{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:59:57Z","timestamp":1770224397285,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643211","type":"print"},{"value":"9783662643228","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64322-8_3","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:17:23Z","timestamp":1634926643000},"page":"53-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Timelocked Bribing"],"prefix":"10.1007","author":[{"given":"Tejaswi","family":"Nadahalli","sequence":"first","affiliation":[]},{"given":"Majid","family":"Khabbazian","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Wattenhofer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SOK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104\u2013121. IEEE (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"3_CR2","unstructured":"Miller, A.: Feather-forks: enforcing a blacklist with sub-50% hash power. https:\/\/bitcointalk.org\/index.php?topic=312668.0. Accessed 7 May 2020"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-319-70278-0_17","volume-title":"Financial Cryptography and Data Security","author":"K Liao","year":"2017","unstructured":"Liao, K., Katz, J.: Incentivizing blockchain forks via whale transactions. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 264\u2013279. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_17"},{"key":"3_CR4","unstructured":"McCorry, P., Hicks, A., Meiklejohn, S.: Smart Contracts for Bribing Miners. Cryptology ePrint Archive, Report 2018\/581. https:\/\/eprint.iacr.org\/2018\/581"},{"key":"3_CR5","unstructured":"Nakamoto, S.: bitcoin core source code, version 0.1.0. https:\/\/bitcointalk.org\/index.php?topic=68121.0. Accessed 7 May 2020"},{"key":"3_CR6","unstructured":"Friedenbach, M., BtcDrak, Dorier, N., kinoshitajona: BIP68: Relative lock-time using consensus-enforced sequence numbers. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0068.mediawiki. Accessed 7 May 2020"},{"key":"3_CR7","unstructured":"Todd, P.: BIP68: CHECKLOCKTIMEVERIFY. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0065.mediawiki. Accessed 7 May 2020"},{"key":"3_CR8","unstructured":"BtcDrak, Friedenbach, M., Lombrozo, E.: BIP112: Checksequenceverify. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0112.mediawiki. Accessed 7 May 2020"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Daian, P., et al.: Flash boys 2.0: frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 910\u2013927. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00040"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21741-3_1","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"C Decker","year":"2015","unstructured":"Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3\u201318. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21741-3_1"},{"key":"3_CR11","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments (2016)"},{"key":"3_CR12","unstructured":"BOLT Authors: Lightning Network Specifications, Bolt 3. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/03-transactions.md. Accessed 7 May 2020"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Herlihy, M.: Atomic cross-chain swaps. In: Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, pp. 245\u2013254. ACM (2018)","DOI":"10.1145\/3212734.3212736"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Han, R., Lin, H., Yu, J.: On the optionality and fairness of atomic swaps. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 62\u201375. AFT 2019, Association for Computing Machinery (2019). https:\/\/doi.org\/10.1145\/3318041.3355460","DOI":"10.1145\/3318041.3355460"},{"key":"3_CR15","unstructured":"Atomic Swaps: https:\/\/bitcointalk.org\/index.php?topic=193281.msg2224949 Accessed 7 May 2020"},{"key":"3_CR16","unstructured":"1ML: https:\/\/1ml.com\/. Accessed 7 May 2020"},{"key":"3_CR17","unstructured":"BOLT Authors: Lightning Network Specifications, Bolt 2. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/02-peer-protocol.md. Accessed 7 May 2020"},{"key":"3_CR18","unstructured":"C-Lightning Authors: c-lightning - a Lightning Network implementation in C. https:\/\/github.com\/ElementsProject\/lightning. Accessed 7 May 2020"},{"key":"3_CR19","unstructured":"LND Authors: LND: The Lightning Network Daemon. https:\/\/github.com\/lightningnetwork\/lnd. Accessed 7 May 2020"},{"key":"3_CR20","unstructured":"Atomic Swaps Explained: The Ultimate Beginner\u2019s Guide. https:\/\/komodoplatform.com\/atomic-swaps\/. Accessed 7 May 2020"},{"key":"3_CR21","unstructured":"BitMEX Research: Atomic Swaps and Distributed Exchanges: The Inadvertent Call Option. https:\/\/blog.bitmex.com\/atomic-swaps-and-distributed-exchanges-the-inadvertent-call-option\/. Accessed 7 May 2020"},{"key":"3_CR22","unstructured":"Robinson, D.: HTLCs Considered Harmful. https:\/\/cyber.stanford.edu\/sites\/g\/files\/sbiybj9936\/f\/htlcs_considered_harmful.pdf. Accessed 7 May 2020"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Winzer, F., Herd, B., Faust, S.: Temporary censorship attacks in the presence of rational miners. In: IEEE Security & Privacy on the Blockchain (IEEE S & B) (2019). https:\/\/eprint.iacr.org\/2019\/748","DOI":"10.1109\/EuroSPW.2019.00046"},{"key":"3_CR24","unstructured":"Judmayer, A., et al.: Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. Cryptology ePrint Archive, Report 2019\/775. https:\/\/eprint.iacr.org\/2019\/775"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Tsabary, I., Yechieli, M., Eyal, I.: MAD-HTLC: Because HTLC is Crazy-Cheap to Attack (2020)","DOI":"10.1109\/SP40001.2021.00080"},{"key":"3_CR26","unstructured":"Transaction Pinning. https:\/\/bitcoinops.org\/en\/topics\/transaction-pinning\/. Accessed 7 May 2020"},{"key":"3_CR27","unstructured":"CPFP Carve-out. https:\/\/bitcoinops.org\/en\/topics\/cpfp-carve-out\/. Accessed 7 May 2020"},{"key":"3_CR28","unstructured":"Anchor Outputs. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/pull\/688. Accessed 7 May 2020"},{"key":"3_CR29","unstructured":"An orphan block on the bitcoin (btc) blockchain. https:\/\/en.cryptonomist.ch\/2019\/05\/28\/orphan-block-bitcoin-btc-blockchain\/. Accessed 7 May 2020"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64322-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:24:22Z","timestamp":1634927062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64322-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643211","9783662643228"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64322-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}