{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:56Z","timestamp":1767340136145,"version":"3.37.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319897219"},{"type":"electronic","value":"9783319897226"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89722-6_9","type":"book-chapter","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T14:53:50Z","timestamp":1523631230000},"page":"217-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["SoK: Unraveling Bitcoin Smart Contracts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2082-4093","authenticated-orcid":false,"given":"Nicola","family":"Atzei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3796-9774","authenticated-orcid":false,"given":"Massimo","family":"Bartoletti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8591-4527","authenticated-orcid":false,"given":"Tiziana","family":"Cimoli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0551-0790","authenticated-orcid":false,"given":"Stefano","family":"Lande","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9630-429X","authenticated-orcid":false,"given":"Roberto","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,14]]},"reference":[{"key":"9_CR1","unstructured":"Bitcoin developer guide - escrow and arbitration. https:\/\/goo.gl\/8XL5Fn"},{"key":"9_CR2","unstructured":"Bitcoin wiki - contracts - using external state. https:\/\/en.bitcoin.it\/wiki\/Contract#Example_4:_Using_external_state"},{"key":"9_CR3","unstructured":"Understanding the DAO attack, June 2016. http:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/"},{"key":"9_CR4","unstructured":"Parity Wallet security alert, July 2017. https:\/\/paritytech.io\/blog\/security-alert.html"},{"key":"9_CR5","unstructured":"A Postmortem on the Parity Multi-Sig library self-destruct, November 2017. https:\/\/goo.gl\/Kw3gXi"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: Fair two-party computations via Bitcoin deposits. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105\u2013121. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_8"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-319-10512-3_2","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: Modeling Bitcoin contracts by timed automata. In: Legay, A., Bozga, M. (eds.) FORMATS 2014. LNCS, vol. 8711, pp. 7\u201322. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10512-3_2"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on Bitcoin. In: IEEE Symposium on Security and Privacy, pp. 443\u2013458 (2014)","DOI":"10.1109\/SP.2014.35"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/2896386","volume":"59","author":"M Andrychowicz","year":"2016","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on Bitcoin. Commun. ACM 59(4), 76\u201384 (2016)","journal-title":"Commun. ACM"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2017","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164\u2013186. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Atzei, N., Bartoletti, M., Lande, S., Zunino, R.: A formal model of Bitcoin transactions. In: Financial Cryptography and Data Security. LNCS, Springer (2018)","DOI":"10.1007\/978-3-662-58387-6_29"},{"key":"9_CR12","unstructured":"Back, A., Bentov, I.: Note on fair coin toss via Bitcoin (2013). http:\/\/www.cs.technion.ac.il\/~idddo\/cointossBitcoin.pdf"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-45741-3_14","volume-title":"Computer Security \u2013 ESORICS 2016","author":"W Banasik","year":"2016","unstructured":"Banasik, W., Dziembowski, S., Malinowski, D.: Efficient zero-knowledge contingent payments in cryptocurrencies without scripts. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016, Part II. LNCS, vol. 9879, pp. 261\u2013280. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_14"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-70278-0_15","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Zunino, R.: Constant-deposit multiparty lotteries on Bitcoin. In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) FC 2017. LNCS, vol. 10323, pp. 231\u2013247. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_15"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol. 3185, pp. 200\u2013236. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30080-9_7"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use Bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Gollamudi, A., Gonthier, G., Kobeissi, N., Rastogi, A., Sibut-Pinote, T., Swamy, N., Zanella-Beguelin, S.: Formal verification of smart contracts. In: PLAS (2016)","DOI":"10.1145\/2993600.2993611"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-319-70278-0_28","volume-title":"Financial Cryptography and Data Security","author":"A Biryukov","year":"2017","unstructured":"Biryukov, A., Khovratovich, D., Tikhomirov, S.: Findel: secure derivative contracts for ethereum. In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) FC 2017. LNCS, vol. 10323, pp. 453\u2013467. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_28"},{"key":"9_CR19","unstructured":"BitFury group: Smart contracts on Bitcoin blockchain (2015). http:\/\/bitfury.com\/content\/5-white-papers-research\/contracts-1.1.1.pdf"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-44598-6_15","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"D Boneh","year":"2000","unstructured":"Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236\u2013254. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44598-6_15"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for Bitcoin and cryptocurrencies. In: IEEE S & P, pp. 104\u2013121 (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"9_CR22","unstructured":"Brown, R.G., Carlyle, J., Grigg, I., Hearn, M.: Corda: an introduction (2016). http:\/\/r3cev.com\/s\/corda-introductory-whitepaper-final.pdf"},{"issue":"6","key":"9_CR23","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1145\/2813885.2737997","volume":"50","author":"Karl Crary","year":"2015","unstructured":"Crary, K., Sullivan, M.J.: Peer-to-peer affine commitment using Bitcoin. In: ACM Conference on Programming Language Design and Implementation, pp. 479\u2013488 (2015)","journal-title":"ACM SIGPLAN Notices"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Delgado-Segura, S. et al.: A fair protocol for data trading based on Bitcoin transactions. In: Future Generation Computer Systems (2017, in press). http:\/\/dx.doi.org\/10.1016\/j.future.2017.08.021","DOI":"10.1016\/j.future.2017.08.021"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-662-53357-4_6","volume-title":"Financial Cryptography and Data Security","author":"K Delmolino","year":"2016","unstructured":"Delmolino, K., Arnett, M., Kosba, A., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 79\u201394. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_6"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Frantz, C.K., Nowostawski, M.: From institutions to code: towards automated generation of smart contracts. In: eCAS Workshop (2016)","DOI":"10.1109\/FAS-W.2016.53"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Garay, J.A., Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Rational protocol design: cryptography against incentive-driven adversaries. In: FOCS, pp. 648\u2013657 (2013)","DOI":"10.1109\/FOCS.2013.75"},{"issue":"1","key":"9_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10207-009-0094-1","volume":"9","author":"DM Goldschlag","year":"2010","unstructured":"Goldschlag, D.M., Stubblebine, S.G., Syverson, P.F.: Temporarily hidden bit commitment and lottery applications. Int. J. Inf. Secur. 9(1), 33\u201350 (2010)","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR29","unstructured":"Hearn, M.: Rapidly-adjusted (micro) payments to a pre-determined party (2013). https:\/\/bitcointalk.org"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-3-319-70278-0_33","volume-title":"Financial Cryptography and Data Security","author":"Y Hirai","year":"2017","unstructured":"Hirai, Y.: Defining the ethereum virtual machine for interactive theorem provers. In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) FC 2017. LNCS, vol. 10323, pp. 520\u2013535. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_33"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Bentov, I.: How to use Bitcoin to incentivize correct computations. In: ACM CCS, pp. 30\u201341 (2014)","DOI":"10.1145\/2660267.2660380"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Moran, T., Bentov, I.: How to use Bitcoin to play decentralized poker. In: ACM CCS, pp. 195\u2013206 (2015)","DOI":"10.1145\/2810103.2813712"},{"key":"9_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-319-70278-0_17","volume-title":"Financial Cryptography and Data Security","author":"K Liao","year":"2017","unstructured":"Liao, K., Katz, J.: Incentivizing blockchain forks via whale transactions. In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) FC 2017. LNCS, vol. 10323, pp. 264\u2013279. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_17"},{"key":"9_CR34","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: ACM CCS (2016). http:\/\/eprint.iacr.org\/2016\/633"},{"key":"9_CR35","unstructured":"Maxwell, G.: The first successful zero-knowledge contingent payment (2016). https:\/\/bitcoincore.org\/en\/2016\/02\/26\/zero-knowledge-contingent-payments-announcement\/"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Miller, A., Bentov, I.: Zero-collateral lotteries in Bitcoin and Ethereum. In: EuroS&P Workshops, pp. 4\u201313 (2017)","DOI":"10.1109\/EuroSPW.2017.44"},{"key":"9_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-662-53357-4_9","volume-title":"Financial Cryptography and Data Security","author":"M M\u00f6ser","year":"2016","unstructured":"M\u00f6ser, M., Eyal, I., G\u00fcn Sirer, E.: Bitcoin covenants. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 126\u2013141. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_9"},{"key":"9_CR38","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"9_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-55179-4_36","volume-title":"Computer Aided Verification","author":"X Nicollin","year":"1992","unstructured":"Nicollin, X., Sifakis, J.: An overview and synthesis on timed process algebras. In: Larsen, K.G., Skou, A. (eds.) CAV 1991. LNCS, vol. 575, pp. 376\u2013398. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-55179-4_36"},{"key":"9_CR40","unstructured":"O\u2019Connor, R.: Simplicity: a new language for blockchains. In: PLAS (2017). http:\/\/arxiv.org\/abs\/1711.03028"},{"key":"9_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-70278-0_12","volume-title":"Financial Cryptography and Data Security","author":"R O\u2019Connor","year":"2017","unstructured":"O\u2019Connor, R., Piekarska, M.: Enhancing Bitcoin transactions with covenants. In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) FC 2017. LNCS, vol. 10323, pp. 191\u2013198. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_12"},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Syverson, P.F.: Weakly secret bit commitment: applications to lotteries and fair exchange. In: IEEE CSFW, pp. 2\u201313 (1998)","DOI":"10.21236\/ADA464109"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997). http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/548","DOI":"10.5210\/fm.v2i9.548"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89722-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T18:55:47Z","timestamp":1604170547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-89722-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319897219","9783319897226"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89722-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}