{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:27:26Z","timestamp":1775665646316,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643303","type":"print"},{"value":"9783662643310","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_15","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T19:16:12Z","timestamp":1634930172000},"page":"279-298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients"],"prefix":"10.1007","author":[{"given":"Mustafa","family":"Al-Bassam","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Sonnino","sequence":"additional","affiliation":[]},{"given":"Vitalik","family":"Buterin","sequence":"additional","affiliation":[]},{"given":"Ismail","family":"Khoffi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Al-Bassam, M., Sonnino, A., Bano, S., Hrycyszyn, D., Danezis, G.: Chainspace: A sharded smart contracts platform. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2018)","DOI":"10.14722\/ndss.2018.23241"},{"key":"15_CR2","unstructured":"Antonopoulos, A.M.: Mastering bitcoin: unlocking digital crypto-currencies. O\u2019Reilly Media Inc. 1st edn. (2014)"},{"key":"15_CR3","unstructured":"Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G.: Consensus in the age of blockchains. CoRR abs\/1711.03936 (2017). https:\/\/arxiv.org\/abs\/1711.03936"},{"key":"15_CR4","unstructured":"Bitcoin Wallet Developers: Bitcoin wallet - apps on Google Play (2018). https:\/\/play.google.com\/store\/apps\/details?id=de.schildbach.wallet"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Randomized gossip algorithms. IEEE Trans. Inf. Theory 52(6), 2508\u20132530 (2006)","DOI":"10.1109\/TIT.2006.874516"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Burshtein, D., Miller, G.: Asymptotic enumeration methods for analyzing ldpc codes. IEEE Trans. Inf. Theory 50(6), 1115\u20131131 (2004). https:\/\/doi.org\/10.1109\/TIT.2004.828064","DOI":"10.1109\/TIT.2004.828064"},{"key":"15_CR7","unstructured":"Buterin, V.: Ethereum: the ultimate smart contract and decentralized application platform (white paper) (2013). http:\/\/web.archive.org\/web\/20131228111141\/vbuterin.com\/ethereum.html"},{"key":"15_CR8","unstructured":"Buterin, V.: Ethereum sharding FAQs (2018). https:\/\/github.com\/ethereum\/wiki\/wiki\/Sharding-FAQs\/c54cf1b520b0bd07468bee6950cda9a2c4ab4982"},{"key":"15_CR9","unstructured":"Cachin, C., Tessaro, S.: Asynchronous verifiable information dispersal. In: 24th IEEE Symposium on Reliable Distributed Systems (SRDS\u201905), pp. 191\u2013201. IEEE (2005)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","DOI":"10.1145\/358549.358563"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Dahlberg, R., Pulls, T., Peeters, R.: Efficient sparse merkle trees. In: Brumley, B., R\u00f6ning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 199\u2013215. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47560-8_13","DOI":"10.1007\/978-3-319-47560-8_13"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Dud\u00e1\u010dek, L., Ve\u0159t\u00e1t, I.: Multidimensional parity check codes with short block lengths. In: Telecommunications Forum (TELFOR), 2016 24th, pp. 1\u20134. IEEE (2016)","DOI":"10.1109\/TELFOR.2016.7818772"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Elias, P.: Error-free coding. Trans. IRE Prof. Group Inf. Theory 4(4), 29\u201337 (1954)","DOI":"10.1109\/TIT.1954.1057464"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM (JACM) 32(2), 374\u2013382 (1985)","DOI":"10.1145\/3149.214121"},{"key":"15_CR15","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin\u2019s peer-to-peer network. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 129\u2013144. USENIX Association, Washington, D.C. (2015). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"15_CR16","unstructured":"Karlo, T.: Ending Bitcoin support (2018). https:\/\/stripe.com\/blog\/ending-Bitcoin-support"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: OmniLedger: a secure, scale-out, decentralized ledger via sharding. In: Proceedings of IEEE Symposium on Security and Privacy. IEEE (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"15_CR19","unstructured":"Laurie, B., Kasper, E.: Revocation transparency (2012). https:\/\/www.links.org\/files\/RevocationTransparency.pdf"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Lin, S.J., Chung, W.H., Han, Y.S.: Novel polynomial basis and its application to Reed-Solomon erasure codes. In: Proceedings of the 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, pp. 316\u2013325. FOCS \u201914, IEEE Computer Society, Washington, DC, USA (2014). https:\/\/doi.org\/10.1109\/FOCS.2014.41, http:\/\/dx.doi.org\/10.1109\/FOCS.2014.41","DOI":"10.1109\/FOCS.2014.41"},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 17\u201330. CCS \u201916, ACM, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2976749.2978389","DOI":"10.1145\/2976749.2978389"},{"key":"15_CR22","unstructured":"Marshall, A.: Bitcoin scaling problem, explained (2017). https:\/\/cointelegraph.com\/explained\/Bitcoin-scaling-problem-explained"},{"key":"15_CR23","unstructured":"Maxwell, G.: (2017). https:\/\/botbot.me\/freenode\/bitcoin-wizards\/2017-02-01\/?msg=80297226&page=2"},{"key":"15_CR24","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"15_CR25","unstructured":"Orland, K.: Your Bitcoin is no good here\u2013Steam stops accepting cryptocurrency (2017). https:\/\/arstechnica.com\/gaming\/2017\/12\/steam-drops-Bitcoin-payment-option-citing-fees-and-volatility\/"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.S.\u00e9bastien., Nielsen, J. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643\u2013673. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_22","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Perard, D., Lacan, J., Bachy, Y., Detchart, J.: Erasure code-based low storage blockchain node. In: IEEE International Conference on Blockchain (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00271"},{"key":"15_CR28","unstructured":"Peterson, W.W., Wesley, W., Weldon Jr Peterson, E., Weldon, E., Weldon, E.: Error-correcting codes. MIT Press (1972)"},{"key":"15_CR29","unstructured":"Ranvier, J.: Improving the ability of SPV clients to detect invalid chains (2017). https:\/\/gist.github.com\/justusranvier\/451616fa4697b5f25f60"},{"key":"15_CR30","doi-asserted-by":"publisher","unstructured":"Reed, I., Scholtz, R., Truong, T.K., Welch, L.: The fast decoding of Reed-Solomon codes using Fermat theoretic transforms and continued fractions. IEEE Trans. Inf. Theory 24(1), 100\u2013106 (1978). https:\/\/doi.org\/10.1109\/TIT.1978.1055816","DOI":"10.1109\/TIT.1978.1055816"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Saints, K., Heegard, C.: Algebraic-geometric codes and multidimensional cyclic codes: a unified theory and algorithms for decoding using Grobner bases. IEEE Trans. Inf. Theory 41(6), 1733\u20131751 (1995)","DOI":"10.1109\/18.476246"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Shea, J.M., Wong, T.F.: Multidimensional codes. Encyclopedia of Telecommunications (2003)","DOI":"10.1002\/0471219282.eot342"},{"key":"15_CR33","unstructured":"Shen, B.Z., Tzeng, K.: Multidimensional extension of reed-solomon codes. In: Information Theory 1998 Proceedings 1998 IEEE International Symposium on, p. 54. IEEE (1998)"},{"key":"15_CR34","unstructured":"Todd, P.: Fraud proofs (2016). https:\/\/diyhpl.us\/wiki\/transcripts\/mit-bitcoin-expo-2016\/fraud-proofs-petertodd\/"},{"key":"15_CR35","unstructured":"Wicker, S.B.: Reed-solomon codes and their applications. IEEE Press, Piscataway, NJ, USA (1994)"},{"key":"15_CR36","unstructured":"Wong, J.I.: CryptoKitties is causing Ethereum network congestion (2017). https:\/\/qz.com\/1145833\/cryptokitties-is-causing-ethereum-network-congestion\/"},{"key":"15_CR37","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger - Byzantium version, p. e94ebda (yellow paper) (2018). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Wu, J., Costello, D.: New multilevel codes over GF(q). IEEE Trans. Inf. Theory 38(3), 933\u2013939 (1992)","DOI":"10.1109\/18.135635"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Yu, M., Sahraei, S., Li, S., Avestimehr, S., Kannan, S., Viswanath, P.: Coded merkle tree: solving data availability attacks in blockchains. In: Financial Cryptography and Data Security (2020)","DOI":"10.1007\/978-3-030-51280-4_8"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Zamani, M., Movahedi, M., Raykova, M.: Rapidchain: Scaling blockchain via full sharding. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 931\u2013948 (2018)","DOI":"10.1145\/3243734.3243853"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T20:06:33Z","timestamp":1634933193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}