{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:29:34Z","timestamp":1773329374939,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T00:00:00Z","timestamp":1451865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,4]]},"DOI":"10.1145\/2833312.2833321","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T14:54:02Z","timestamp":1454684042000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":113,"title":["Bitcoin meets strong consistency"],"prefix":"10.1145","author":[{"given":"Christian","family":"Decker","sequence":"first","affiliation":[{"name":"Distributed Computing Group, ETH Zurich"}]},{"given":"Jochen","family":"Seidel","sequence":"additional","affiliation":[{"name":"Distributed Computing Group, ETH Zurich"}]},{"given":"Roger","family":"Wattenhofer","sequence":"additional","affiliation":[{"name":"Distributed Computing Group, ETH Zurich"}]}],"member":"320","published-online":{"date-parts":[[2016,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"BIP 0050","author":"Andreesen Gaving","year":"2013","unstructured":"Gaving Andreesen . BIP 0050 : March 2013 Chain Fork Post-Mortem . https:\/\/github.com\/bitcoin\/bips, 2013. {Online; accessed December 12, 2014}. Gaving Andreesen. BIP 0050: March 2013 Chain Fork Post-Mortem. https:\/\/github.com\/bitcoin\/bips, 2013. {Online; accessed December 12, 2014}."},{"key":"e_1_3_2_1_2_1","first-page":"596","volume":"2012","author":"Androulaki Elli","year":"2012","unstructured":"Elli Androulaki , Ghassan Karame , Marc Roeschlin , Tobias Scherer , and Srdjan Capkun . Evaluating user privacy in bitcoin. IACR Cryptology e Print Archive , 2012 : 596 , 2012 . Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. Evaluating user privacy in bitcoin. IACR Cryptology ePrint Archive, 2012: 596, 2012.","journal-title":"Print Archive"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"e_1_3_2_1_4_1","volume-title":"Enabling blockchain innovations with pegged sidechains","author":"Back Adam","year":"2014","unstructured":"Adam Back , Matt Corallo , Luke Dashjr , Mark Friedenbach , Gregory Maxwell , Andrew Miller , Andrew Poelstra , Jorge Tim\u00f3n , and Pieter Wuille . Enabling blockchain innovations with pegged sidechains , 2014 . Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Tim\u00f3n, and Pieter Wuille. Enabling blockchain innovations with pegged sidechains, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688717"},{"key":"e_1_3_2_1_6_1","volume-title":"A next-generation smart contract and decentralized application platform","author":"Vitalik Butterin","year":"2014","unstructured":"Vitalik Butterin et al. A next-generation smart contract and decentralized application platform , 2014 . Vitalik Butterin et al. A next-generation smart contract and decentralized application platform, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"Technical Memo","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro , Barbara Liskov , A correctness proof for a practical byzantine-fault-tolerant replication algorithm. Technical report , Technical Memo , MIT Laboratory for Computer Science , 1999 . Miguel Castro, Barbara Liskov, et al. A correctness proof for a practical byzantine-fault-tolerant replication algorithm. Technical report, Technical Memo, MIT Laboratory for Computer Science, 1999."},{"key":"e_1_3_2_1_8_1","volume-title":"OSDI","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro , Barbara Liskov , Practical byzantine fault tolerance . In OSDI , 1999 . Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, 1999."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4"},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in cryptology","author":"Chaum David","year":"1990","unstructured":"David Chaum , Amos Fiat , and Moni Naor . Untraceable electronic cash . In Advances in cryptology , 1990 . David Chaum, Amos Fiat, and Moni Naor. Untraceable electronic cash. In Advances in cryptology, 1990."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_13_1","volume-title":"Decker and Roger Wattenhofer. Bitcoin Transaction Malleability and MtGox. In 19th European Symposium on Research in Computer Security (ESORICS)","author":"Christian","year":"2014","unstructured":"Christian Decker and Roger Wattenhofer. Bitcoin Transaction Malleability and MtGox. In 19th European Symposium on Research in Computer Security (ESORICS) , Wroclaw, Poland , September 2014 . Christian Decker and Roger Wattenhofer. Bitcoin Transaction Malleability and MtGox. In 19th European Symposium on Research in Computer Security (ESORICS), Wroclaw, Poland, September 2014."},{"key":"e_1_3_2_1_14_1","volume-title":"Decker and Roger Wattenhofer. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels. In Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)","author":"Christian","year":"2015","unstructured":"Christian Decker and Roger Wattenhofer. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels. In Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS) , Edmonton, Canada , 2015 . Christian Decker and Roger Wattenhofer. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels. In Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Edmonton, Canada, 2015."},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","volume-title":"Pricing via processing or combating junk mail","author":"Dwork C","year":"1992","unstructured":"C Dwork and M Naor . Pricing via processing or combating junk mail . Lecture Notes in Computer Science , 1992 . C Dwork and M Naor. Pricing via processing or combating junk mail. Lecture Notes in Computer Science, 1992."},{"key":"e_1_3_2_1_16_1","volume-title":"Majority is not enough: Bitcoin mining is vulnerable. arXiv preprint arXiv:1311.0243","author":"Eyal Ittay","year":"2013","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . Majority is not enough: Bitcoin mining is vulnerable. arXiv preprint arXiv:1311.0243 , 2013 . Ittay Eyal and Emin G\u00fcn Sirer. Majority is not enough: Bitcoin mining is vulnerable. arXiv preprint arXiv:1311.0243, 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"The bitcoin backbone protocol: Analysis and applications. Technical report","author":"Garay Juan","year":"2014","unstructured":"Juan Garay , Aggelos Kiayias , and Nikos Leonardos . The bitcoin backbone protocol: Analysis and applications. Technical report , 2014 . Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. Technical report, 2014."},{"key":"e_1_3_2_1_18_1","volume-title":"Double-Spending Attacks on Fast Payments in Bitcoin. In Computer and Communication Security","author":"Karame G. O.","year":"2012","unstructured":"G. O. Karame , E. Androulaki , and S. Capkun . Two Bitcoins at the Price of One ? Double-Spending Attacks on Fast Payments in Bitcoin. In Computer and Communication Security , 2012 . G. O. Karame, E. Androulaki, and S. Capkun. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. In Computer and Communication Security, 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_21_1","volume-title":"Zerocoin: Anonymous distributed e-cash from bitcoin","author":"Miers Ian","year":"2013","unstructured":"Ian Miers , Christina Garman , Matthew Green , and Aviel D. Rubin . Zerocoin: Anonymous distributed e-cash from bitcoin . 2013 . Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. Zerocoin: Anonymous distributed e-cash from bitcoin. 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin","author":"Miller Andrew","year":"2014","unstructured":"Andrew Miller and Joseph LaViola . Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin . 2014 . Andrew Miller and Joseph LaViola. Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin. 2014."},{"key":"e_1_3_2_1_23_1","unstructured":"Andrew Miller Elaine Shi Ahmed Kosba and Jonathan Katz. Preprint: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions.  Andrew Miller Elaine Shi Ahmed Kosba and Jonathan Katz. Preprint: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511813603","volume-title":"Probability and computing: Randomized algorithms and probabilistic analysis","author":"Mitzenmacher Michael","year":"2005","unstructured":"Michael Mitzenmacher and Eli Upfal . Probability and computing: Randomized algorithms and probabilistic analysis . 2005 . Michael Mitzenmacher and Eli Upfal. Probability and computing: Randomized algorithms and probabilistic analysis. 2005."},{"key":"e_1_3_2_1_25_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. {Online","author":"Nakamoto Satoshi","year":"2014","unstructured":"Satoshi Nakamoto . Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. {Online ; accessed March 26, 2014 }. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. {Online; accessed March 26, 2014}."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_2_1_27_1","volume-title":"Social Computing","author":"Reid F.","year":"2011","unstructured":"F. Reid and M. Harrigan . An analysis of anonymity in the bitcoin system . In Social Computing , 2011 . F. Reid and M. Harrigan. An analysis of anonymity in the bitcoin system. In Social Computing, 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.481515"},{"key":"e_1_3_2_1_29_1","volume-title":"Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980","author":"Rosenfeld Meni","year":"2011","unstructured":"Meni Rosenfeld . Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 , 2011 . Meni Rosenfeld. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, 2011."},{"key":"e_1_3_2_1_30_1","volume-title":"Overview of colored coins. Technical report","author":"Rosenfeld Meni","year":"2012","unstructured":"Meni Rosenfeld . Overview of colored coins. Technical report , 2012 . Meni Rosenfeld. Overview of colored coins. Technical report, 2012."},{"key":"e_1_3_2_1_31_1","volume-title":"The ripple protocol consensus algorithm","author":"Schwartz David","year":"2014","unstructured":"David Schwartz , Noah Youngs , and Arthur Britto . The ripple protocol consensus algorithm , 2014 . David Schwartz, Noah Youngs, and Arthur Britto. The ripple protocol consensus algorithm, 2014."},{"key":"e_1_3_2_1_32_1","volume-title":"Economics of Peer-to-Peer Systems","author":"Vishnumurthy Vivek","year":"2003","unstructured":"Vivek Vishnumurthy , Sangeeth Chandrakumar , and Emin Gun Sirer . Karma : A secure economic framework for peer-to-peer resource sharing . In Economics of Peer-to-Peer Systems , 2003 . Vivek Vishnumurthy, Sangeeth Chandrakumar, and Emin Gun Sirer. Karma: A secure economic framework for peer-to-peer resource sharing. In Economics of Peer-to-Peer Systems, 2003."},{"key":"e_1_3_2_1_33_1","volume-title":"The master protocol \/ mastercoin complete specification","author":"Willett JR","year":"2012","unstructured":"JR Willett , Maran Hidskes , David Johnston , Ron Gross , and Marv Schneider . The master protocol \/ mastercoin complete specification , 2012 . JR Willett, Maran Hidskes, David Johnston, Ron Gross, and Marv Schneider. The master protocol \/ mastercoin complete specification, 2012."}],"event":{"name":"ICDCN '16: 17th International Conference on Distributed Computing and Networking","location":"Singapore Singapore","acronym":"ICDCN '16"},"container-title":["Proceedings of the 17th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2833312.2833321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2833312.2833321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:49Z","timestamp":1750225729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2833312.2833321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,4]]},"references-count":33,"alternative-id":["10.1145\/2833312.2833321","10.1145\/2833312"],"URL":"https:\/\/doi.org\/10.1145\/2833312.2833321","relation":{},"subject":[],"published":{"date-parts":[[2016,1,4]]},"assertion":[{"value":"2016-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}