{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T17:23:09Z","timestamp":1747070589378,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:00:00Z","timestamp":1641340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:00:00Z","timestamp":1641340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12083-021-01227-x","type":"journal-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:10:46Z","timestamp":1641341446000},"page":"988-1007","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["TontineCoin: Survivor-based Proof-of-Stake"],"prefix":"10.1007","volume":"15","author":[{"given":"Chris","family":"Pollett","sequence":"first","affiliation":[]},{"given":"Thomas H.","family":"Austin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0332-1347","authenticated-orcid":false,"given":"Katerina","family":"Potika","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Rietz","sequence":"additional","affiliation":[]},{"given":"Prashant","family":"Pardeshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,5]]},"reference":[{"key":"1227_CR1","unstructured":"Abraham I, Gueta G, Malkhi D (2018) Hot-stuff the linear, optimal-resilience, one-message BFT devil. CoRR abs\/1803.05069"},{"key":"1227_CR2","unstructured":"Ali M, Nelson JC, Shea R, Freedman MJ (2016) Blockstack: A global naming and storage system secured by blockchains. In: USENIX Annual Technical Conference, pp. 181\u2013194. USENIX Association"},{"key":"1227_CR3","first-page":"574","volume":"2018","author":"Y Amoussou-Guenou","year":"2018","unstructured":"Amoussou-Guenou Y, Pozzo AD, Potop-Butucaru M, Tucci Piergiovanni S (2018) Correctness and fairness of tendermint-core blockchains. IACR Cryptology ePrint Archive 2018:574","journal-title":"IACR Cryptology ePrint Archive"},{"key":"1227_CR4","doi-asserted-by":"crossref","unstructured":"Austin TH (2020) Spartangold: A blockchain for education, experimentation, and rapid prototyping. In: Silicon Valley Cybersecurity Conference (SVCC)","DOI":"10.1007\/978-3-030-72725-3_9"},{"key":"1227_CR5","unstructured":"Back A (2002) Hashcash - a denial of service counter-measure. http:\/\/www.hashcash.org\/papers\/hashcash.pdf Tech rep"},{"key":"1227_CR6","unstructured":"Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Tim\u00f3n J, Wuille P (2014) Enabling blockchain innovations with pegged sidechains.\u00a0https:\/\/blockstream.com\/sidechains.pdf"},{"key":"1227_CR7","doi-asserted-by":"crossref","unstructured":"Bentov I, Gabizon A, Mizrahi A (2016) Cryptocurrencies without proof of work. In: International conference on financial cryptography and data security, pp. 142\u2013157. Springer","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"1227_CR8","unstructured":"Braithwaite S, Buchman E, Konnov I, Milosevic Z, Stoilkovska I, Widder J, Zamfir A (2020) Formal specification and model checking of the tendermint blockchain synchronization protocol (short paper). In: 2nd Workshop on Formal Methods for Blockchains (FMBC 2020). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik"},{"key":"1227_CR9","unstructured":"Buchman E, Kwon J, Milosevic Z (2018) The latest gossip on BFT consensus. CoRR abs\/1807.04938.\u00a0http:\/\/arxiv.org\/abs\/1807.04938"},{"key":"1227_CR10","unstructured":"Buterin V, Griffith V (2017) Casper the friendly finality gadget. CoRR abs\/1710.09437"},{"issue":"3","key":"1227_CR11","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1257\/aer.99.3.979","volume":"99","author":"G Camera","year":"2009","unstructured":"Camera G, Casari M (2009) Cooperation among strangers under the shadow of the future. Am Econ Rev 99(3):979\u20131005","journal-title":"American Economic Review"},{"key":"1227_CR12","doi-asserted-by":"crossref","unstructured":"Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS (2002) Secure routing for structured peer-to-peer overlay networks. ACM SIGOPS Operating Systems Review 36(SI):299\u2013314","DOI":"10.1145\/844128.844156"},{"key":"1227_CR13","first-page":"377","volume":"2018","author":"J Chen","year":"2018","unstructured":"Chen J, Gorbunov S, Micali S, Vlachos G (2018) Algorand Agreement: super fast and partition resilient byzantine agreement. IACR Cryptology ePrint Archive 2018:377","journal-title":"IACR Cryptology ePrint Archive"},{"key":"1227_CR14","doi-asserted-by":"crossref","unstructured":"DurandA, Anceaume E, Ludinard R (2019) Stakecube: Combining sharding and proof-of-stake to build fork-free secure permissionless distributed ledgers. In: Networked Systems - 7th International Conference, NETYS, Revised Selected Papers. pp. 148\u2013165","DOI":"10.1007\/978-3-030-31277-0_10"},{"key":"1227_CR15","doi-asserted-by":"crossref","unstructured":"Dwork C, Lynch N, Stockmeyer L (1988) Consensus in the presence of partial synchrony. J. ACM 35(2), 288\u2013323.\u00a0http:\/\/doi.acm.org\/10.1145\/42282.42283","DOI":"10.1145\/42282.42283"},{"key":"1227_CR16","unstructured":"Eyal I, Gencer AE, Sirer EG, van Renesse R (2016) Bitcoin-ng: A scalable blockchain protocol. In: Symposium on Networked Systems Design and Implementation (NSDI), pp. 45\u201359. USENIX Association (2016).\u00a0https:\/\/www.usenix.org\/conference\/nsdi16\/technical-sessions\/presentation\/eyal"},{"key":"1227_CR17","unstructured":"Fang H, Ke R (2016) The insurance role of rosca in the presence of credit markets: Theory and evidence. https:\/\/www.ssc.wisc.edu\/scholz\/seminar\/rosca-wisc.pdf"},{"issue":"1","key":"1227_CR18","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MNET.011.2000223","volume":"35","author":"C Feng","year":"2021","unstructured":"Feng C, Yu K, Bashir AK, Al-Otaibi YD, Lu Y, Chen S, Zhang D (2021) Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Network 35(1):130\u2013137","journal-title":"IEEE Network"},{"key":"1227_CR19","doi-asserted-by":"crossref","unstructured":"Fiat A, Saia J, Young M (2005) Making chord robust to byzantine attacks. In: European Symposium on Algorithms. pp. 803\u2013814. Springer","DOI":"10.1007\/11561071_71"},{"key":"1227_CR20","unstructured":"Filecoin: A decentralized storage network. Tech. rep., Protocol Labs (2017)"},{"key":"1227_CR21","doi-asserted-by":"crossref","unstructured":"Jaiyeola MO, Patron K, Saia J, Young M, Zhou QM (2018) Tiny groups tackle byzantine adversaries. In: 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 1030\u20131039. IEEE","DOI":"10.1109\/IPDPS.2018.00112"},{"issue":"1","key":"1227_CR22","doi-asserted-by":"publisher","first-page":"63","DOI":"10.2307\/2297925","volume":"59","author":"M Kandori","year":"1992","unstructured":"Kandori M (1992) Social norms and community enforcement. Rev Econ Stud 59(1):63\u201380","journal-title":"Rev Econ Stud"},{"key":"1227_CR23","doi-asserted-by":"crossref","unstructured":"Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings, Part I, pp. 357\u2013388","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"1227_CR24","unstructured":"King S (2013) Primecoin: Cryptocurrency with prime number proof-of-work."},{"key":"1227_CR25","unstructured":"King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake.\u00a0http:\/\/primecoin.org\/static\/primecoin-paper.pdf"},{"key":"1227_CR26","unstructured":"Kwon J (2013) Tendermint: Consensus without mining, http:\/\/jaekwon.com\/2014\/05\/11\/tendermint\/"},{"key":"1227_CR27","unstructured":"Larimer D (2014) Delegated proof-of-stake (dpos)"},{"key":"1227_CR28","unstructured":"Larimer D\u00a0(2017) Eos.io technical white paper. https:\/\/github.com\/EOSIO\/Documentation\/blob\/master\/TechnicalWhitePaper.md"},{"key":"1227_CR29","doi-asserted-by":"crossref","unstructured":"Laurens P, Paige RF, Brooke PJ, Chivers H (2007) A novel approach to the detection of cheating in multiplayer online games. In: 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007), pp. 97\u2013106. IEEE","DOI":"10.1109\/ICECCS.2007.11"},{"issue":"2","key":"1227_CR30","first-page":"491","volume":"15","author":"K Mckeever","year":"2009","unstructured":"Mckeever K (2009) A short history of tontines. Fordham J Corp Financ Law 15(2):491\u2013521","journal-title":"Fordham Journal of Corporate & Financial Law"},{"key":"1227_CR31","doi-asserted-by":"crossref","unstructured":"Merkle RC\u00a0(1980) Protocols for public key cryptosystems. 1980 IEEE Symposium on Security and Privacy pp. 122\u2013122","DOI":"10.1109\/SP.1980.10006"},{"key":"1227_CR32","doi-asserted-by":"crossref","unstructured":"Merrill P, Austin TH, Thakker J, Park Y, Rietz J\u00a0(2019) Lock and load: A model for free blockchain transactions through token locking. In: IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON). IEEE","DOI":"10.1109\/DAPPCON.2019.00013"},{"key":"1227_CR33","doi-asserted-by":"crossref","unstructured":"Milevsky M\u00a0(2015) King William\u2019s Tontine Why the Retirement Annuity of the Future Should Resemble Its Past (Cambridge Studies in Comparative Politics). Cambridge University Press","DOI":"10.1017\/CBO9781139879316"},{"key":"1227_CR34","doi-asserted-by":"crossref","unstructured":"Miller A, Juels A, Shi E, Parno B, Katz J\u00a0(2014) Permacoin: Repurposing bitcoin work for data preservation. In: IEEE Symposium on Security and Privacy, pp. 475\u2013490. IEEE Computer Society","DOI":"10.1109\/SP.2014.37"},{"key":"1227_CR35","unstructured":"Nakamoto S\u00a0(2009) Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"1227_CR36","doi-asserted-by":"publisher","first-page":"85727","DOI":"10.1109\/ACCESS.2019.2925010","volume":"7","author":"CT Nguyen","year":"2019","unstructured":"Nguyen CT, Hoang DT, Nguyen DN, Niyato D, Nguyen HT, Dutkiewicz E (2019) Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access 7:85727\u201385745","journal-title":"IEEE Access"},{"key":"1227_CR37","doi-asserted-by":"crossref","unstructured":"Pollett C, Austin TH, Potika K, Rietz J\u00a0(2020) Tontinecoin: Murder-based proof-of-stake. In: J.\u00a0Xu, S.\u00a0Schulte, P.\u00a0Ruppel, A.\u00a0K\u00fcpper, D.\u00a0Jadav (eds.) 2nd IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2020, Oxford, UK, August 3-6, 2020, pp. 82\u201387. IEEE","DOI":"10.1109\/DAPPS49028.2020.00009"},{"key":"1227_CR38","doi-asserted-by":"crossref","unstructured":"Ransom RL, Sutch R\u00a0(1987) Tontine insurance and the armstrong investigation: A case of stifled innovation, 1868-1905. J Econ Hist 47(2), 379\u2013390.\u00a0http:\/\/www.jstor.org\/stable\/2122236","DOI":"10.1017\/S0022050700048130"},{"key":"1227_CR39","unstructured":"Rosenfeld M (2011) Analysis of bitcoin pooled mining reward systems. Computing Research Repository (CoRR) abs\/1112.4980.\u00a0http:\/\/arxiv.org\/abs\/1112.4980"},{"key":"1227_CR40","doi-asserted-by":"crossref","unstructured":"Sabin MJ, Forman JB\u00a0(2016) The analytics of a single-period tontine. Available at SSRN 2874160","DOI":"10.2139\/ssrn.2874160"},{"issue":"3","key":"1227_CR41","first-page":"433","volume":"74","author":"C Shapiro","year":"1984","unstructured":"Shapiro C, Stiglitz JE (1984) Equilibrium unemployment as a worker discipline device. Am Econ Rev 74(3):433\u2013444","journal-title":"Am Econ Rev"},{"key":"1227_CR42","doi-asserted-by":"crossref","unstructured":"Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered AAA scheme in the large-scale HetNet. Digit Commun Netw","DOI":"10.1016\/j.dcan.2020.10.002"},{"key":"1227_CR43","unstructured":"Storj\u00a0(2018) A decentralized cloud storage network framework. Tech. rep., Storj Labs Inc."},{"key":"1227_CR44","doi-asserted-by":"publisher","first-page":"103517","DOI":"10.1016\/j.csi.2021.103517","volume":"76","author":"L Tan","year":"2021","unstructured":"Tan L, Xiao H, Yu K, Aloqaily M, Jararweh Y (2021) A blockchain-empowered crowdsourcing system for 5G-enabled smart cities. Comput Stand Interfaces 76","journal-title":"Computer Standards & Interfaces"},{"key":"1227_CR45","unstructured":"Tendermint documentation (2018)\u00a0https:\/\/tendermint.com\/docs\/tendermint-core\/running-in-production.html#dos-exposure-and-mitigation"},{"key":"1227_CR46","unstructured":"Wood, G (2014) Ethereum: a secure decentralised generalised transaction ledger.\u00a0https:\/\/gavwood.com\/paper.pdf"},{"key":"1227_CR47","first-page":"1178","volume":"6","author":"S Yeung","year":"2006","unstructured":"Yeung S, Lui JC, Liu J, Yan J (2006) Detecting cheaters for multiplayer games: theory, design and implementation. Proc IEEE CCNC 6:1178\u20131182","journal-title":"Proc IEEE CCNC"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01227-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01227-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01227-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T08:15:44Z","timestamp":1647418544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01227-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,5]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1227"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01227-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,1,5]]},"assertion":[{"value":"3 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}