{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:36Z","timestamp":1774946376664,"version":"3.50.1"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,3,23]],"date-time":"2016-03-23T00:00:00Z","timestamp":1458691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001870","name":"Foundation for Polish Science","doi-asserted-by":"crossref","award":["WELCOME\/2010-4\/2"],"award-info":[{"award-number":["WELCOME\/2010-4\/2"]}],"id":[{"id":"10.13039\/501100001870","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2016,3,23]]},"abstract":"<jats:p>Is it possible to design an online protocol for playing a lottery, in a completely decentralized way, that is, without relying on a trusted third party? Or can one construct a fully decentralized protocol for selling secret information, so that neither the seller nor the buyer can cheat in it? Until recently, it seemed that every online protocol that has financial consequences for the participants needs to rely on some sort of a trusted server that ensures that the money is transferred between them. In this work, we propose to use Bitcoin (a digital currency, introduced in 2008) to design such fully decentralized protocols that are secure even if no trusted third party is available. As an instantiation of this idea, we construct protocols for secure multiparty lotteries using the Bitcoin currency, without relying on a trusted authority. Our protocols guarantee fairness for the honest parties no matter how the loser behaves. For example, if one party interrupts the protocol, then her money is transferred to the honest participants. Our protocols are practical (to demonstrate it, we performed their transactions in the actual Bitcoin system) and in principle could be used in real life as a replacement for the online gambling sites.<\/jats:p>","DOI":"10.1145\/2896386","type":"journal-article","created":{"date-parts":[[2016,3,23]],"date-time":"2016-03-23T15:04:15Z","timestamp":1458745455000},"page":"76-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Secure multiparty computations on Bitcoin"],"prefix":"10.1145","volume":"59","author":[{"given":"Marcin","family":"Andrychowicz","sequence":"first","affiliation":[{"name":"University of Warsaw, Warsaw, Poland"}]},{"given":"Stefan","family":"Dziembowski","sequence":"additional","affiliation":[{"name":"University of Warsaw, Warsaw, Poland"}]},{"given":"Daniel","family":"Malinowski","sequence":"additional","affiliation":[{"name":"University of Warsaw, Warsaw, Poland"}]},{"given":"\u0141ukasz","family":"Mazurek","sequence":"additional","affiliation":[{"name":"University of Warsaw, Warsaw, Poland"}]}],"member":"320","published-online":{"date-parts":[[2016,3,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_8"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_1"},{"key":"e_1_2_1_3_1","volume-title":"Note on fair coin toss via bitcoin","author":"Back A.","year":"2013","unstructured":"Back , A. , Bentov , I. Note on fair coin toss via bitcoin , 2013 . http:\/\/www.cs.technion.ac.il\/~idddo\/cointossBitcoin.pdf. Back, A., Bentov, I. Note on fair coin toss via bitcoin, 2013. http:\/\/www.cs.technion.ac.il\/~idddo\/cointossBitcoin.pdf."},{"key":"e_1_2_1_4_1","volume-title":"ACM CCS 08:  15th Conference on Computer and Communications Security","author":"Ben-David A.","year":"2008","unstructured":"Ben-David , A. , Nisan , N. , Pinkas , B. Fairplay MP : A system for secure multi-party computation . In ACM CCS 08: 15th Conference on Computer and Communications Security ( Alexandria, VA, October 27--31 , 2008 ), ACM, NY, 257--266. Ben-David, A., Nisan, N., Pinkas, B. FairplayMP: A system for secure multi-party computation. In ACM CCS 08: 15th Conference on Computer and Communications Security (Alexandria, VA, October 27--31, 2008), ACM, NY, 257--266."},{"key":"e_1_2_1_5_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Bentov I.","year":"2014","unstructured":"Bentov , I. , Kumaresan , R. How to use bitcoin to design fair protocols . In Advances in Cryptology -- CRYPTO , 2014 . Part II (Santa Barbara, CA , August 17--21, 2014), Springer , Berlin, Germany, 421--439. Bentov, I., Kumaresan, R. How to use bitcoin to design fair protocols. In Advances in Cryptology -- CRYPTO, 2014. Part II (Santa Barbara, CA, August 17--21, 2014), Springer, Berlin, Germany, 421--439."},{"key":"e_1_2_1_6_1","volume-title":"Advances in Cryptology -- CRYPTO'81 (Santa Barbara","author":"Blum M.","year":"1981","unstructured":"Blum , M. Coin flipping by telephone . In Advances in Cryptology -- CRYPTO'81 (Santa Barbara , CA, 1981 ), U.C. Santa Barbara, Department of Electrical and Computer Engineering , 11--15. Blum, M. Coin flipping by telephone. In Advances in Cryptology -- CRYPTO'81 (Santa Barbara, CA, 1981), U.C. Santa Barbara, Department of Electrical and Computer Engineering, 11--15."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_2_1_8_1","volume-title":"Advances in Cryptology -- CRYPTO 2000 (Santa Barbara, CA, August 20--24","author":"Boneh D.","year":"2000","unstructured":"Boneh , D. , Naor , M. Timed commitments . In Advances in Cryptology -- CRYPTO 2000 (Santa Barbara, CA, August 20--24 , 2000 ), Springer, Berlin , Germany , 236--254. Boneh, D., Naor, M. Timed commitments. In Advances in Cryptology -- CRYPTO 2000 (Santa Barbara, CA, August 20--24, 2000), Springer, Berlin, Germany, 236--254."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12168"},{"key":"e_1_2_1_10_1","volume-title":"ESORICS 2013:  18th European Symposium on Research in Computer Security (Egham, UK, September 9--13","author":"Damg\u00e5rd I.","year":"2013","unstructured":"Damg\u00e5rd , I. , Practical covertly secure MPC for dishonest majority --- Or: Breaking the SPDZ limits . In ESORICS 2013: 18th European Symposium on Research in Computer Security (Egham, UK, September 9--13 , 2013 ), Springer , Berlin, Germany , 1--18. Damg\u00e5rd, I., et al. Practical covertly secure MPC for dishonest majority --- Or: Breaking the SPDZ limits. In ESORICS 2013: 18th European Symposium on Research in Computer Security (Egham, UK, September 9--13, 2013), Springer, Berlin, Germany, 1--18."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1162\/105864001300122476"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_13"},{"key":"e_1_2_1_14_1","volume-title":"19th Annual ACM Symposium on Theory of Computing","author":"Goldreich O.","year":"1987","unstructured":"Goldreich , O. , Micali , S. , Wigderson , A. How to play any mental game or A completeness theorem for protocols with honest majority . In 19th Annual ACM Symposium on Theory of Computing ( New York City, NY, May 25--27 , 1987 ), ACM, NY, 218--229. Goldreich, O., Micali, S., Wigderson, A. How to play any mental game or A completeness theorem for protocols with honest majority. In 19th Annual ACM Symposium on Theory of Computing (New York City, NY, May 25--27, 1987), ACM, NY, 218--229."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251395"},{"key":"e_1_2_1_17_1","volume-title":"The Cryptography Mailing List","author":"Nakamoto S.","year":"2008","unstructured":"Nakamoto , S. Bitcoin : A peer-to-peer electronic cash system . The Cryptography Mailing List , 2008 . Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. The Cryptography Mailing List, 2008."},{"key":"e_1_2_1_18_1","volume-title":"The Washington Post","author":"Post T.W.","year":"2008","unstructured":"Post , T.W. Cheating scandals raise new questions about honesty, security of internet gambling . The Washington Post November 30, 2008 . Post, T.W. Cheating scandals raise new questions about honesty, security of internet gambling. The Washington Post November 30, 2008."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,23]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,3,23]]}},"alternative-id":["10.1145\/2896386"],"URL":"https:\/\/doi.org\/10.1145\/2896386","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,23]]},"assertion":[{"value":"2016-03-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}