{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T06:17:14Z","timestamp":1677651434018},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11432-019-2698-1","type":"journal-article","created":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T03:02:24Z","timestamp":1581735744000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of bitcoin backbone protocol in the non-flat model"],"prefix":"10.1007","volume":"63","author":[{"given":"Peifang","family":"Ni","sequence":"first","affiliation":[]},{"given":"Hongda","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dongxue","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,11]]},"reference":[{"key":"2698_CR1","volume-title":"Bitcoin: a peer-to-peer electronic cash system","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2008. http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"2698_CR2","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology\u2014CRYPTO\u201992","author":"C Dwork","year":"1993","unstructured":"Dwork C, Naor M. Pricing via processing or combatting junk mail. In: Advances in Cryptology\u2014CRYPTO\u201992. Berlin: Springer, 1993. 139\u2013147"},{"key":"2698_CR3","volume-title":"Technical Report","author":"R L Rivest","year":"1996","unstructured":"Rivest R L, Shamir A, Wagner D A. Time-Lock Puzzles and Timed-Release Crypto. Technical Report, Cambridge, 1996"},{"key":"2698_CR4","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol: analysis and applications. In: Advances in Cryptology\u2014EUROCRYPT 2015. Berlin: Springer, 2015. 281\u2013310"},{"key":"2698_CR5","first-page":"643","volume-title":"Advances in Cryptology\u2014EUROCRYPT","author":"R Pass","year":"2017","unstructured":"Pass R, Seeman L, Shelat A. Analysis of the blockchain protocol in asynchronous networks. In: Advances in Cryptology\u2014EUROCRYPT. Berlin: Springer, 2017. 643\u2013673"},{"key":"2698_CR6","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-319-63688-7_10","volume-title":"Advances in Cryptology\u2014CRYPTO 2017","author":"J Garay","year":"2017","unstructured":"Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol with chains of variable difficulty. In: Advances in Cryptology\u2014CRYPTO 2017. Berlin: Springer, 2017. 291\u2013323"},{"key":"2698_CR7","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/964723.383072","volume":"31","author":"S Ratnasamy","year":"2001","unstructured":"Ratnasamy S, Francis P, Handley M, et al. A scalable content-addressable network. SIGCOMM Comput Commun Rev, 2001, 31: 161\u2013172","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"2698_CR8","first-page":"65","volume-title":"Proceedings of IEEE Workshop on Hot Topics in Operating Systems","author":"P Druschel","year":"2001","unstructured":"Druschel P, Rowstron A. Past: persistent and anonymous storage in a peer-to-peer networking environment. In: Proceedings of IEEE Workshop on Hot Topics in Operating Systems, 2001. 65\u201370"},{"key":"2698_CR9","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro M, Liskov B. Practical byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 2002, 20: 398\u2013461","journal-title":"ACM Trans Comput Syst"},{"key":"2698_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1095809.1095817","volume":"39","author":"M Abd-El-Malek","year":"2005","unstructured":"Abd-El-Malek M, Ganger G R, Goodson G R, et al. Fault-scalable byzantine fault-tolerant services. SIGOPS Oper Syst Rev, 2005, 39: 59\u201374","journal-title":"SIGOPS Oper Syst Rev"},{"key":"2698_CR11","first-page":"153","volume-title":"Making byzantine fault tolerant systems tolerate byzantine faults","author":"A Clement","year":"2009","unstructured":"Clement A, Wong E L, Alvisi L, et al. Making byzantine fault tolerant systems tolerate byzantine faults. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, Boston, 2009. 153\u2013168"},{"key":"2698_CR12","first-page":"1","volume-title":"Information propagation in the bitcoin network","author":"C Decker","year":"2013","unstructured":"Decker C, Wattenhofer R. Information propagation in the bitcoin network. In: Proceedings of International Conference on Peer-To-Peer Computing, 2013. 1\u201310"},{"key":"2698_CR13","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-662-47854-7_32","volume-title":"Financial Cryptography and Data Security","author":"Y Sompolinsky","year":"2015","unstructured":"Sompolinsky Y, Zohar A. Secure high-rate transaction processing in bitcoin. In: Financial Cryptography and Data Security. Berlin: Springer, 2015. 507\u2013527"},{"key":"2698_CR14","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-030-03332-3_10","volume-title":"Advances in Cryptology\u2014 ASIACRYPT 2018","author":"P Wei","year":"2018","unstructured":"Wei P, Yuan Q, Zheng Y, et al. Security of the blockchain against long delay attack. In: Advances in Cryptology\u2014 ASIACRYPT 2018. Berlin: Springer, 2018. 250\u2013275"},{"key":"2698_CR15","volume-title":"Proceedings of ACM International Conference on Systems and Storage","author":"I Tsabary","year":"2018","unstructured":"Tsabary I, Eyal I. The gap game. In: Proceedings of ACM International Conference on Systems and Storage, 2018."},{"key":"2698_CR16","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal I, Sirer E G. Majority is not enough: bitcoin mining is vulnerable. Commun ACM, 2018, 61: 95\u2013102","journal-title":"Commun ACM"},{"key":"2698_CR17","first-page":"162","volume":"2019","author":"P Sarkar","year":"2019","unstructured":"Sarkar P. Multi-stage proof-of-work blockchain. IACR Cryptology ePrint Archive, 2019, 2019: 162","journal-title":"IACR Cryptology ePrint Archive"},{"key":"2698_CR18","volume-title":"StrongChain: transparent and collaborative proof-of-work consensus","author":"P Szalachowski","year":"2019","unstructured":"Szalachowski P, Reijsbergen D, Homoliak I, et al. StrongChain: transparent and collaborative proof-of-work consensus. 2019. ArXiv: 1905.09655"},{"key":"2698_CR19","first-page":"66","volume-title":"Ouroboros praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain","author":"B David","year":"2018","unstructured":"David B, Ga\u017ei P, Kiayias A, et al. Ouroboros praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Proceedings of International Conference on the Theory & Applications of Cryptographic Techniques. Berlin: Springer, 2018. 66\u201398"},{"key":"2698_CR20","first-page":"913","volume-title":"Proceedings of Computer and Communications Security","author":"C Badertscher","year":"2018","unstructured":"Badertscher C, Gazi P, Kiayias A, et al. Ouroboros genesis: composable proof-of-stake blockchains with dynamic availability. In: Proceedings of Computer and Communications Security, 2018. 913\u2013930"},{"key":"2698_CR21","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum D, Rivest R L, Sherman A T. Blind signatures for untraceable payments. In: Advances in Cryptology. Berlin: Springer, 1983. 199\u2013203"},{"key":"2698_CR22","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-662-46447-2_5","volume-title":"Public-Key Cryptography\u2014PKC 2015","author":"F Baldimtsi","year":"2015","unstructured":"Baldimtsi F, Chase M, Fuchsbauer G, et al. Anonymous transferable e-cash. In: Public-Key Cryptography\u2014PKC 2015. Berlin: Springer, 2015. 101\u2013124"},{"key":"2698_CR23","first-page":"107","volume":"2016","author":"H Tewari","year":"2016","unstructured":"Tewari H, Hughes A. Fully anonymous transferable ecash. IACR Cryptol ePrint Archive, 2016, 2016: 107","journal-title":"IACR Cryptol ePrint Archive"},{"key":"2698_CR24","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1049\/iet-ifs.2015.0485","volume":"10","author":"S Canard","year":"2015","unstructured":"Canard S, Pointcheval D, Sanders O, et al. Divisible e-cash made practical. IET Inf Secur, 2015, 10: 332\u2013347","journal-title":"IET Inf Secur"},{"key":"2698_CR25","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/SP.2013.34","volume-title":"Proceedings of 2013 IEEE Symposium on Security and Privacy","author":"I Miers","year":"2013","unstructured":"Miers I, Garman C, Green M, et al. Zerocoin: anonymous distributed e-cash from bitcoin. In: Proceedings of 2013 IEEE Symposium on Security and Privacy, 2013. 397\u2013411"},{"key":"2698_CR26","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1109\/SP.2014.36","volume-title":"Proceedings of 2014 IEEE Symposium on Security and Privacy (SP)","author":"E B Sasson","year":"2014","unstructured":"Sasson E B, Chiesa A, Garman C, et al. Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings of 2014 IEEE Symposium on Security and Privacy (SP), 2014. 459\u2013474"},{"key":"2698_CR27","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti R. Security and composition of multiparty cryptographic protocols. J Cryptol, 2000, 13: 143\u2013202","journal-title":"J Cryptol"},{"key":"2698_CR28","volume-title":"Proceedings of IEEE Symposium on Foundations of Computer Science","author":"R Canetti","year":"2001","unstructured":"Canetti R. Universal composable security: a new paradigm for cryptographic protocols. In: Proceedings of IEEE Symposium on Foundations of Computer Science, 2001"},{"key":"2698_CR29","first-page":"1019","volume":"2015","author":"A Kiayias","year":"2015","unstructured":"Kiayias A, Panagiotakos G. Speed-security tradeoffs in blockchain protocols. IACR Cryptol ePrint Archive, 2015, 2015: 1019","journal-title":"IACR Cryptol ePrint Archive"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-2698-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-019-2698-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-2698-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T07:34:32Z","timestamp":1612942472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-019-2698-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,11]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["2698"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-2698-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,11]]},"assertion":[{"value":"15 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"130105"}}