{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T15:56:01Z","timestamp":1776268561594,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355461","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"16-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Pisa"],"prefix":"10.1145","author":[{"given":"Patrick","family":"McCorry","sequence":"first","affiliation":[{"name":"PISA Research &amp; IC3, UK"}]},{"given":"Surya","family":"Bakshi","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana, Champaign &amp; IC3, USA"}]},{"given":"Iddo","family":"Bentov","sequence":"additional","affiliation":[{"name":"Cornell University &amp; IC3, USA"}]},{"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[{"name":"University College London &amp; IC3, UK"}]},{"given":"Andrew","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana, Champaign &amp; IC3, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT","author":"Bellare An","year":"2001","unstructured":"An and Bellare . Does encryption with redundancy provide authenticity ? In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT , 2001 . An and Bellare. Does encryption with redundancy provide authenticity? In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_15"},{"key":"e_1_3_2_1_3_1","volume-title":"Hackers tried to steal funds from a Lightning channel, just to end up losing theirs as the penalty system worked as expected. mar","year":"2018","unstructured":"bitbug42. Hackers tried to steal funds from a Lightning channel, just to end up losing theirs as the penalty system worked as expected. mar 2018 . bitbug42. Hackers tried to steal funds from a Lightning channel, just to end up losing theirs as the penalty system worked as expected. mar 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69084-1_26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_21"},{"key":"e_1_3_2_1_6_1","volume-title":"Monitoring service: on-chain rewards proposal","author":"Cirstea Loredana","year":"2018","unstructured":"Loredana Cirstea . Monitoring service: on-chain rewards proposal , 2018 . https:\/\/github.com\/raiden-network\/spec\/issues\/46. Loredana Cirstea. Monitoring service: on-chain rewards proposal, 2018. https:\/\/github.com\/raiden-network\/spec\/issues\/46."},{"key":"e_1_3_2_1_7_1","volume-title":"November","author":"Coleman Jeff","year":"2015","unstructured":"Jeff Coleman . http:\/\/www.jeffcoleman.ca\/state-channels\/ , November 2015 . Jeff Coleman. http:\/\/www.jeffcoleman.ca\/state-channels\/, November 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"e_1_3_2_1_10_1","volume-title":"Unlinkable outsourced channel monitoring","author":"Dryja Thaddeus","year":"2016","unstructured":"Thaddeus Dryja . Unlinkable outsourced channel monitoring , 2016 . https:\/\/youtu.be\/Gzg_u9gHc5Q?t=2875. Thaddeus Dryja. Unlinkable outsourced channel monitoring, 2016. https:\/\/youtu.be\/Gzg_u9gHc5Q?t=2875."},{"key":"e_1_3_2_1_11_1","first-page":"635","volume":"2017","author":"Dziembowski Stefan","year":"2017","unstructured":"Stefan Dziembowski , Lisa Eckey , Sebastian Faust , and Daniel Malinowski . Perun: Virtual payment channels over cryptographic currencies. IACR Cryptology e Print Archive , 2017 : 635 , 2017 . Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. Perun: Virtual payment channels over cryptographic currencies. IACR Cryptology ePrint Archive, 2017:635, 2017.","journal-title":"Print Archive"},{"key":"e_1_3_2_1_12_1","first-page":"320","volume":"2018","author":"Dziembowski Stefan","year":"2018","unstructured":"Stefan Dziembowski , Sebastian Faust , and Kristina Hostakova . Foundations of state channel networks. IACR Cryptology e Print Archive , 2018 : 320 , 2018 . Stefan Dziembowski, Sebastian Faust, and Kristina Hostakova. Foundations of state channel networks. IACR Cryptology ePrint Archive, 2018:320, 2018.","journal-title":"Print Archive"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.162.3859.1243"},{"key":"e_1_3_2_1_16_1","volume-title":"Coindesk","author":"Hertig Alyssa","year":"2018","unstructured":"Alyssa Hertig . Bitcoin Lightning Fraud? Laolu Is Building a 'Watchtower' to Fight It . Coindesk , February 2018 . https:\/\/www.coindesk.com\/laolu-building-watchtower-f\u00ecght-bitcoin-lightning-fraud\/. Alyssa Hertig. Bitcoin Lightning Fraud? Laolu Is Building a 'Watchtower' to Fight It. Coindesk, February 2018. https:\/\/www.coindesk.com\/laolu-building-watchtower-f\u00ecght-bitcoin-lightning-fraud\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134033"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_1_19_1","volume-title":"Teechain: Scalable blockchain payments using trusted execution environments. CoRR, abs\/1707.05454","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind , Ittay Eyal , Florian Kelbert , Oded Naor , Peter R. Pietzuch , and Emin G\u00fcn Sirer . Teechain: Scalable blockchain payments using trusted execution environments. CoRR, abs\/1707.05454 , 2017 . Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter R. Pietzuch, and Emin G\u00fcn Sirer. Teechain: Scalable blockchain payments using trusted execution environments. CoRR, abs\/1707.05454, 2017."},{"key":"e_1_3_2_1_20_1","volume-title":"Bringing bitcoin to ethereum","author":"Luu Loi","year":"2018","unstructured":"Loi Luu . Bringing bitcoin to ethereum . April 2018 . https:\/\/blog.kyber.network\/bringing-bitcoin-to-ethereum-7bf29db88b9a. Loi Luu. Bringing bitcoin to ethereum. April 2018. https:\/\/blog.kyber.network\/bringing-bitcoin-to-ethereum-7bf29db88b9a."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134096"},{"key":"e_1_3_2_1_22_1","volume-title":"ROTE: Rollback protection for trusted execution","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . ROTE: Rollback protection for trusted execution , 2017 . http:\/\/eprint.iacr.org\/2017\/048. Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. ROTE: Rollback protection for trusted execution, 2017. http:\/\/eprint.iacr.org\/2017\/048."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_19"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40253-6_4"},{"key":"e_1_3_2_1_25_1","volume-title":"Sprites: Payment channels that go faster than lightning. CoRR, abs\/1702.05812","author":"Miller Andrew","year":"2017","unstructured":"Andrew Miller , Iddo Bentov , Ranjit Kumaresan , and Patrick McCorry . Sprites: Payment channels that go faster than lightning. CoRR, abs\/1702.05812 , 2017 . Andrew Miller, Iddo Bentov, Ranjit Kumaresan, and Patrick McCorry. Sprites: Payment channels that go faster than lightning. CoRR, abs\/1702.05812, 2017."},{"key":"e_1_3_2_1_26_1","volume-title":"Blockchain bloat: How ethereum is tackling storage issues","author":"O'Leary Rachel Rose","year":"2018","unstructured":"Rachel Rose O'Leary . Blockchain bloat: How ethereum is tackling storage issues . January 2018 . https:\/\/www.coindesk.com\/blockchain-bloat-ethereum-clients-tackling-storage-issues\/. Rachel Rose O'Leary. Blockchain bloat: How ethereum is tackling storage issues. January 2018. https:\/\/www.coindesk.com\/blockchain-bloat-ethereum-clients-tackling-storage-issues\/."},{"key":"e_1_3_2_1_27_1","unstructured":"Olaoluwa Osuntokun. Hardening Lightning. BPASE February 2018. https:\/\/cyber.stanford.edu\/sites\/default\/files\/hardening_lightning_updated.pdf.  Olaoluwa Osuntokun. Hardening Lightning. BPASE February 2018. https:\/\/cyber.stanford.edu\/sites\/default\/files\/hardening_lightning_updated.pdf."},{"key":"e_1_3_2_1_28_1","volume-title":"A course in cryptography","author":"Pass Rafael","year":"2007","unstructured":"Rafael Pass and abhi shelat. A course in cryptography , 2007 . http:\/\/www.cs.cornell.edu\/courses\/cs4830\/2010fa\/lecnotes.pdf. Rafael Pass and abhi shelat. A course in cryptography, 2007. http:\/\/www.cs.cornell.edu\/courses\/cs4830\/2010fa\/lecnotes.pdf."},{"key":"e_1_3_2_1_29_1","first-page":"207","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","author":"Rafael","year":"2015","unstructured":"Rafael Pass et al. Micropayments for decentralized currencies . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , pages 207 -- 218 . ACM, 2015 . Rafael Pass et al. Micropayments for decentralized currencies. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 207--218. ACM, 2015."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_33"},{"key":"e_1_3_2_1_31_1","volume-title":"The bitcoin lightning network: Scalable off-chain instant payments. draft version 0.5, 9:14","author":"Poon Joseph","year":"2016","unstructured":"Joseph Poon and Thaddeus Dryja . The bitcoin lightning network: Scalable off-chain instant payments. draft version 0.5, 9:14 , 2016 . Joseph Poon and Thaddeus Dryja. The bitcoin lightning network: Scalable off-chain instant payments. draft version 0.5, 9:14, 2016."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813686"},{"key":"e_1_3_2_1_33_1","volume-title":"25th USENIX Security","author":"Strackx Raoul","year":"2016","unstructured":"Raoul Strackx and Frank Piessens . Ariadne : A minimal approach to state continuity . In 25th USENIX Security , 2016 . Raoul Strackx and Frank Piessens. Ariadne: A minimal approach to state continuity. In 25th USENIX Security, 2016."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_23"},{"key":"e_1_3_2_1_35_1","volume-title":"A simple and principled way to compute rent fees","author":"Buterin Vitalik","year":"2018","unstructured":"Vitalik Buterin . A simple and principled way to compute rent fees . March 2018 . https:\/\/ethresear.ch\/t\/a-simple-and-principled-way-to-compute-rent-fees\/1455. Vitalik Buterin. A simple and principled way to compute rent fees. March 2018. https:\/\/ethresear.ch\/t\/a-simple-and-principled-way-to-compute-rent-fees\/1455."}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:33Z","timestamp":1750268973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355461"}},"subtitle":["Arbitration Outsourcing for State Channels"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":35,"alternative-id":["10.1145\/3318041.3355461","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355461","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}