{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T05:25:34Z","timestamp":1749705934746,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623769"},{"type":"electronic","value":"9789811623776"}],"license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2377-6_83","type":"book-chapter","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T01:44:09Z","timestamp":1632447849000},"page":"911-924","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Multidimensional Blockchain Security Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4019-0705","authenticated-orcid":false,"given":"Ilya","family":"Shilov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2520-1998","authenticated-orcid":false,"given":"Danil","family":"Zakoldaev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,24]]},"reference":[{"key":"83_CR1","volume-title":"Mastering bitcoin: unlocking digital crypto-currencies","author":"A Antonopoulos","year":"2014","unstructured":"Antonopoulos A (2014) Mastering bitcoin: unlocking digital crypto-currencies. O\u2019Reilly Media Inc., Sebastopol"},{"key":"83_CR2","doi-asserted-by":"crossref","unstructured":"Badertscher C, Ga\u017ei P, Kiayias A, Russell A, Zikas V (2018) Ouroboros genesis: composable proof-of-stake blockchains with dynamic availability. In: ACM conference on computer and communications security\u2014ACM CCS 2018, pp. 913\u2013930","DOI":"10.1145\/3243734.3243848"},{"key":"83_CR3","doi-asserted-by":"crossref","unstructured":"Badertscher C, Maurer U, Tschudi D, Zikas V (2017) Bitcoin as a transaction ledger: a composable treatment. In: Katz J, Shacham H (eds), Advances in cryptology\u2014CRYPTO 2017. CRYPTO 2017. LNCS, vol 10401. Springer, Cham, pp 324\u2013356","DOI":"10.1007\/978-3-319-63688-7_11"},{"key":"83_CR4","doi-asserted-by":"crossref","unstructured":"Bentov I, Gabizon A, Mizrahi A (2016) Cryptocurrencies without proof of work. In: Clark J, Meiklejohn S, Ryan P, Wallach D, Brenner M, Rohloff K (eds), Financial cryptography and data security. FC 2016. LNCS, vol 9604. Springer, Berlin, Heidelberg, , pp 142\u2013157","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"83_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3","volume-title":"Introduction to reliable and secure distributed programming","author":"C Cachin","year":"2011","unstructured":"Cachin C, Guerraoui R, Rodrigues L (2011) Introduction to reliable and secure distributed programming. Springer, Berlin, Heidelberg"},{"key":"83_CR6","doi-asserted-by":"crossref","unstructured":"Canetti R (2001) Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE symposium on foundations of computer science. Newport Beach, CA, USA, pp 136\u2013145","DOI":"10.1109\/SFCS.2001.959888"},{"key":"83_CR7","unstructured":"Canetti R (2014) Universally composable signatures, certification, and authenticated communication. In: Proceedings of 17th computer security foundations workshop (CSFW). IEEE Computer Society, Washington, DC"},{"key":"83_CR8","doi-asserted-by":"crossref","unstructured":"Canetti R, Dodis Y, Pass R, Walfish S (2007) Universally composable security with global setup. In: Vadhan SP (eds), Theory of cryptography. TCC 2007. LNCS, vol 4392. Springer, Berlin, Heidelberg, pp 61\u201385","DOI":"10.1007\/978-3-540-70936-7_4"},{"key":"83_CR9","doi-asserted-by":"crossref","unstructured":"Canetti R, Shahaf D, Vald M (2016) universally composable authentication and key-exchange with global PKI. In: Cheng CM, Chung KM, Persiano G, Yang BY (eds), Public-key cryptography\u2014PKC 2016. PKC 2016. LNCS, vol 9615. Springer, Berlin, Heidelberg, pp. 265\u2013296","DOI":"10.1007\/978-3-662-49387-8_11"},{"key":"83_CR10","doi-asserted-by":"crossref","unstructured":"David B, Dowsley R, Larangeira M (2019) ROYALE: a framework for universally composable card games with financial rewards and penalties enforcement. In: Goldberg I, Moore T (eds), Financial cryptography and data security. FC 2019. LNCS, vol 11598. Springer, Cham, pp 282\u2013300","DOI":"10.1007\/978-3-030-32101-7_18"},{"key":"83_CR11","doi-asserted-by":"crossref","unstructured":"David B, Ga\u017ei P, Kiayias A, Russell A (2018) Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Nielsen J, Rijmen V (eds), Advances in cryptology\u2014EUROCRYPT 2018. EUROCRYPT 2018. LNCS, vol 10821. Springer, Cham, pp 66\u201398","DOI":"10.1007\/978-3-319-78375-8_3"},{"key":"83_CR12","doi-asserted-by":"crossref","unstructured":"Duan S, Meling H, Peisert S, Zhang H (2014) BChain: byzantine replication with hight throughput and embedded reconfiguration. In: principles of distributed systems\u2014OPODIS 2014, LNCS, vol 8878. Springer, Cham, pp 91\u2013106","DOI":"10.1007\/978-3-319-14472-6_7"},{"key":"83_CR13","doi-asserted-by":"crossref","unstructured":"Garay J, Kiayias A, Leonardos N (2015) The Bitcoin backbone protocol: analysis and applications. In: Oswald E, Fischlin M (eds), Advances in cryptology\u2014EUROCRYPT 2015. EUROCRYPT 2015. LNCS, vol 9057. Springer, Berlin, Heidelberg, pp 281\u2013310","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"83_CR14","doi-asserted-by":"crossref","unstructured":"Garay J, Kiayias A, Leonardos N (2017) The Bitcoin backbone protocol with chains of variable difficulty. In: Katz J, Shacham H (eds), Advances in cryptology\u2014CRYPTO 2017. CRYPTO 2017. LNCS, vol 10401. Springer, Cham, pp 291\u2013323","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"83_CR15","doi-asserted-by":"crossref","unstructured":"Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz J, Shacham H (eds), Advances in cryptology\u2014CRYPTO 2017. CRYPTO 2017. LNCS, vol 10401. Springer, Cham, pp 357\u2013388","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"83_CR16","doi-asserted-by":"crossref","unstructured":"Pass R, Seeman L, Shelat A (2017) Analysis of the blockchain protocol in asynchronous networks. In: Coron JS, Nielsen J (eds), Advances in cryptology\u2014EUROCRYPT 2017. EUROCRYPT 2017. LNCS, vol 10211. Springer, Cham, pp 643\u2013673","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"83_CR17","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease M, Shostak R, Lamport L (1980) Reaching agreement in the presence of faults. J ACM (JACM) 27:228\u2013234","journal-title":"J ACM (JACM)"},{"key":"83_CR18","unstructured":"Sompolinsky Y, Zohar A (2013) Accelerating Bitcoin's transaction processing fast money grows on trees, not chains. IACR Cryptology ePrint Archive"},{"key":"83_CR19","doi-asserted-by":"crossref","unstructured":"Vukilic M (2017) Rethinking permissioned blockchains. In: Proceedings of the ACM workshop on blockchain, cryptocurrencies and contracts (BCC \u201917), pp 3\u20137","DOI":"10.1145\/3055518.3055526"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2377-6_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T18:25:25Z","timestamp":1644431125000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2377-6_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"ISBN":["9789811623769","9789811623776"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2377-6_83","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"24 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}