{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T04:44:04Z","timestamp":1768452244972,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T00:00:00Z","timestamp":1543017600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TIN2014-55243-P"],"award-info":[{"award-number":["TIN2014-55243-P"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003030","name":"Ag\u00e8ncia de Gesti\u00f3 d\u2019Ajuts Universitaris i de Recerca","doi-asserted-by":"publisher","award":["2014SGR-691"],"award-info":[{"award-number":["2014SGR-691"]}],"id":[{"id":"10.13039\/501100003030","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10207-018-0422-4","type":"journal-article","created":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T01:45:05Z","timestamp":1543023905000},"page":"451-463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Double-spending prevention for Bitcoin zero-confirmation transactions"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7534-1326","authenticated-orcid":false,"given":"Cristina","family":"P\u00e9rez-Sol\u00e0","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7783-7288","authenticated-orcid":false,"given":"Sergi","family":"Delgado-Segura","sequence":"additional","affiliation":[]},{"given":"Guillermo","family":"Navarro-Arribas","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Herrera-Joancomart\u00ed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,24]]},"reference":[{"key":"422_CR1","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906\u2013917. ACM (2012)"},{"issue":"1","key":"422_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2732196","volume":"18","author":"GO Karame","year":"2015","unstructured":"Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., \u010capkun, S.: Misbehavior in Bitcoin: a study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1), 21 (2015). \n                    https:\/\/doi.org\/10.1145\/2732196","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"422_CR3","unstructured":"GAP600: Gap600 bitcoin transactions guaranteed. \n                    http:\/\/gap600.com\/\n                    \n                   (2017). Accessed 12 Nov 2018"},{"key":"422_CR4","unstructured":"Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: In: Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P). Trento (2013)"},{"key":"422_CR5","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15\u201329. ACM (2014)"},{"key":"422_CR6","unstructured":"Biryukov, A., Pustogarov, I.: Security and Privacy (SP), 2015 IEEE Symposium on, pp. 122\u2013134. IEEE (2015)"},{"key":"422_CR7","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: In: The Twelfth Workshop on the Economics of Information Security (WEIS, 2013) (2013)"},{"key":"422_CR8","doi-asserted-by":"crossref","unstructured":"Bentov, I., Kumaresan, R.: In: International Cryptology Conference, pp. 421\u2013439. Springer (2014)","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"422_CR9","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-chain Instant Payments. Technical Reports. \n                    https:\/\/lightning.network\n                    \n                   (2015). Accessed 12 Nov 2018"},{"key":"422_CR10","doi-asserted-by":"crossref","unstructured":"Bentov, I., Kumaresan, R., Miller, A.: In: Theory and Application of Cryptology and Information Security, pp. 410\u2013440. Springer (2017)","DOI":"10.1007\/978-3-319-70697-9_15"},{"key":"422_CR11","unstructured":"David, B., Dowsley, R., Larangeira, M.: In: Proceedings of the 2018 International Conference on Financial Cryptography and Data Security (2018)"},{"key":"422_CR12","unstructured":"Park, S., Kwon, A., Fuchsbauer, G., Gazi, P., Alwen, J., Pietrzak, K.: In: Proceedings of the 2018 International Conference on Financial Cryptography and Data Security (2018)"},{"key":"422_CR13","unstructured":"Ruffing, T., Kate, A., Schr\u00f6der, D.: In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS \u201915, pp. 219\u2013230. ACM (2015)"},{"key":"422_CR14","unstructured":"Antonopoulos, A.M.: In: Mastering Bitcoin: Unlocking Digital Cryptocurrencies, Chap. 5. O\u2019Reilly Media, Inc. (2014)"},{"key":"422_CR15","unstructured":"Certicom Research: Sec 2: Recommended Elliptic Curve Domain Parameters. Technical Reports, Certicom Corp (2010)"},{"key":"422_CR16","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"422_CR17","volume-title":"Understanding Cryptography: A Textbook for Students and Practitioners","author":"C Paar","year":"2009","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Berlin (2009)"},{"issue":"3","key":"422_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s00145-002-0021-3","volume":"15","author":"PQ Nguyen","year":"2002","unstructured":"Nguyen, P.Q., Shparlinski, I.E.: The insecurity of the digital signature algorithm with partially known nonces. J. Cryptol. 15(3), 151 (2002)","journal-title":"J. Cryptol."},{"key":"422_CR19","doi-asserted-by":"crossref","unstructured":"Bellare, M., Goldwasser, S., Micciancio, D.: In: Annual International Cryptology Conference, pp. 277\u2013291. Springer (1997)","DOI":"10.1007\/BFb0052242"},{"key":"422_CR20","unstructured":"Schneider, N.: Recovering Bitcoin private keys using weak signatures from the blockchain. Retrieved from \n                    https:\/\/web.archive.org\/web\/20180201164531\/\n                    \n                  \n                           \n                    http:\/\/www.nilsschneider.net\/2013\/01\/28\/recovering-bitcoin-private-keys.html\n                    \n                   (2013)"},{"key":"422_CR21","unstructured":"Valsorda, F.: Exploiting ECDSA failures in the Bitcoin blockchain (2014). \n                    http:\/\/conference.hitb.org\/hitbsecconf2014kul\/materials\/D1T1%20-%20Filippo%20Valsorda%20-%20Exploiting%20ECDSA%20Failures%20in%20the%20Bitcoin%20Blockchain.pdf"},{"key":"422_CR22","unstructured":"Bitcoin.org.: Android security vulnerability. \n                    https:\/\/bitcoin.org\/en\/alert\/2013-08-11-android\n                    \n                   (2013). Accessed 12 Nov 2018"},{"key":"422_CR23","doi-asserted-by":"crossref","unstructured":"Pornin, T.: Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). In: RFC 6979, Internet Request for Comments, The Internet Society (2013)","DOI":"10.17487\/rfc6979"},{"key":"422_CR24","doi-asserted-by":"publisher","unstructured":"Clark, J., Essex, A.: In: Keromytis A.D. (eds) Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 7397, pp. 390\u2013398. Springer, Berlin (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-32946-3_28","DOI":"10.1007\/978-3-642-32946-3_28"},{"key":"422_CR25","unstructured":"Decker, C.: Data propagation: How fast does information move in the network? \n                    http:\/\/bitcoinstats.com\/network\/propagation\/\n                    \n                   (2017). Accessed 12 Nov 2018"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-018-0422-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-018-0422-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-018-0422-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T19:04:04Z","timestamp":1574535844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-018-0422-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,24]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["422"],"URL":"https:\/\/doi.org\/10.1007\/s10207-018-0422-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,24]]},"assertion":[{"value":"24 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}