{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:29:32Z","timestamp":1755793772536,"version":"3.44.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100015595","name":"Ethereum Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100015595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"DOI":"10.1109\/icbc64466.2025.11114573","type":"proceedings-article","created":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:34:30Z","timestamp":1755196470000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Fortuna: A Game-theoretic Protocol to Generate Secret Randomness on the Blockchain"],"prefix":"10.1109","author":[{"given":"Pouria","family":"Fatemi","sequence":"first","affiliation":[{"name":"Technical University of Munich,Munich,Germany"}]},{"given":"Amir Kafshdar","family":"Goharshady","sequence":"additional","affiliation":[{"name":"University of Oxford,Oxford,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Fortuna: A game-theoretic protocol to generate secret randomness on the blockchain (long version)","author":"Fatemi"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00083"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751326"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.02.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48731-6_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174917"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89884-1_26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0240693"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1089\/glr2.2017.2174"},{"key":"ref12","first-page":"421","article-title":"Betting on blockchain","volume":"17","author":"White","year":"2018","journal-title":"Colo. Tech. LJ"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/cybermatics_2018.2018.00231"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain60715.2023.00051"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3732772.3733532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BCCA58897.2023.10338880"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC59979.2024.10634454"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3622829"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110923"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174876"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3555776.3577833"},{"key":"ref22","first-page":"11:1","article-title":"Ergodic mean-payoff games for the analysis of attacks in crypto-currencies","author":"Chatterjee","year":"2018","journal-title":"CONCUR"},{"key":"ref23","volume-title":"An introduction to mathematical cryptography.","author":"Hoffstein","year":"2008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316779309"},{"key":"ref27","article-title":"Algorithmic game theory, 2007","volume-title":"Book available for free online","author":"Nisan","year":"2007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"ref29","first-page":"387","article-title":"On distinguishing prime numbers from composite numbers (abstract)","author":"Adleman","year":"1980","journal-title":"FOCS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1515\/9781400882168-018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751326"},{"key":"ref34","article-title":"RANDAO: A DAO working as RNG of Ethereum","year":"2019"},{"key":"ref35","article-title":"Predicting random numbers in ethereum smart contracts","author":"Reutov","year":"2018"},{"key":"ref36","year":"2016","journal-title":"When can blockhash be safely used for a random number? when would it be unsafe"},{"key":"ref37","article-title":"A scalable architecture for on-demand, untrusted delivery of entropy","year":"2019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_13"},{"key":"ref41","article-title":"Simple verifiable delay functions","author":"Pietrzak","year":"2018","journal-title":"ITCS"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_5"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_14"},{"key":"ref46","article-title":"Winning the caucus race: Continuous leader election via public randomness","volume":"abs\/1801.07965","author":"Azouvi","year":"2018","journal-title":"CoRR"},{"key":"ref47","article-title":"Proofs-of-delay and randomness beacons in ethereum","author":"B\u00fcnz","year":"2017","journal-title":"S&B"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0318-0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_27"},{"key":"ref50","first-page":"573","article-title":"Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake protocol","volume-title":"IACR Cryptol","author":"David","year":"2017"},{"key":"ref51","article-title":"DFINITY technology overview series, consensus system","volume":"abs\/1805.04548","author":"Hanke","year":"2018","journal-title":"CoRR"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC59979.2024.10634373"}],"event":{"name":"2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Pisa, Italy","start":{"date-parts":[[2025,6,2]]},"end":{"date-parts":[[2025,6,6]]}},"container-title":["2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11114381\/11114414\/11114573.pdf?arnumber=11114573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T05:07:02Z","timestamp":1755234422000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11114573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/icbc64466.2025.11114573","relation":{},"subject":[],"published":{"date-parts":[[2025,6,2]]}}}