{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:34:44Z","timestamp":1763458484930,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["240258"],"award-info":[{"award-number":["240258"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA and U.S. Army Research Office","award":["W911NF-15-C-0226"],"award-info":[{"award-number":["W911NF-15-C-0226"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1350619, 1414119"],"award-info":[{"award-number":["1350619, 1414119"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978424","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"418-429","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Amortizing Secure Computation with Penalties"],"prefix":"10.1145","author":[{"given":"Ranjit","family":"Kumaresan","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Iddo","family":"Bentov","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_3_2_1_3_1","volume-title":"How to deal with malleability of bitcoin transactions","author":"Andrychowicz Marcin","year":"2013","unstructured":"Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. How to deal with malleability of bitcoin transactions, 2013. Available from http:\/\/arxiv.org\/pdf\/1312.3230.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"A. Back and I. Bentov. Note on fair coin toss via bitcoin. http:\/\/arxiv.org\/abs\/1402.3698 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_29"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12168"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Decker and R. Wattenhofer. A fast and scalable payment network with bitcoin duplex micropayment channels. http:\/\/www.tik.ee.ethz.ch\/file\/716b955c130e6c703fac336ea17b1670\/duplex-micropayment-channels.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/975541"},{"key":"e_1_3_2_1_10_1","volume-title":"How to play any mental game, or a completeness theorem for protocols with honest majority","author":"Goldreich Oded","year":"1987","unstructured":"Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. 1987."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_25"},{"key":"e_1_3_2_1_13_1","volume-title":"Hawk: The blockchain model of cryptography and privacy-preserving smart contracts","author":"Kosba A.","year":"2016","unstructured":"A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE S&P, 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813712"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978421"},{"key":"e_1_3_2_1_17_1","volume-title":"CT-RSA","author":"K\u00fcp\u00e7\u00fc Alptekin","year":"2010","unstructured":"Alptekin K\u00fcp\u00e7\u00fc and Anna Lysyanskaya. Usable optimistic fair exchange. In CT-RSA, 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791688.1791699"},{"key":"e_1_3_2_1_19_1","unstructured":"G. Maxwell. 2011. https:\/\/en.bitcoin.it\/wiki\/Zero_Knowledge_Contingent_Payment."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813713"},{"key":"e_1_3_2_1_21_1","unstructured":"J. Poon and T. Dryja. The bitcoin lightning network: Scalable off-chain instant payments. https:\/\/lightning.network\/lightning-network-paper.pdf."},{"key":"e_1_3_2_1_22_1","unstructured":"Peter Todd. OP_CLTV 2014. https:\/\/github.com\/petertodd\/bips\/blob\/checklocktimeverify\/bip-checklocktimeverify.mediawiki."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978424","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:37Z","timestamp":1763457937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":23,"alternative-id":["10.1145\/2976749.2978424","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978424","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}