{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T00:32:50Z","timestamp":1778632370336,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,2]],"date-time":"2017-04-02T00:00:00Z","timestamp":1491091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,2]]},"DOI":"10.1145\/3052973.3052980","type":"proceedings-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T12:22:54Z","timestamp":1490962974000},"page":"520-531","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation"],"prefix":"10.1145","author":[{"given":"Alexandra","family":"Dmitrienko","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Noack","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Snapchat, Inc.\/Columbia University, New York, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Bitcoin wallet. https:\/\/play.google.com\/store\/apps\/details?id=de.schildbach.wallet.  Android Bitcoin wallet. https:\/\/play.google.com\/store\/apps\/details?id=de.schildbach.wallet."},{"key":"e_1_3_2_1_2_1","unstructured":"Apple Pay payment solution. http:\/\/www.apple.com\/apple-pay\/.  Apple Pay payment solution. http:\/\/www.apple.com\/apple-pay\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Average electricity prices around the world: USD\/kWh. https:\/\/www.ovoenergy.com\/guides\/energy-guides\/average-electricity-prices-kwh.html.  Average electricity prices around the world: USD\/kWh. https:\/\/www.ovoenergy.com\/guides\/energy-guides\/average-electricity-prices-kwh.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Bitcoin contracts. https:\/\/en.bitcoin.it\/.  Bitcoin contracts. https:\/\/en.bitcoin.it\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Blockchain taking years to download? http:\/\/www.reddit.com\/r\/Bitcoin\/comments\/1pssvp\/blockchain_taking_years_to_download\/.  Blockchain taking years to download? http:\/\/www.reddit.com\/r\/Bitcoin\/comments\/1pssvp\/blockchain_taking_years_to_download\/."},{"key":"e_1_3_2_1_6_1","unstructured":"DOGE. http:\/\/dogecoin.com.  DOGE. http:\/\/dogecoin.com."},{"key":"e_1_3_2_1_7_1","unstructured":"Google Wallet: Shop. Save. Pay. With your phone.  Google Wallet: Shop. Save. Pay. With your phone."},{"key":"e_1_3_2_1_8_1","unstructured":"Greenaddress. https:\/\/greenaddress.it\/en\/.  Greenaddress. https:\/\/greenaddress.it\/en\/."},{"key":"e_1_3_2_1_9_1","unstructured":"LTC. http:\/\/litecoin.org.  LTC. http:\/\/litecoin.org."},{"key":"e_1_3_2_1_10_1","unstructured":"The NIST authenticated NTP service. http:\/\/www.nist.gov\/pml\/div688\/grp40\/auth-ntp.cfm.  The NIST authenticated NTP service. http:\/\/www.nist.gov\/pml\/div688\/grp40\/auth-ntp.cfm."},{"key":"e_1_3_2_1_11_1","volume-title":"a mobile bitcoin payment solution","author":"Coinblesk","year":"2014","unstructured":"Coinblesk , a mobile bitcoin payment solution , 2014 . https:\/\/github.com\/coinblesk. Coinblesk, a mobile bitcoin payment solution, 2014. https:\/\/github.com\/coinblesk."},{"key":"e_1_3_2_1_12_1","volume-title":"Advanced payments report","author":"Dunn Edgar","year":"2014","unstructured":"Edgar Dunn & Company. Advanced payments report , 2014 . http:\/\/www.paymentscardsandmobile.com\/wp-content\/uploads\/2014\/02\/PCM_EDC_Advanced_Payments_Report_2014_MWC.pdf. Edgar Dunn & Company. Advanced payments report, 2014. http:\/\/www.paymentscardsandmobile.com\/wp-content\/uploads\/2014\/02\/PCM_EDC_Advanced_Payments_Report_2014_MWC.pdf."},{"key":"e_1_3_2_1_13_1","unstructured":"10\n    best payment processors for Bitcoin for merchants 2016. https:\/\/toughnickel.com\/personal-finance\/Best-Payment-Processors-for-Bitcoin-Bitcoin-for-Merchants.  10 best payment processors for Bitcoin for merchants 2016. https:\/\/toughnickel.com\/personal-finance\/Best-Payment-Processors-for-Bitcoin-Bitcoin-for-Merchants."},{"key":"e_1_3_2_1_14_1","volume-title":"TrustZone: Integrated hardware and software security. Information Quaterly, 3(4)","author":"Alves T.","year":"2004","unstructured":"T. Alves and D. Felton . TrustZone: Integrated hardware and software security. Information Quaterly, 3(4) , 2004 . T. Alves and D. Felton. TrustZone: Integrated hardware and software security. Information Quaterly, 3(4), 2004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"e_1_3_2_1_17_1","volume-title":"Have a snack, pay with Bitcoins. In 13-th IEEE International Conference on Peer-to-Peer Computing","author":"Bamert T.","year":"2013","unstructured":"T. Bamert , C. Decker , L. Elsen , R. Wattenhofer , and S. Welten . Have a snack, pay with Bitcoins. In 13-th IEEE International Conference on Peer-to-Peer Computing , 2013 . T. Bamert, C.Decker, L. Elsen, R. Wattenhofer, and S. Welten. Have a snack, pay with Bitcoins. In 13-th IEEE International Conference on Peer-to-Peer Computing, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_5"},{"key":"e_1_3_2_1_19_1","volume-title":"Mobile banking -- financial services for the unbanked","author":"B\u00e5ngens L.","year":"2008","unstructured":"L. B\u00e5ngens and B. S\u00f6derberg . Mobile banking -- financial services for the unbanked 2008 . http:\/\/spidercenter.org\/polopoly_fs\/1.146036.1378747792!\/menu\/standard\/file\/Mobile%20banking%20-%20financial%20services%20for%20the%20unbanked.pdf. L. B\u00e5ngens and B. S\u00f6derberg. Mobile banking -- financial services for the unbanked 2008. http:\/\/spidercenter.org\/polopoly_fs\/1.146036.1378747792!\/menu\/standard\/file\/Mobile%20banking%20-%20financial%20services%20for%20the%20unbanked.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_29"},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Ben-Sasson E.","year":"2014","unstructured":"E. Ben-Sasson , A. Chiesa , C. Garman , M. Green , I. Miers , E. Tromer , and M. Virza . Zerocash: Practical decentralized anonymous e-cash from Bitcoin . In IEEE Symposium on Security and Privacy , May 2014 . E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. Zerocash: Practical decentralized anonymous e-cash from Bitcoin. In IEEE Symposium on Security and Privacy, May 2014."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_23_1","volume-title":"27 million more merchants can now accept Bitcoin","author":"Buntinx J.-P.","year":"2016","unstructured":"J.-P. Buntinx . 27 million more merchants can now accept Bitcoin , 2016 . https:\/\/news.bitcoin.com\/bitpay-enables-27-million-ingenico-retailers-accept-bitcoin\/. J.-P. Buntinx. 27 million more merchants can now accept Bitcoin, 2016. https:\/\/news.bitcoin.com\/bitpay-enables-27-million-ingenico-retailers-accept-bitcoin\/."},{"key":"e_1_3_2_1_24_1","volume-title":"A next-generation smart contract and decentralized application platform","author":"Buterin V.","year":"2014","unstructured":"V. Buterin . A next-generation smart contract and decentralized application platform , 2014 . https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. V. Buterin. A next-generation smart contract and decentralized application platform, 2014. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper."},{"key":"e_1_3_2_1_25_1","volume-title":"Texas Instruments White Paper, 2012","year":"2012","unstructured":"Certgate. Certgate products. cgCard . Texas Instruments White Paper, 2012 . http:\/\/www.certgate.com\/wp-content\/uploads\/ 2012 \/09\/20131113_cgCard_Datasheet_EN.pdf . Certgate. Certgate products. cgCard. Texas Instruments White Paper, 2012. http:\/\/www.certgate.com\/wp-content\/uploads\/2012\/09\/20131113_cgCard_Datasheet_EN.pdf ."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/646753.704915"},{"key":"e_1_3_2_1_28_1","volume-title":"Bitcoin Workshop","author":"Croman K.","year":"2016","unstructured":"K. Croman , C. Decker , I. Eyal , A. E. Gencer , A. Juels , A. Kosba , A. Miller , P. Saxena , E. Shi , E. G. Sirer , D. Song , and R. Wattenhofer . On scaling decentralized blockchains (a position paper) . In Bitcoin Workshop , 2016 . K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. Wattenhofer. On scaling decentralized blockchains (a position paper). In Bitcoin Workshop, 2016."},{"key":"e_1_3_2_1_29_1","unstructured":"A. Cuthbertson. Bitcoin now accepted by 100 000 merchants worldwide. http:\/\/www.ibtimes.co.uk\/bitcoin-now-accepted-by-100000-merchants-worldwide-1486613.  A. Cuthbertson. Bitcoin now accepted by 100 000 merchants worldwide. http:\/\/www.ibtimes.co.uk\/bitcoin-now-accepted-by-100000-merchants-worldwide-1486613."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517878"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"e_1_3_2_1_33_1","volume-title":"Financial Cryptography and Data Security","author":"Donet J. A. D.","year":"2014","unstructured":"J. A. D. Donet , C. Perez-Sola , and J. Herrera-Joancomart . The Bitcoin P2P network . In Financial Cryptography and Data Security , 2014 . J. A. D. Donet, C. Perez-Sola, and J. Herrera-Joancomart. The Bitcoin P2P network. In Financial Cryptography and Data Security, 2014."},{"key":"e_1_3_2_1_34_1","unstructured":"R. Dragomirescu. OtherCoin. 2013. http:\/\/www.othercoin.com\/OtherCoin.pdf.  R. Dragomirescu. OtherCoin. 2013. http:\/\/www.othercoin.com\/OtherCoin.pdf."},{"key":"e_1_3_2_1_35_1","volume-title":"Financial Cryptography and Data Security","author":"Eyal I.","year":"2014","unstructured":"I. Eyal and E. G. Sirer . Majority is not enough: Bitcoin mining is vulnerable . In Financial Cryptography and Data Security , 2014 . I. Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23253"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.49"},{"key":"e_1_3_2_1_39_1","unstructured":"Giesecke & Devrient Secure Flash Solutions. The Mobile Security Card SE 1.0 offers increased security. http:\/\/www.gd-sfs.com\/the-mobile-security-card\/mobile-security-card-se-1-0\/.  Giesecke & Devrient Secure Flash Solutions. The Mobile Security Card SE 1.0 offers increased security. http:\/\/www.gd-sfs.com\/the-mobile-security-card\/mobile-security-card-se-1-0\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Security Symposium","author":"Heilman E.","year":"2015","unstructured":"E. Heilman , A. Kendler , A. Zohar , and S. Goldberg . Eclipse attacks on Bitcoin's peer-to-peer network . In USENIX Security Symposium , 2015 . E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on Bitcoin's peer-to-peer network. In USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"e_1_3_2_1_43_1","volume-title":"Primecoin: Cryptocurrency with prime number proof-of-work","author":"King S.","year":"2013","unstructured":"S. King . Primecoin: Cryptocurrency with prime number proof-of-work , 2013 . http:\/\/academictorrents.com\/details\/d0f9accaec8ac9d538fdf9d675105ae1392ea32b. S. King. Primecoin: Cryptocurrency with prime number proof-of-work, 2013. http:\/\/academictorrents.com\/details\/d0f9accaec8ac9d538fdf9d675105ae1392ea32b."},{"key":"e_1_3_2_1_44_1","volume-title":"Workshop on the Economics of Information Security","author":"Kroll J. A.","year":"2013","unstructured":"J. A. Kroll , I. C. Davey , and E. W. Felten . The economics of Bitcoin mining or, Bitcoin in the presence of adversaries . Workshop on the Economics of Information Security , 2013 . J. A. Kroll, I. C. Davey, and E. W. Felten. The economics of Bitcoin mining or, Bitcoin in the presence of adversaries. Workshop on the Economics of Information Security, 2013."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_50_1","volume-title":"Trezor","author":"Palatinus M.","year":"2013","unstructured":"M. Palatinus and P. Rusnak . Trezor , 2013 . www.bitcointrezor.com. M. Palatinus and P. Rusnak. Trezor, 2013. www.bitcointrezor.com."},{"key":"e_1_3_2_1_51_1","volume-title":"Financial Cryptography and Data Security","author":"Ron D.","year":"2012","unstructured":"D. Ron and A. Shamir . Quantitative analysis of the full Bitcoin transaction graph . Financial Cryptography and Data Security , 2012 . D. Ron and A. Shamir. Quantitative analysis of the full Bitcoin transaction graph. Financial Cryptography and Data Security, 2012."},{"key":"e_1_3_2_1_52_1","volume-title":"ArXiv Preprint: 1402.2009v1","author":"Rosenfel M.","year":"2012","unstructured":"M. Rosenfel . Analysis of hashrate-based double-spending . In ArXiv Preprint: 1402.2009v1 , 2012 . http:\/\/arxiv.org\/abs\/1402.2009. M. Rosenfel. Analysis of hashrate-based double-spending. In ArXiv Preprint: 1402.2009v1, 2012. http:\/\/arxiv.org\/abs\/1402.2009."},{"key":"e_1_3_2_1_53_1","volume-title":"Springer New York","author":"Skorobogatov S.","year":"2012","unstructured":"S. Skorobogatov . Chapter 7 : Physical attacks and tamper resistance. In Introduction to Hardware Security and Trust . Springer New York , 2012 . S. Skorobogatov. Chapter 7: Physical attacks and tamper resistance. In Introduction to Hardware Security and Trust. Springer New York, 2012."},{"key":"e_1_3_2_1_54_1","volume-title":"Cryptology ePrintArchive,Report2015\/464","author":"Tschorsch F.","year":"2015","unstructured":"F. Tschorsch and B. Scheuermann . Bitcoin and beyond: A technical survey on decentralized digital currencies . In Cryptology ePrintArchive,Report2015\/464 , 2015 . F. Tschorsch and B. Scheuermann. Bitcoin and beyond: A technical survey on decentralized digital currencies. In Cryptology ePrintArchive,Report2015\/464, 2015."},{"key":"e_1_3_2_1_55_1","volume-title":"Cryptonote v 2.0","author":"van Saberhagen N.","year":"2013","unstructured":"N. van Saberhagen . Cryptonote v 2.0 , 2013 . https:\/\/ cryptonote.org\/whitepaper.pdf. N. van Saberhagen. Cryptonote v 2.0, 2013. https:\/\/ cryptonote.org\/whitepaper.pdf."}],"event":{"name":"ASIA CCS '17: ACM Asia Conference on Computer and Communications Security","location":"Abu Dhabi United Arab Emirates","acronym":"ASIA CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3052980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3052973.3052980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:57Z","timestamp":1750217817000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3052980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,2]]},"references-count":53,"alternative-id":["10.1145\/3052973.3052980","10.1145\/3052973"],"URL":"https:\/\/doi.org\/10.1145\/3052973.3052980","relation":{},"subject":[],"published":{"date-parts":[[2017,4,2]]},"assertion":[{"value":"2017-04-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}