{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:26:49Z","timestamp":1775179609820,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134033","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"439-453","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":178,"title":["Revive"],"prefix":"10.1145","author":[{"given":"Rami","family":"Khalil","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Arthur","family":"Gervais","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_2_2_1","volume-title":"Scp: A computationally-scalable byzantine consensus protocol for blockchains. IACR Cryptology ePrint Archive","author":"Luu Loi","year":"2015","unstructured":"Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, and Prateek Saxena. Scp: A computationally-scalable byzantine consensus protocol for blockchains. IACR Cryptology ePrint Archive, 2015:1168, 2015."},{"key":"e_1_3_2_2_3_1","first-page":"279","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16), pages 279--296. USENIX Association, 2016."},{"key":"e_1_3_2_2_4_1","first-page":"45","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert Van Renesse. Bitcoinng: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 45--59. USENIX Association, 2016."},{"key":"e_1_3_2_2_5_1","volume-title":"Hybrid consensus: Efficient consensus in the permissionless model","author":"Pass Rafael","year":"2016","unstructured":"Rafael Pass and Elaine Shi. Hybrid consensus: Efficient consensus in the permissionless model, 2016."},{"key":"e_1_3_2_2_6_1","volume-title":"The bitcoin lightning network: Scalable off-chain instant payments","author":"Poon Joseph","year":"2015","unstructured":"Joseph Poon and Thaddeus Dryja. The bitcoin lightning network: Scalable off-chain instant payments, 2015."},{"key":"e_1_3_2_2_7_1","volume-title":"Sprites: Payment channels that go faster than lightning. arXiv preprint arXiv:1702.05812","author":"Miller Andrew","year":"2017","unstructured":"Andrew Miller, Iddo Bentov, Ranjit Kumaresan, and Patrick McCorry. Sprites: Payment channels that go faster than lightning. arXiv preprint arXiv:1702.05812, 2017."},{"key":"e_1_3_2_2_8_1","unstructured":"Raiden network. http:\/\/raiden.network\/."},{"key":"e_1_3_2_2_9_1","volume-title":"Flare: An approach to routing in lightning network","author":"Prihodko Pavel","year":"2016","unstructured":"Pavel Prihodko, Slava Zhigulin, Mykola Sahno, Aleksei Ostrovskiy, and Olaoluwa Osuntokun. Flare: An approach to routing in lightning network. 2016."},{"key":"e_1_3_2_2_10_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_10"},{"key":"e_1_3_2_2_12_1","volume-title":"Hashcash - a denial of service counter-measure. Technical report","author":"Back Adam","year":"2002","unstructured":"Adam Back. Hashcash - a denial of service counter-measure. Technical report, 2002."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"e_1_3_2_2_15_1","unstructured":"Bip 68. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0068.mediawiki."},{"key":"e_1_3_2_2_16_1","unstructured":"Bip 112. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0112.mediawiki."},{"key":"e_1_3_2_2_17_1","volume-title":"Ethereum Project Yellow Paper","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014."},{"key":"e_1_3_2_2_18_1","unstructured":"Jameson Lopp. Lightning's balancing act: Challenges face bitcoin's scalability savior. http:\/\/www.coindesk.com\/lightning-technical-challenges-bitcoin-scalability\/."},{"key":"e_1_3_2_2_19_1","unstructured":"Sergio Demian Lerner. Rsk bitcoin powered smartcontracts. https:\/\/uploads.strikinglycdn.com\/files\/90847694-70f0-4668-ba7f-dd0c6b0b00a1\/RootstockWhitePaperv9-Overview.pdf."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"key":"e_1_3_2_2_21_1","volume-title":"Linear Programming and its Applications","author":"Eiselt H.A.","year":"2007","unstructured":"H.A. Eiselt and C.L. Sandblom. Linear Programming and its Applications. Springer Berlin Heidelberg, 2007."},{"key":"e_1_3_2_2_22_1","volume-title":"Ethereum: A next-generation smart contract and decentralized application platform. URL https:\/\/github. com\/ethereum\/wiki\/wiki\/%5BEnglish%5D-White-Paper","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin. Ethereum: A next-generation smart contract and decentralized application platform. URL https:\/\/github. com\/ethereum\/wiki\/wiki\/%5BEnglish%5D-White-Paper, 2014."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/990308.990310"},{"key":"e_1_3_2_2_25_1","unstructured":"R. Khalil and A. Gervais. Revive poc implementation on ethereum. https:\/\/github.com\/rami-khalil\/revive."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_2_27_1","volume-title":"Cryptonote v 2. 0. HYPERLINK https:\/\/cryptonote.org\/whitepaper. pdf","author":"van Saberhagen Nicolas","year":"2013","unstructured":"Nicolas van Saberhagen. Cryptonote v 2. 0. HYPERLINK https:\/\/cryptonote.org\/whitepaper. pdf, 2013."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_2_29_1","volume-title":"POST","author":"Atzei Nicola","year":"2017","unstructured":"Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. A survey of attacks on ethereum smart contracts (sok). In POST, 2017."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_2_31_1","unstructured":"Pieter Wuille. Elliptic curve schnorr-based signatures in bitcoin. https:\/\/scalingbitcoin.org\/transcript\/milan2016\/schnorr-signatures."},{"key":"e_1_3_2_2_33_1","unstructured":"Bitcoinj. https:\/\/bitcoinj.github.io\/working-with-micropayments."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/87252.88081"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0041-5553(80)90061-0"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/800057.808695"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134033"}},"subtitle":["Rebalancing Off-Blockchain Payment Networks"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":35,"alternative-id":["10.1145\/3133956.3134033","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134033","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}