{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T23:44:55Z","timestamp":1772235895631,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662533567","type":"print"},{"value":"9783662533574","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_10","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T13:22:01Z","timestamp":1472563321000},"page":"142-157","source":"Crossref","is-referenced-by-count":209,"title":["Cryptocurrencies Without Proof of Work"],"prefix":"10.1007","author":[{"given":"Iddo","family":"Bentov","sequence":"first","affiliation":[]},{"given":"Ariel","family":"Gabizon","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Mizrahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"10_CR1","unstructured":"Bahack, L., Courtois, N.: (2014). http:\/\/arxiv.org\/abs\/1402.1718"},{"key":"10_CR2","first-page":"91","volume-title":"Randomness and Computation","author":"M Ben-Or","year":"1990","unstructured":"Ben-Or, M., Linial, N.: Collective coin flipping. In: Micali, S. (ed.) Randomness and Computation, pp. 91\u2013115. Academic Press, New York (1990)"},{"key":"10_CR3","unstructured":"Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M.: Proof of activity. In: ACM SIGMETRICS Workshop - NetEcon (2014). http:\/\/eprint.iacr.org\/2014\/452"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Boldyreva, A.: Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. In: PKC2003 (2003)","DOI":"10.1007\/3-540-36288-6_3"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Eyal, I.: The miner\u2019s dilemma. In: 36th IEEE S&P (2015)","DOI":"10.1109\/SP.2015.13"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","first-page":"431","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 431\u2013449. Springer, Heidelberg (2014)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Eurocryppt 2015 (2015)","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"10_CR8","first-page":"1","volume":"71","author":"K Itakura","year":"1983","unstructured":"Itakura, K., Nakamura, K.: A public key cryptosystem suitable for digital multisignatures. NEC Res. Dev. 71, 1\u20138 (1983)","journal-title":"NEC Res. Dev."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: SICOMP, vol. 36 (2007)","DOI":"10.1137\/S0097539705446846"},{"key":"10_CR10","unstructured":"Kroll, J., Davey, I., Felten, E.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: 12th WEIS (2013)"},{"issue":"2","key":"10_CR11","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/s00145-012-9126-5","volume":"26","author":"S Lu","year":"2013","unstructured":"Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures. J. Cryptology 26(2), 340\u2013373 (2013)","journal-title":"J. Cryptology"},{"key":"10_CR12","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin.org"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Micali, S., Ohta K., Reyzin, L.: Accountable-subgroup multisignatures (extended abstract). In: Proceedings of CCS 2001, pp. 245\u2013254. ACM Press (2001)","DOI":"10.1145\/501983.502017"},{"key":"10_CR14","unstructured":"Poelstra, A.: (2014). https:\/\/download.wpsoftware.net\/bitcoin\/pos.pdf"},{"key":"10_CR15","unstructured":"Rosenfeld, M.: (2012). http:\/\/arxiv.org\/abs\/1402.2009"},{"key":"10_CR16","unstructured":"User \u201ccunicula\u201d (2012). https:\/\/bitcointalk.org\/index.php?topic=122291"},{"key":"10_CR17","unstructured":"User \u201cQuantumM...\u201d (2011). https:\/\/bitcointalk.org\/index.php?topic=27787"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T02:22:46Z","timestamp":1568341366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}