{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:01:44Z","timestamp":1775016104564,"version":"3.50.1"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T00:00:00Z","timestamp":1432684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2015,6,9]]},"abstract":"<jats:p>Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to resist double-spending through a distributed timestamping service. To ensure the operation and security of Bitcoin, it is essential that all transactions and their order of execution are available to all Bitcoin users.<\/jats:p>\n          <jats:p>Unavoidably, in such a setting, the security of transactions comes at odds with transaction privacy. Motivated by the fact that transaction confirmation in Bitcoin requires tens of minutes, we analyze the conditions for performing successful double-spending attacks against fast payments in Bitcoin, where the time between the exchange of currency and goods is short (in the order of a minute). We show that unless new detection techniques are integrated in the Bitcoin implementation, double-spending attacks on fast payments succeed with considerable probability and can be mounted at low cost. We propose a new and lightweight countermeasure that enables the detection of double-spending attacks in fast transactions.<\/jats:p>\n          <jats:p>In light of such misbehavior, accountability becomes crucial. We show that in the specific case of Bitcoin, accountability complements privacy. To illustrate this tension, we provide accountability and privacy definition for Bitcoin, and we investigate analytically and empirically the privacy and accountability provisions in Bitcoin.<\/jats:p>","DOI":"10.1145\/2732196","type":"journal-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T15:13:25Z","timestamp":1433258005000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":162,"title":["Misbehavior in Bitcoin"],"prefix":"10.1145","volume":"18","author":[{"given":"Ghassan O.","family":"Karame","sequence":"first","affiliation":[{"name":"NEC Laboratories Europe, Heidelberg, Germany"}]},{"given":"Elli","family":"Androulaki","sequence":"additional","affiliation":[{"name":"IBM Research Zurich, Switzerland"}]},{"given":"Marc","family":"Roeschlin","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Arthur","family":"Gervais","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Srdjan","family":"\u010capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08593-7_11"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_14"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325702.2325704"},{"key":"e_1_2_1_5_1","series-title":"Lecture Notes in Computer Science","volume-title":"Financial Cryptography and Data Security","author":"Barber Simon"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_2_1_7_1","volume-title":"Retrieved","year":"2015"},{"key":"e_1_2_1_8_1","unstructured":"BitcoinCharts. 2013. Bitcoin Charts. Retrieved April 2 2015 from http:\/\/bitcoincharts.com.  BitcoinCharts. 2013. Bitcoin Charts. Retrieved April 2 2015 from http:\/\/bitcoincharts.com."},{"key":"e_1_2_1_9_1","unstructured":"BitcoinDoS. 2013. Weaknesses. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Weaknesses.  BitcoinDoS. 2013. Weaknesses. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Weaknesses."},{"key":"e_1_2_1_10_1","volume-title":"Bitcoin Block Explorer. Retrieved","year":"2015"},{"key":"e_1_2_1_11_1","unstructured":"BitcoinFAQ. 2013. FAQ. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/FAQ.  BitcoinFAQ. 2013. FAQ. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/FAQ."},{"key":"e_1_2_1_12_1","unstructured":"BitcoinMyths. 2013. Myths. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Myths#Point&lowbar;of&lowbar;sale&lowbar;with&lowbar;bitcoins&lowbar;isn.27t&lowbar;possible&lowbar;because&lowbar;of&lowbar;the&lowbar;10&lowbar;minute&lowbar;wait&lowbar;for&lowbar;confirmation.  BitcoinMyths. 2013. Myths. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Myths#Point&lowbar;of&lowbar;sale&lowbar;with&lowbar;bitcoins&lowbar;isn.27t&lowbar;possible&lowbar;because&lowbar;of&lowbar;the&lowbar;10&lowbar;minute&lowbar;wait&lowbar;for&lowbar;confirmation."},{"key":"e_1_2_1_13_1","unstructured":"BitcoinProtocol. 2013. Protocol Documentation. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Protocol&lowbar;specification.  BitcoinProtocol. 2013. Protocol Documentation. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Protocol&lowbar;specification."},{"key":"e_1_2_1_14_1","unstructured":"BitcoinRules. 2012. Protocol Rules. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Protocol&lowbar;rules.  BitcoinRules. 2012. Protocol Rules. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Protocol&lowbar;rules."},{"key":"e_1_2_1_15_1","unstructured":"BitcoinTrade. 2013. Trade. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Trade.  BitcoinTrade. 2013. Trade. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Trade."},{"key":"e_1_2_1_16_1","unstructured":"BitcoinWiki. 2014. Double-Spending. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/Double-spending.  BitcoinWiki. 2014. Double-Spending. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/Double-spending."},{"key":"e_1_2_1_17_1","unstructured":"BitcoinXT. 2014. Bitcoin XT. Retrieved April 2 2015 from https:\/\/github.com\/bitcoinxt\/bitcoinxt.  BitcoinXT. 2014. Bitcoin XT. Retrieved April 2 2015 from https:\/\/github.com\/bitcoinxt\/bitcoinxt."},{"key":"e_1_2_1_18_1","unstructured":"BlockChain. 2013. 200 Double Spends. Retrieved April 2 2015 from https:\/\/blockchain.info\/double-spends.  BlockChain. 2013. 200 Double Spends. Retrieved April 2 2015 from https:\/\/blockchain.info\/double-spends."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of Financial Crypto","author":"Bonneau Joseph","year":"2014"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/526950.830429"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_18"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646753.704915"},{"key":"e_1_2_1_23_1","volume-title":"CNN: Bitcoin\u2019s Uncertain Future as Currency. Retrieved","author":"CNN.","year":"2011"},{"key":"e_1_2_1_24_1","volume-title":"CoinJoin: Bitcoin Privacy for the Real World. Retrieved","year":"2015"},{"key":"e_1_2_1_25_1","volume-title":"Satoshi Client Node Connectivity. Retrieved","year":"2015"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_2_1_27_1","unstructured":"Deepbit. 2011. Deepbit. Retrieved April 2 2015 from https:\/\/deepbit.net.  Deepbit. 2011. Deepbit. Retrieved April 2 2015 from https:\/\/deepbit.net."},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the Privacy Enhancing Technologies Workshop (PET\u201902)","author":"Diaz Claudia","year":"2002"},{"key":"e_1_2_1_29_1","unstructured":"DoubleSpending. 2014. Observed Double-Spends. Retrieved April 2 2015 from http:\/\/respends.thinlink.com.  DoubleSpending. 2014. Observed Double-Spends. Retrieved April 2 2015 from http:\/\/respends.thinlink.com."},{"key":"e_1_2_1_30_1","volume-title":"Bitcoin: Tempering the Digital Ring of Gyges or Implausible Pecuniary Privacy. Retrieved","year":"2011"},{"key":"e_1_2_1_31_1","unstructured":"Finney. 2013. Weaknesses. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Weaknesses#The&lowbar;.22Finney.22&lowbar;attack.  Finney. 2013. Weaknesses. Retrieved April 2 2015 from https:\/\/en.bitcoin.it\/wiki\/Weaknesses#The&lowbar;.22Finney.22&lowbar;attack."},{"key":"e_1_2_1_32_1","series-title":"Lecture Notes in Computer Science","volume-title":"Privacy Enhancing Technologies","author":"Franz Matthias"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_10"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"key":"e_1_2_1_35_1","volume-title":"Is Bitcoin a decentralized currency&quest","author":"Gervais Arthur"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963451"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.016"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_2_1_42_1","volume-title":"Comparison of Mining Pools. Retrieved","year":"2015"},{"key":"e_1_2_1_43_1","volume-title":"Mining Hardware Comparison. Retrieved","year":"2015"},{"key":"e_1_2_1_44_1","first-page":"111","article-title":"Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management: A consolidated proposal for terminology","volume":"2008","author":"Pfitzmann Andreas","year":"2008","journal-title":"Fachterminologie Datenschutz und Datensicherheit"},{"key":"e_1_2_1_45_1","unstructured":"ProofWiki. 2013. Definition:Geometric Distribution\/Shifted. Retrieved April 2 2015 from https:\/\/proofwiki.org\/wiki\/Definition:Geometric&lowbar;Distribution\/Shifted.  ProofWiki. 2013. Definition:Geometric Distribution\/Shifted. Retrieved April 2 2015 from https:\/\/proofwiki.org\/wiki\/Definition:Geometric&lowbar;Distribution\/Shifted."},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Fergal Reid and Martin Harrigan. 2011. An analysis of anonymity in the Bitcoin system. arXiv:1107.4524.  Fergal Reid and Martin Harrigan. 2011. An analysis of anonymity in the Bitcoin system. arXiv:1107.4524.","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"e_1_2_1_47_1","series-title":"Lecture Notes in Computer Science","volume-title":"Financial Cryptography","author":"Rivest Ronald"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"e_1_2_1_49_1","volume-title":"Computer Security\u2014ESORICS","author":"Ruffing Tim","year":"2014"},{"key":"e_1_2_1_50_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved","author":"Nakamoto Satoshi","year":"2009"},{"key":"e_1_2_1_51_1","series-title":"Lecture Notes in Computer Science","volume-title":"Privacy Enhancing Technologies","author":"Steinbrecher Sandra"},{"key":"e_1_2_1_52_1","volume-title":"A Peer-to-Peer Bitcoin Vault and Payment Network. Retrieved","author":"Bitcoin Gateway Syed","year":"2015"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553511"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953024"},{"key":"e_1_2_1_55_1","volume-title":"Retrieved","year":"2013"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2732196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2732196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:09Z","timestamp":1750273449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2732196"}},"subtitle":["A Study of Double-Spending and Accountability"],"short-title":[],"issued":{"date-parts":[[2015,5,27]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,6,9]]}},"alternative-id":["10.1145\/2732196"],"URL":"https:\/\/doi.org\/10.1145\/2732196","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,27]]},"assertion":[{"value":"2013-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}