. 89\u2013103. IEEE (2015)","DOI":"10.1109\/SP.2015.13"},{"key":"11_CR8","unstructured":"Eyal, I., Sirer, E.G.: How to disincentivize large bitcoin mining pools. \nhttp:\/\/hackingdistributed.com\/2014\/06\/18\/how-to-disincentivize-large-bitcoin-mining-pools\/\n\n (2014). Accessed 05 Nov 2016"},{"key":"11_CR9","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-0-387-35568-9_18","volume-title":"Secure Information Networks","author":"M Jakobsson","year":"1999","unstructured":"Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols (extended abstract). In: Preneel, B. (ed.) Secure Information Networks. ITIFIP, vol. 23, pp. 258\u2013272. Springer, Boston, MA (1999). \nhttps:\/\/doi.org\/10.1007\/978-0-387-35568-9_18"},{"key":"11_CR10","unstructured":"Juels, A., Brainard, J.: Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: NDSS, pp. 151\u2013165 (1999)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Juels Jr., A., Burton, S.K.: PORs: proofs of retrievability for large files. In: ACM CCS, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"11_CR12","unstructured":"King, S.: Primecoin: cryptocurrency with prime number proof-of-work (2013)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/3-540-45760-7_11","volume-title":"Topics in Cryptology \u2014 CT-RSA 2002","author":"S Micali","year":"2002","unstructured":"Micali, S., Rivest, R.L.: Micropayments revisited. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 149\u2013163. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45760-7_11"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy, pp. 475\u2013490. IEEE (2014)","DOI":"10.1109\/SP.2014.37"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Miller, A., Kosba, A., Katz, J., Shi, E.: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 680\u2013691. ACM (2015)","DOI":"10.1145\/2810103.2813621"},{"key":"11_CR16","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. (2008). \nhttp:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/3-540-49649-1_29","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u201998","author":"P Nguyen","year":"1998","unstructured":"Nguyen, P., Stern, J.: The B\u00e9guin-Quisquater server-aided RSA protocol from Crypto\u201995 is not secure. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 372\u2013379. Springer, Heidelberg (1998). \nhttps:\/\/doi.org\/10.1007\/3-540-49649-1_29"},{"key":"11_CR18","unstructured":"Nygren, E., Erb, S., Biryukov, A., Khovratovic, D.: TLS client puzzles extension. IETF Internet-Draft (2016). Expires 30 Dec 2016"},{"key":"11_CR19","unstructured":"Priest, C.: [bitcoin-dev] we need to fix the block withholding attack. \nhttps:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2015-December\/012059.html\n\n (2015). Accessed 05 Nov 2016"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-62494-5_6","volume-title":"Security Protocols","author":"RL Rivest","year":"1997","unstructured":"Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 69\u201387. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/3-540-62494-5_6"},{"key":"11_CR21","unstructured":"Sztorc, P.: Nothing is cheaper than proof of work (2016). \nhttp:\/\/www.truthcoin.info\/blog\/pow-cheapest\/\n\n. Accessed 01 Nov 2016"},{"key":"11_CR22","unstructured":"Todd, P.: Re: [bitcoin-dev] we need to fix the block withholding attack (2015). \nhttps:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2015-December\/012069.html\n\n. Accessed 05 Nov 2016"},{"key":"11_CR23","unstructured":"ziftrCOIN: a cryptocurrency to enable commerces. (2014). \nhttps:\/\/d19y4lldx7po3t.cloudfront.net\/assets\/docs\/ziftrcoin-whitepaper-120614.pdf\n\n. Accessed 05 Nov 2016"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70278-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T03:08:45Z","timestamp":1519009725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70278-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319702773","9783319702780"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70278-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}