{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:23:43Z","timestamp":1770539023265,"version":"3.49.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319723587","type":"print"},{"value":"9783319723594","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_3","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T16:19:11Z","timestamp":1512663551000},"page":"43-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Contract Coin: Toward Practical Contract Signing on Blockchain"],"prefix":"10.1007","author":[{"given":"Haibo","family":"Tian","sequence":"first","affiliation":[]},{"given":"Jiejie","family":"He","sequence":"additional","affiliation":[]},{"given":"Liqing","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"3_CR1","unstructured":"Adam, B.: Hashcash - amortizable publicly auditable cost-functions. http:\/\/www.hashcash.org\/papers\/amortizable.pdf . Accessed 4 Aug 2017"},{"key":"3_CR2","unstructured":"Adobe: Digital signatures in a PDF. http:\/\/120.198.244.57:9999\/www.adobe.com\/devnet-docs\/acrobatetk\/tools\/DigSig\/Acrobat_DigitalSignatures_in_PDF.pdf . Accessed 4 Aug 2017"},{"issue":"1","key":"3_CR3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1049\/iet-ifs.2012.0277","volume":"9","author":"AA Al-Saggaf","year":"2015","unstructured":"Al-Saggaf, A.A., Ghouti, L.: Efficient abuse-free fair contract-signing protocol based on an ordinary crisp commitment scheme. IET Inf. Secur. 9(1), 50\u201358 (2015)","journal-title":"IET Inf. Secur."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: Fair Two-party computations via bitcoin deposits. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105\u2013121. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_8"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Andrychowicz, M.,\u00a0Dziembowski, S.,\u00a0Malinowski, D.,\u00a0Mazurek, L.: Secure multiparty computations on bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 443\u2013458, May 2014","DOI":"10.1109\/SP.2014.35"},{"issue":"4","key":"3_CR6","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/49.839935","volume":"18","author":"N Asokan","year":"2000","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4), 593\u2013610 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"3_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/984334.984335","volume":"7","author":"G Ateniese","year":"2004","unstructured":"Ateniese, G.: Verifiable encryption of digital signatures and applications. ACM Trans. Inf. Syst. Secur. 7(1), 1\u201320 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better \u2014 how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_29"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures-how to sign with RSA and Rabin. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399\u2013416. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_34"},{"issue":"1","key":"3_CR10","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"M Ben-Or","year":"1990","unstructured":"Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Trans. Inf. Theor. 36(1), 40\u201346 (1990)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"3_CR11","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0020-0190(99)00047-2","volume":"70","author":"E Biham","year":"1999","unstructured":"Biham, E., Boneh, D., Reingold, O.: Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Inf. Process. Lett. 70(2), 83\u201387 (1999)","journal-title":"Inf. Process. Lett."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Blum, M.: How to exchange (secret) keys. In: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, pp. 440\u2013447. ACM (1983)","DOI":"10.1145\/800061.808775"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"issue":"3","key":"3_CR14","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF02139147","volume":"4","author":"RH Deng","year":"1996","unstructured":"Deng, R.H., Gong, L., Lazar, A.A., Wang, W.: Practical protocols for certified electronic mail. J. Netw. Syst. Manag. 4(3), 279\u2013297 (1996)","journal-title":"J. Netw. Syst. Manag."},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201992","author":"C Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139\u2013147. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-48071-4_10"},{"issue":"1","key":"3_CR16","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1008908.1008913","volume":"15","author":"S Even","year":"1983","unstructured":"Even, S.: A protocol for signing contracts. SIGACT News 15(1), 34\u201339 (1983)","journal-title":"SIGACT News"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Franklin, M.K., Reiter, M.K.: Fair exchange with a semi-trusted third party (extended abstract). In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 1\u20135. ACM (1997)","DOI":"10.1145\/266420.266424"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/3-540-48405-1_29","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"JA Garay","year":"1999","unstructured":"Garay, J.A., Jakobsson, M., MacKenzie, P.: Abuse-free optimistic contract signing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 449\u2013466. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_29"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Germanus, D.,\u00a0Ismail, H.,\u00a0Suri, N.: PASS: an address space slicing framework for P2P eclipse attack mitigation. In: 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pp. 74\u201383, September 2015","DOI":"10.1109\/SRDS.2015.14"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Gervais, A.,\u00a0Ritzdorf, H., Karame, G.O.,\u00a0Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), pp. 692\u2013705. ACM (2015)","DOI":"10.1145\/2810103.2813655"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-1-4684-4730-9_11","volume-title":"Advances in Cryptology","author":"O Goldreich","year":"1984","unstructured":"Goldreich, O.: A simple protocol for signing contracts. In: Chaum, D. (ed.) Advances in Cryptology, pp. 133\u2013136. Springer, Boston (1984). https:\/\/doi.org\/10.1007\/978-1-4684-4730-9_11"},{"issue":"2","key":"3_CR22","first-page":"187","volume":"4","author":"T Haibo","year":"2017","unstructured":"Haibo, T., Jiejie, H., Liqing, F.: A privacy preserving fair contract signing protocol based on block chains. J. Cryptol. Res. 4(2), 187\u2013198 (2017)","journal-title":"J. Cryptol. Res."},{"key":"3_CR23","unstructured":"Heilman, E.,\u00a0Kendler, A.,\u00a0Zohar, A.,\u00a0Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: Proceedings of the 24th USENIX Conference on Security Symposium (SEC 2015), pp. 129\u2013144. USENIX Association, Berkeley (2015)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-79263-5_7","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"Q Huang","year":"2008","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 106\u2013120. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79263-5_7"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Ismail, H.,\u00a0Germanus, D.,\u00a0Suri, N.: Detecting and mitigating P2P eclipse attacks. In: 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), pp. 224\u2013231, December 2015","DOI":"10.1109\/ICPADS.2015.36"},{"key":"3_CR26","unstructured":"Jian, L.,\u00a0Wenting, L., Karame,\u00a0G.O., Asokan, N.: Towards fairness of cryptocurrency payments (2016)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Juels, A.,\u00a0Kosba, A.,\u00a0Shi, E.: The Ring of Gyges: investigating the future of criminal smart contracts. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 283\u2013295. ACM, New York (2016)","DOI":"10.1145\/2976749.2978362"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/978-3-662-49896-5_25","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"A Kiayias","year":"2016","unstructured":"Kiayias, A., Zhou, H.-S., Zikas, V.: Fair and Robust multi-party computation using a global transaction ledger. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 705\u2013734. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_25"},{"key":"3_CR29","unstructured":"Loibl, A.: Namecoin (2014)"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H.,\u00a0Olickel, H.,\u00a0Saxena, P.,\u00a0Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 254\u2013269. ACM, New York (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"3_CR31","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Okamoto, T.,\u00a0Ohta, K.: How to simultaneously exchange secrets by general assumptions. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 184\u2013192. ACM (1994)","DOI":"10.1145\/191177.191221"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"McCorry, S.S.P.,\u00a0Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Financial Cryptography and Data Security 2017, pp. 1\u201318 (2017)","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"3_CR34","unstructured":"Peter, T.: Op_checklocktimeverify. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0065.mediawiki . Accessed 4 Apr 2017"},{"key":"3_CR35","unstructured":"Sprankel, S.: Technical basis of digital currencies (2013)"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Steiner, M.,\u00a0Tsudik, G.,\u00a0Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996, pp. 31\u201337. ACM, New York (1996)","DOI":"10.1145\/238168.238182"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Stini, M.,\u00a0Mauve, M.: Enabling fair offline trading. In: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 973\u2013978. ACM (2009)","DOI":"10.1145\/1582379.1582592"},{"key":"3_CR38","unstructured":"Vishnumurthy, V.,\u00a0Chandrakumar, S.,\u00a0Ch, S., Sirer, E.G.: KARMA: A secure economic framework for peer-to-peer resource sharing (2003)"},{"key":"3_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-319-25645-0_27","volume-title":"Network and System Security","author":"Z Wan","year":"2015","unstructured":"Wan, Z., Deng, R.H., Lee, D.: Electronic contract signing without using trusted third party. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) Network and System Security. LNCS, vol. 9408, pp. 386\u2013394. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25645-0_27"},{"issue":"1","key":"3_CR40","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TIFS.2009.2035972","volume":"5","author":"G Wang","year":"2010","unstructured":"Wang, G.: An abuse-free fair contract-signing protocol based on the RSA signature. IEEE Trans. Inf. Forensics Secur. 5(1), 158\u2013168 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR41","unstructured":"Wood, D.G.: Ethereum: a secure decentralised g generalised transaction ledger homestead (2014)"},{"key":"3_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-24582-7_14","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"F Zhang","year":"2003","unstructured":"Zhang, F., Safavi-Naini, R., Susilo, W.: Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 191\u2013204. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24582-7_14"},{"key":"3_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-24632-9_20","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"F Zhang","year":"2004","unstructured":"Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277\u2013290. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24632-9_20"},{"key":"3_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-29814-6_8","volume-title":"Information and Communications Security","author":"Z Zhao","year":"2016","unstructured":"Zhao, Z., Chan, T.-H.H.: How to vote privately using bitcoin. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) ICICS 2015. LNCS, vol. 9543, pp. 82\u201396. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29814-6_8"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T17:15:52Z","timestamp":1570468552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}