{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T01:56:17Z","timestamp":1761184577512,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535392"},{"type":"electronic","value":"9789819535408"}],"license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3540-8_23","type":"book-chapter","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T13:33:20Z","timestamp":1761140000000},"page":"424-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AnoST: An Anonymous Optimistic Verification System Based on\u00a0Off-Chain State Transition"],"prefix":"10.1007","author":[{"given":"Qiyuan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Junxiang","family":"Nong","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"23_CR1","unstructured":"Aztec Protocol: Aztec protocol: Privacy-first zkrollup on ethereum (2021). https:\/\/github.com\/AztecProtocol\/AZTEC\/blob\/master\/AZTEC.pdf"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Bach, L.M., Mihaljevic, B., Zagar, M.: Comparative analysis of blockchain consensus algorithms. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1545\u20131550. IEEE (2018)","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Bugiel, S., Derr, E.: Reliable third-party library detection in android and its security applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 356\u2013367. ACM (2016)","DOI":"10.1145\/2976749.2978333"},{"issue":"1","key":"23_CR4","first-page":"14","volume":"4","author":"A Baliga","year":"2017","unstructured":"Baliga, A.: Understanding blockchain consensus models. Persistent 4(1), 14 (2017)","journal-title":"Persistent"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Introducing Ethereum and Solidity. Apress, Berkeley, CA (2017). https:\/\/doi.org\/10.1007\/978-1-4842-2535-6_9","DOI":"10.1007\/978-1-4842-2535-6_9"},{"issue":"5","key":"23_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCSE.2017.3421554","volume":"19","author":"M Pierro","year":"2017","unstructured":"Pierro, M.: What is the blockchain? Comput. Sci. Eng. 19(5), 92\u201395 (2017)","journal-title":"Comput. Sci. Eng."},{"key":"23_CR7","unstructured":"Du, W., Atallah, M.J.: Privacy-preserving cooperative scientific computations. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW), pp. 273\u2013282. IEEE (2001)"},{"key":"23_CR8","unstructured":"Ethereum Foundation: Optimistic rollups (2025). https:\/\/ethereum.org\/en\/developers\/docs\/scaling\/optimistic-rollups\/"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"G\u00f6bel, J., Krzesinski, A.E.: Increased block size and bitcoin blockchain dynamics. In: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/ATNAC.2017.8215367"},{"issue":"3","key":"23_CR10","doi-asserted-by":"publisher","first-page":"1972","DOI":"10.1109\/TII.2019.2938001","volume":"16","author":"S Guo","year":"2020","unstructured":"Guo, S., Hu, X., Guo, S., Qiu, X., Qi, F.: Blockchain meets edge computing: a distributed and trusted authentication system. IEEE Trans. Industr. Inf. 16(3), 1972\u20131983 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"23_CR11","unstructured":"Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S.M., Felten, E.W.: Arbitrum: scalable, private smart contracts. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1353\u20131370 (2018)"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/11535218_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"L Kissner","year":"2005","unstructured":"Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241\u2013257. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_15"},{"key":"23_CR13","unstructured":"Landis, D.: Incentive non-compatibility of optimistic rollups. arXiv preprint arXiv:2312.01549 (2023)"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"43620","DOI":"10.1109\/ACCESS.2021.3065880","volume":"9","author":"B Lashkari","year":"2021","unstructured":"Lashkari, B., Musilek, P.: A comprehensive review of blockchain consensus mechanisms. IEEE Access 9, 43620\u201343652 (2021)","journal-title":"IEEE Access"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Li, J.: On the security of optimistic blockchain mechanisms. In: Working Paper, SSRN (2023)","DOI":"10.2139\/ssrn.4499357"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), pp. 706\u2013719. ACM (2015)","DOI":"10.1145\/2810103.2813659"},{"key":"23_CR17","first-page":"1","volume":"53","author":"LK McAllister","year":"2012","unstructured":"McAllister, L.K.: Regulation by third-party verification. Boston Coll. Law Rev. 53, 1\u201370 (2012)","journal-title":"Boston Coll. Law Rev."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Min, X., Li, Q., Liu, L., Cui, L.: A permissioned blockchain framework for supporting instant transaction and dynamic block size. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 90\u201396. IEEE (2016)","DOI":"10.1109\/TrustCom.2016.0050"},{"issue":"16","key":"23_CR19","doi-asserted-by":"publisher","first-page":"12806","DOI":"10.1109\/JIOT.2021.3072611","volume":"8","author":"DC Nguyen","year":"2021","unstructured":"Nguyen, D.C., et al.: Federated learning meets blockchain in edge computing: opportunities and challenges. IEEE Internet Things J. 8(16), 12806\u201312825 (2021)","journal-title":"IEEE Internet Things J."},{"key":"23_CR20","unstructured":"Panait, A.E., Olimid, R.F., Stefanescu, A.: Identity management on blockchain \u2013 privacy and security aspects. arXiv preprint arXiv:2004.13107 (2020)"},{"key":"23_CR21","unstructured":"Project, C.: Cartesi rollups: a modular execution stack for scalable DApps. Whitepaper \/ technical report, Cartesi Foundation (2022). https:\/\/docs.cartesi.io\/cartesi-rollups\/1.0\/"},{"issue":"4","key":"23_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3524104","volume":"55","author":"Y Qu","year":"2022","unstructured":"Qu, Y., Uddin, M.P., Gan, C., Chen, X., Zhang, L.: Blockchain-enabled federated learning: a survey. ACM Comput. Surv. 55(4), 1\u201335 (2022)","journal-title":"ACM Comput. Surv."},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Salman, T., Zolanvari, M., Erbad, A., Jain, R., Samaka, M.: Security services using blockchains: a state of the art survey. arXiv preprint arXiv:1810.08735 (2018)","DOI":"10.1109\/COMST.2018.2863956"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Sch\u00e4r, F.: Decentralized finance: on blockchain- and smart contract-based financial markets. Fed. Reserve Bank St. Louis Rev. 103(2), 153\u2013174 (2021)","DOI":"10.20955\/r.103.153-74"},{"key":"23_CR25","unstructured":"Setty, S., Vu, V., Panpalia, N., Braun, B., Blumberg, A.J., Walfish, M.: Taking proof-based verified computation a few steps closer to practicality. In: 21st USENIX Security Symposium, pp. 253\u2013268. USENIX Association (2012)"},{"issue":"7","key":"23_CR26","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/TPDS.2020.3044223","volume":"32","author":"M Shayan","year":"2021","unstructured":"Shayan, M., Fung, C., Yoon, C.J.M., Beschastnikh, I.: Biscotti: a blockchain system for private and secure federated learning. IEEE Trans. Parallel Distrib. Syst. 32(7), 1513\u20131525 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"93039","DOI":"10.1109\/ACCESS.2022.3200051","volume":"10","author":"LT Thibault","year":"2022","unstructured":"Thibault, L.T., Sarry, T., Hafid, A.S.: Blockchain scaling using rollups: a comprehensive survey. IEEE Access 10, 93039\u201393054 (2022)","journal-title":"IEEE Access"},{"issue":"8","key":"23_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2018.1701095","volume":"56","author":"Z Xiong","year":"2018","unstructured":"Xiong, Z., Zhang, Y., Niyato, D., Wang, P., Han, Z.: When mobile blockchain meets edge computing. IEEE Commun. Mag. 56(8), 33\u201339 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"13s","key":"23_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579845","volume":"55","author":"J Xu","year":"2023","unstructured":"Xu, J., Wang, C., Jia, X.: A survey of blockchain consensus protocols. ACM Comput. Surv. 55(13s), 1\u201335 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"23_CR30","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.1109\/COMST.2019.2894727","volume":"21","author":"R Yang","year":"2019","unstructured":"Yang, R., Yu, F.R., Si, P., Zheng, Z., Zhang, Y.: Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun. Surv. Tutorials 21(2), 1508\u20131532 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"23_CR31","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/s11036-017-0872-3","volume":"22","author":"X Yu","year":"2017","unstructured":"Yu, X., Yan, Z., Vasilakos, A.V.: A survey of verifiable computation. Mobile Netw. Appl. 22(3), 438\u2013453 (2017)","journal-title":"Mobile Netw. Appl."},{"issue":"4","key":"23_CR32","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3540-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:03:22Z","timestamp":1761170602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3540-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"ISBN":["9789819535392","9789819535408"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3540-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"23 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}