{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:31:21Z","timestamp":1743046281153,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662643303"},{"type":"electronic","value":"9783662643310"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_17","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T19:16:12Z","timestamp":1634930172000},"page":"319-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient State Management in Distributed Ledgers"],"prefix":"10.1007","author":[{"given":"Dimitris","family":"Karakostas","sequence":"first","affiliation":[]},{"given":"Nikos","family":"Karayannidis","sequence":"additional","affiliation":[]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"17_CR1","unstructured":"Andresen, G.: Utxo uh-oh... (2015). http:\/\/gavinandresen.ninja\/utxo-uhoh"},{"key":"17_CR2","unstructured":"Bitcoin: July 2015 flood attack (2015). https:\/\/en.bitcoin.it\/wiki\/July_2015_flood_attack"},{"key":"17_CR3","unstructured":"Bitcoin: Miner fees (2020). https:\/\/en.bitcoin.it\/wiki\/Miner_fees"},{"key":"17_CR4","unstructured":"Bitcoin: Protocol documentation (2020). https:\/\/en.bitcoin.it\/wiki\/Protocol_documentation"},{"key":"17_CR5","unstructured":"Boneh, D., B\u00fcnz, B., Fisch, B.: Batching techniques for accumulators with applications to IOPs and stateless blockchains. Cryptology ePrint Archive, Report 2018\/1188 (2018). https:\/\/eprint.iacr.org\/2018\/1188"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-662-58820-8_2","volume-title":"Financial Cryptography and Data Security","author":"A Chepurnoy","year":"2019","unstructured":"Chepurnoy, A., Kharin, V., Meshkov, D.: A systematic approach to cryptocurrency fees. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 19\u201330. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_2"},{"key":"17_CR7","unstructured":"Chepurnoy, A., Papamanthou, C., Zhang, Y.: Edrax: a cryptocurrency with stateless transaction validation. Cryptology ePrint Archive, Report 2018\/968 (2018). https:\/\/eprint.iacr.org\/2018\/968"},{"key":"17_CR8","unstructured":"Delgado-Segura, S., P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Herrera-Joancomart\u00ed, J.: Analysis of the bitcoin UTXO set. Cryptology ePrint Archive, Report 2017\/1095 (2017). https:\/\/eprint.iacr.org\/2017\/1095"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-662-58820-8_6","volume-title":"Financial Cryptography and Data Security","author":"S Delgado-Segura","year":"2019","unstructured":"Delgado-Segura, S., P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Herrera-Joancomart\u00ed, J.: Analysis of the Bitcoin UTXO set. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 78\u201391. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_6"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Dos Santos, S., Chukwuocha, C., Kamali, S., Thulasiram, R.K.: An efficient miner strategy for selecting cryptocurrency transactions. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 116\u2013123 (2019)","DOI":"10.1109\/Blockchain.2019.00024"},{"key":"17_CR11","unstructured":"Dryja, T.: Utreexo: a dynamic hash-based accumulator optimized for the bitcoin UTXO set. Cryptology ePrint Archive, Report 2019\/611 (2019). https:\/\/eprint.iacr.org\/2019\/611"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.jfineco.2019.03.004","volume":"134","author":"D Easley","year":"2019","unstructured":"Easley, D., O\u2019Hara, M., Basu, S.: From mining to markets: the evolution of bitcoin transaction fees. J. Finan. Econ. 134(1), 91\u2013109 (2019)","journal-title":"J. Finan. Econ."},{"key":"17_CR13","unstructured":"Frost, E., van Wirdum, A.: Bitcoin\u2019s growing utxo problem and how utreexo can help solve it (2019). https:\/\/bitcoinmagazine.com\/articles\/bitcoins-growing-utxo-problem-and-how-utreexo-can-help-solve-it"},{"key":"17_CR14","unstructured":"Fustino, R.: Algorand atomic transfers (2019). https:\/\/medium.com\/algorand\/algorand-atomic-transfers-a405376aad44"},{"key":"17_CR15","unstructured":"Ichiba Hotchkiss, G.: The 1.x files: The state of stateless ethereum (2019). https:\/\/blog.ethereum.org\/2019\/12\/30\/eth1x-files-state-of-stateless-ethereum"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Ioannidis, Y.E.: Query optimization. ACM Comput. Surv. 28(1), 121\u2013123 (1996)","DOI":"10.1145\/234313.234367"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Jiang, S., et al.: Bzip: a compact data memory system for utxo-based blockchains. In: 2019 IEEE International Conference on Embedded Software and Systems (ICESS), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/ICESS.2019.8782459"},{"key":"17_CR18","unstructured":"Karakostas, D., Karayannidis, N., Kiayias, A.: Efficient state management in distributed ledgers. Cryptology ePrint Archive, Report 2021\/183 (2021). https:\/\/eprint.iacr.org\/2021\/183"},{"issue":"3","key":"17_CR19","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"17_CR20","doi-asserted-by":"publisher","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015: 22nd Conference on Computer and Communications Security, pp. 706\u2013719. ACM Press, Denver, CO, USA, 12\u201316 October 2015. https:\/\/doi.org\/10.1145\/2810103.2813659","DOI":"10.1145\/2810103.2813659"},{"key":"17_CR21","unstructured":"Maxwell, G.: Coinjoin: Bitcoin privacy for the real world (2013). https:\/\/bitcointalk.org\/index.php?topic=279249.msg2983902#msg2983902"},{"key":"17_CR22","unstructured":"Maxwell, G.: A deep dive into bitcoin core v0.15 (2017). http:\/\/diyhpl.us\/wiki\/transcripts\/gmaxwell-2017-08-28-deep-dive-bitcoin-core-v0.15\/"},{"key":"17_CR23","unstructured":"McCallum, J.C.: Historical memory prices 1957+ (2020). https:\/\/en.bitcoin.it\/wiki\/Miner_fee:\/\/jcmit.net\/memoryprice.htm"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-662-48051-9_2","volume-title":"Financial Cryptography and Data Security","author":"M M\u00f6ser","year":"2015","unstructured":"M\u00f6ser, M., B\u00f6hme, R.: Trends, tips, tolls: a longitudinal study of bitcoin transaction fees. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 19\u201333. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_2"},{"key":"17_CR25","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"17_CR26","doi-asserted-by":"publisher","unstructured":"Nicolas, H.: The economics of bitcoin transaction fees. SSRN Electron. J. (2014). https:\/\/doi.org\/10.2139\/ssrn.2400519","DOI":"10.2139\/ssrn.2400519"},{"issue":"2","key":"17_CR27","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM (JACM) 27(2), 228\u2013234 (1980)","journal-title":"J. ACM (JACM)"},{"key":"17_CR28","unstructured":"P\u00e9rez-Sol\u00e0, C., Delgado-Segura, S., Navarro-Arribas, G., Herrera-Joancomart, J.: Another coin bites the dust: an analysis of dust in UTXO based cryptocurrencies. Cryptology ePrint Archive, Report 2018\/513 (2018). https:\/\/eprint.iacr.org\/2018\/513"},{"key":"17_CR29","unstructured":"Rizun, P.R.: A transaction fee market exists without a block size limit (2015)"},{"key":"17_CR30","unstructured":"Todd, P.: Making UTXO set growth irrelevant with low-latency delayed TXO commitments (2016). https:\/\/petertodd.org\/2016\/delayed-txo-commitments"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-662-44774-1_5","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2014","unstructured":"Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 57\u201371. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_5"},{"key":"17_CR32","unstructured":"Bitcoin Wiki: How to cheaply consolidate coins to reduce miner fees (2020). https:\/\/en.bitcoin.it\/wiki\/How_to_cheaply_consolidate_coins_to_reduce_miner_fees"},{"key":"17_CR33","unstructured":"Wilcke, J.: The ethereum network is currently undergoing a DOS attack (2016). https:\/\/blog.ethereum.org\/2016\/09\/22\/ethereum-network-currently-undergoing-dos-attack\/"},{"key":"17_CR34","unstructured":"Zahnentferner, J.: Chimeric ledgers: translating and unifying UTXO-based and account-based cryptocurrencies. Cryptology ePrint Archive, Report 2018\/262 (2018). https:\/\/eprint.iacr.org\/2018\/262"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T20:04:44Z","timestamp":1634933084000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}