{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:31:22Z","timestamp":1770748282955,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3341301.3359636","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"80-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Fast and secure global payments with Stellar"],"prefix":"10.1145","author":[{"given":"Marta","family":"Lokhava","sequence":"first","affiliation":[{"name":"Stellar Development Foundation"}]},{"given":"Giuliano","family":"Losa","sequence":"additional","affiliation":[{"name":"Galois, Inc."}]},{"given":"David","family":"Mazi\u00e8res","sequence":"additional","affiliation":[{"name":"Stellar Development Foundation"}]},{"given":"Graydon","family":"Hoare","sequence":"additional","affiliation":[{"name":"Stellar Development Foundation"}]},{"given":"Nicolas","family":"Barry","sequence":"additional","affiliation":[{"name":"Stellar Development Foundation"}]},{"given":"Eli","family":"Gafni","sequence":"additional","affiliation":[{"name":"UCLA"}]},{"given":"Jonathan","family":"Jove","sequence":"additional","affiliation":[{"name":"Stellar Development Foundation"}]},{"given":"Rafa\u0142","family":"Malinowsky","sequence":"additional","affiliation":[{"name":"Stellar Development Foundation"}]},{"given":"Jed","family":"McCaleb","sequence":"additional","affiliation":[{"name":"Stellar Development Foundation"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Atomic cross-chain trading. https:\/\/en.bitcoin.it\/wiki\/Atomic_cross-chain_trading.  [n.d.]. Atomic cross-chain trading. https:\/\/en.bitcoin.it\/wiki\/Atomic_cross-chain_trading."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Directo a M\u00e9xico Frequently Asked Questions. https:\/\/www.frbservices.org\/assets\/resources\/financial-services\/directomexicofaq.pdf.  [n.d.]. Directo a M\u00e9xico Frequently Asked Questions. https:\/\/www.frbservices.org\/assets\/resources\/financial-services\/directomexicofaq.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. ERC20 Token Standard. https:\/\/theethereum.wiki\/w\/index.php\/ERC20_Token_Standard.  [n.d.]. ERC20 Token Standard. https:\/\/theethereum.wiki\/w\/index.php\/ERC20_Token_Standard."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. PoET 1.0 Specification. https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/latest\/architecture\/poet.html.  [n.d.]. PoET 1.0 Specification. https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/latest\/architecture\/poet.html."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Stellar network visibility. https:\/\/stellarbeat.io.  [n.d.]. Stellar network visibility. https:\/\/stellarbeat.io."},{"key":"e_1_3_2_1_6_1","unstructured":"2015. Merged mining specification. https:\/\/en.bitcoin.it\/wiki\/Merged_mining_specification.  2015. Merged mining specification. https:\/\/en.bitcoin.it\/wiki\/Merged_mining_specification."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. MobileCoin. https:\/\/www.mobilecoin.com\/whitepaper-en.pdf.  2017. MobileCoin. https:\/\/www.mobilecoin.com\/whitepaper-en.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"2017. Mobius: A Universal Protocol Suite for the Blockchain Ecosystem and Real World Data. https:\/\/crushcrypto.com\/wp-content\/uploads\/2017\/11\/MOBI-Whitepaper.pdf.  2017. Mobius: A Universal Protocol Suite for the Blockchain Ecosystem and Real World Data. https:\/\/crushcrypto.com\/wp-content\/uploads\/2017\/11\/MOBI-Whitepaper.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. The BitShares Blockchain. https:\/\/github.com\/bitshares-foundation\/bitshares.foundation\/blob\/master\/download\/articles\/BitSharesBlockchain.pdf.  2018. The BitShares Blockchain. https:\/\/github.com\/bitshares-foundation\/bitshares.foundation\/blob\/master\/download\/articles\/BitSharesBlockchain.pdf."},{"key":"e_1_3_2_1_10_1","unstructured":"2018. ZenCash Statement On Double Spend Attack. https:\/\/blog.zencash.com\/zencash-statement-on-double-spend-attack\/.  2018. ZenCash Statement On Double Spend Attack. https:\/\/blog.zencash.com\/zencash-statement-on-double-spend-attack\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2019. An Introduction to Libra. https:\/\/libra.org\/en-US\/white-paper\/.  2019. An Introduction to Libra. https:\/\/libra.org\/en-US\/white-paper\/."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/www.crypto51.app (retrieved","author":"Attack Cost W","year":"2019","unstructured":"2019. Po W 51% Attack Cost . https:\/\/www.crypto51.app (retrieved Aug. 29, 2019 ). 2019. PoW 51% Attack Cost. https:\/\/www.crypto51.app (retrieved Aug. 29, 2019)."},{"key":"e_1_3_2_1_13_1","unstructured":"2019. Remittance Prices Worldwide. Issue 30. https:\/\/remittanceprices.worldbank.org\/sites\/default\/files\/rpw_report_june_2019.pdf.  2019. Remittance Prices Worldwide. Issue 30. https:\/\/remittanceprices.worldbank.org\/sites\/default\/files\/rpw_report_june_2019.pdf."},{"key":"e_1_3_2_1_14_1","volume-title":"SWIFT in Figures","year":"2019","unstructured":"2019. SWIFT in Figures July 2019 . https:\/\/www.swift.com\/about-us\/swift-fin-traffic-figures\/monthly-figures. 2019. SWIFT in Figures July 2019. https:\/\/www.swift.com\/about-us\/swift-fin-traffic-figures\/monthly-figures."},{"key":"e_1_3_2_1_15_1","volume-title":"The Realistic Lucrative Case of Ethereum Classic attack---Today. (May","author":"Abboud Hussam","year":"2018","unstructured":"Hussam Abboud . 2018. The Realistic Lucrative Case of Ethereum Classic attack---Today. (May 2018 ). https:\/\/medium.com\/@HusamABBOUD\/the-realistic-lucrative-case-of-ethereum-classic-attack-with-1mm-today-8fa0430a7c25. Hussam Abboud. 2018. The Realistic Lucrative Case of Ethereum Classic attack---Today. (May 2018). https:\/\/medium.com\/@HusamABBOUD\/the-realistic-lucrative-case-of-ethereum-classic-attack-with-1mm-today-8fa0430a7c25."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Giuseppe Ateniese Ilario Bonacina Antonio Faonio and Nicola Galesi. 2014. Proofs of Space: When Space Is of the Essence. In Security and Cryptography for Networks Michel Abdalla and Roberto De Prisco (Eds.). 538--557.  Giuseppe Ateniese Ilario Bonacina Antonio Faonio and Nicola Galesi. 2014. Proofs of Space: When Space Is of the Essence. In Security and Cryptography for Networks Michel Abdalla and Roberto De Prisco (Eds.). 538--557.","DOI":"10.1007\/978-3-319-10879-7_31"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_19_1","unstructured":"Rachel Banning-Lover. 2015. Boatfuls of cash: how do you get money into fragile states? http:\/\/www.theguardian.com\/global-development-professionals-network\/2015\/feb\/19\/boatfuls-of-cash-how-do-you-get-money-into-fragile-states.  Rachel Banning-Lover. 2015. Boatfuls of cash: how do you get money into fragile states? http:\/\/www.theguardian.com\/global-development-professionals-network\/2015\/feb\/19\/boatfuls-of-cash-how-do-you-get-money-into-fragile-states."},{"key":"e_1_3_2_1_20_1","unstructured":"Nicolas Barry Giuliano Losa David Mazieres Jed McCaleb and Stanislas Polu. 2018. The Stellar Consensus Protocol (SCP). Internet-Draft draft-mazieres-dinrg-scp-05. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-mazieres-dinrg-scp-05.txt http:\/\/www.ietf.org\/internet-drafts\/draft-mazieres-dinrg-scp-05.txt.  Nicolas Barry Giuliano Losa David Mazieres Jed McCaleb and Stanislas Polu. 2018. The Stellar Consensus Protocol (SCP). Internet-Draft draft-mazieres-dinrg-scp-05. IETF Secretariat. http:\/\/www.ietf.org\/internet-drafts\/draft-mazieres-dinrg-scp-05.txt http:\/\/www.ietf.org\/internet-drafts\/draft-mazieres-dinrg-scp-05.txt."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/wber\/lhr017"},{"key":"e_1_3_2_1_22_1","unstructured":"Bitbond. 2019. Securities Prospectus. https:\/\/www.bitbondsto.com\/.  Bitbond. 2019. Securities Prospectus. https:\/\/www.bitbondsto.com\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 5th Workshop on Bitcoin and Blockchain Research. http:\/\/www.jbonneau.com\/doc\/B18a-BITCOIN-why_buy_when_you_can_rent.pdf","author":"Bonneau Joseph","year":"2018","unstructured":"Joseph Bonneau . 2018 . Hostile blockchain takeovers . In Proceedings of the 5th Workshop on Bitcoin and Blockchain Research. http:\/\/www.jbonneau.com\/doc\/B18a-BITCOIN-why_buy_when_you_can_rent.pdf Joseph Bonneau. 2018. Hostile blockchain takeovers. In Proceedings of the 5th Workshop on Bitcoin and Blockchain Research. http:\/\/www.jbonneau.com\/doc\/B18a-BITCOIN-why_buy_when_you_can_rent.pdf"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_1_25_1","unstructured":"Danny Bradbury. 2013. Feathercoin hit by massive attack. http:\/\/www.coindesk.com\/feathercoin-hit-by-massive-attack\/.  Danny Bradbury. 2013. Feathercoin hit by massive attack. http:\/\/www.coindesk.com\/feathercoin-hit-by-massive-attack\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Bitcoin Network Shaken by Blockchain Fork. (March","author":"Buterin Vitalik","year":"2013","unstructured":"Vitalik Buterin . 2013. Bitcoin Network Shaken by Blockchain Fork. (March 2013 ). https:\/\/bitcoinmagazine.com\/articles\/bitcoin-network-shaken-by-blockchain-fork-1363144448\/. Vitalik Buterin. 2013. Bitcoin Network Shaken by Blockchain Fork. (March 2013). https:\/\/bitcoinmagazine.com\/articles\/bitcoin-network-shaken-by-blockchain-fork-1363144448\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Slasher: A Punitive Proof-of-Stake Algorithm. https:\/\/blog.ethereum.org\/2014\/01\/15\/slasher-a-punitive-proof-of-stake-algorithm\/.","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin . 2014 . Slasher: A Punitive Proof-of-Stake Algorithm. https:\/\/blog.ethereum.org\/2014\/01\/15\/slasher-a-punitive-proof-of-stake-algorithm\/. Vitalik Buterin. 2014. Slasher: A Punitive Proof-of-Stake Algorithm. https:\/\/blog.ethereum.org\/2014\/01\/15\/slasher-a-punitive-proof-of-stake-algorithm\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the Friendly Finality Gadget. arXiv:1710.09437. http:\/\/arxiv.org\/abs\/1710.09437.  Vitalik Buterin and Virgil Griffith. 2017. Casper the Friendly Finality Gadget. arXiv:1710.09437. http:\/\/arxiv.org\/abs\/1710.09437."},{"key":"e_1_3_2_1_29_1","unstructured":"Christian Cachin and Bj\u00f6rn Tackmann. 2019. Asymmetric Distributed Trust. arXiv:arXiv:1906.09314 https:\/\/arxiv.org\/abs\/1906.09314.  Christian Cachin and Bj\u00f6rn Tackmann. 2019. Asymmetric Distributed Trust. arXiv:arXiv:1906.09314 https:\/\/arxiv.org\/abs\/1906.09314."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945474"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_32_1","unstructured":"Stephen Cecchetti and Kim Schoenholtz. 2018. The stubbornly high cost of remittances. https:\/\/voxeu.org\/article\/stubbornly-high-cost-remittances.  Stephen Cecchetti and Kim Schoenholtz. 2018. The stubbornly high cost of remittances. https:\/\/voxeu.org\/article\/stubbornly-high-cost-remittances."},{"key":"e_1_3_2_1_33_1","unstructured":"Brad Chase and Ethan MacBrough. 2018. Analysis of the XRP Ledger Consensus Protocol. arXiv:1802.07242. https:\/\/arxiv.org\/abs\/1802.07242v1.  Brad Chase and Ethan MacBrough. 2018. Analysis of the XRP Ledger Consensus Protocol. arXiv:1802.07242. https:\/\/arxiv.org\/abs\/1802.07242v1."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.862650"},{"key":"e_1_3_2_1_35_1","unstructured":"REPO Coin. [n.d.]. Bringing the $1 billion auto repossession industry onto the blockchain. https:\/\/www.repocoin.io\/docs\/Repo%20Coin-WhitePaper.pdf.  REPO Coin. [n.d.]. Bringing the $1 billion auto repossession industry onto the blockchain. https:\/\/www.repocoin.io\/docs\/Repo%20Coin-WhitePaper.pdf."},{"key":"e_1_3_2_1_36_1","volume-title":"Cardless ATM Instant Cash Out. https:\/\/coins.ph\/atm-cash-pickup\/ (retrieved","year":"2019","unstructured":"coins.ph. 2019. Cardless ATM Instant Cash Out. https:\/\/coins.ph\/atm-cash-pickup\/ (retrieved Aug. 29, 2019 ). coins.ph. 2019. Cardless ATM Instant Cash Out. https:\/\/coins.ph\/atm-cash-pickup\/ (retrieved Aug. 29, 2019)."},{"key":"e_1_3_2_1_37_1","unstructured":"crazyearner. 2013. TERRACOIN ATTACK OVER 1.2TH ATTACK CONFIRMD [sic]. https:\/\/bitcointalk.org\/index.php?topic=261986.0.  crazyearner. 2013. TERRACOIN ATTACK OVER 1.2TH ATTACK CONFIRMD [sic]. https:\/\/bitcointalk.org\/index.php?topic=261986.0."},{"key":"e_1_3_2_1_38_1","unstructured":"Jan Cronje. 2017. High bank charges force immigrants to send money home \"hand-to-hand\". https:\/\/www.groundup.org.za\/article\/high-bank-charges-force-immigrants-send-money-home-hand-hand\/.  Jan Cronje. 2017. High bank charges force immigrants to send money home \"hand-to-hand\". https:\/\/www.groundup.org.za\/article\/high-bank-charges-force-immigrants-send-money-home-hand-hand\/."},{"key":"e_1_3_2_1_39_1","volume-title":"Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919. https:\/\/eprint.iacr.org\/2016\/919.","author":"Daian Phil","year":"2016","unstructured":"Phil Daian , Rafael Pass , and Elaine Shi . 2016 . Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919. https:\/\/eprint.iacr.org\/2016\/919. Phil Daian, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919. https:\/\/eprint.iacr.org\/2016\/919."},{"key":"e_1_3_2_1_40_1","volume-title":"Advances in Cryptology - ASIACRYPT","author":"Damg\u00e5rd Ivan","year":"2007","unstructured":"Ivan Damg\u00e5rd , Yvo Desmedt , Matthias Fitzi , and Jesper Buus Nielsen . 2007. Secure Protocols with Asymmetric Trust . In Advances in Cryptology - ASIACRYPT 2007 , Kaoru Kurosawa (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 357--375. Ivan Damg\u00e5rd, Yvo Desmedt, Matthias Fitzi, and Jesper Buus Nielsen. 2007. Secure Protocols with Asymmetric Trust. In Advances in Cryptology - ASIACRYPT 2007, Kaoru Kurosawa (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 357--375."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Kourosh Davarpanah Dan Kaufman and Ophelie Pubellier. 2015. NeuCoin: the First Secure Cost-efficient and Decentralized Cryptocurrency. http:\/\/www.neucoin.org\/en\/whitepaper\/download.  Kourosh Davarpanah Dan Kaufman and Ophelie Pubellier. 2015. NeuCoin: the First Secure Cost-efficient and Decentralized Cryptocurrency. http:\/\/www.neucoin.org\/en\/whitepaper\/download.","DOI":"10.2139\/ssrn.2585589"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. 139--147","author":"Dwork Cynthia","year":"1992","unstructured":"Cynthia Dwork and Moni Naor . 1992 . Pricing via Processing or Combatting Junk Mail . In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. 139--147 . Cynthia Dwork and Moni Naor. 1992. Pricing via Processing or Combatting Junk Mail. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. 139--147."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol . In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation . Santa Clara, CA, 45--59. Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. Santa Clara, CA, 45--59."},{"key":"e_1_3_2_1_46_1","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. http:\/\/arxiv.org\/abs\/1311.0243.  Ittay Eyal and Emin G\u00fcn Sirer. 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. http:\/\/arxiv.org\/abs\/1311.0243."},{"key":"e_1_3_2_1_47_1","volume-title":"Stellar Consensus By Instantiation. In 33nd International Symposium on Distributed Computing (DISC","author":"Gafni Eli","year":"2019","unstructured":"Eli Gafni , Giuliano Losa , and David Mazi\u00e8res . 2019 . Stellar Consensus By Instantiation. In 33nd International Symposium on Distributed Computing (DISC 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Eli Gafni, Giuliano Losa, and David Mazi\u00e8res. 2019. Stellar Consensus By Instantiation. In 33nd International Symposium on Distributed Computing (DISC 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_48_1","first-page":"281","article-title":"The Bitcoin Backbone Protocol","volume":"2015","author":"Garay Juan","year":"2015","unstructured":"Juan Garay , Aggelos Kiayias , and Nikos Leonardos . 2015 . The Bitcoin Backbone Protocol : Analysis and Applications. In Advances in Cryptology - EUROCRYPT 2015. 281 -- 310 . Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In Advances in Cryptology - EUROCRYPT 2015. 281--310.","journal-title":"Analysis and Applications. In Advances in Cryptology - EUROCRYPT"},{"key":"e_1_3_2_1_49_1","volume-title":"Federated Byzantine Quorum Systems. In 22nd International Conference on Principles of Distributed Systems (OPODIS","author":"Garc\u00eda-P\u00e9rez \u00c1lvaro","year":"2018","unstructured":"\u00c1lvaro Garc\u00eda-P\u00e9rez and Alexey Gotsman . 2018 . Federated Byzantine Quorum Systems. In 22nd International Conference on Principles of Distributed Systems (OPODIS 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. \u00c1lvaro Garc\u00eda-P\u00e9rez and Alexey Gotsman. 2018. Federated Byzantine Quorum Systems. In 22nd International Conference on Principles of Distributed Systems (OPODIS 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/800215.806583"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-010-0103-7"},{"key":"e_1_3_2_1_53_1","unstructured":"Guy Golan Gueta Ittai Abraham Shelly Grossman Dahlia Malkhi Benny Pinkas Michael K. Reiter Dragos-Adrian Seredinschi Orr Tamir and Alin Tomescu. 2018. SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. arXiv:1804.01626v1. https:\/\/arxiv.org\/abs\/1804.01626v1.  Guy Golan Gueta Ittai Abraham Shelly Grossman Dahlia Malkhi Benny Pinkas Michael K. Reiter Dragos-Adrian Seredinschi Orr Tamir and Alin Tomescu. 2018. SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. arXiv:1804.01626v1. https:\/\/arxiv.org\/abs\/1804.01626v1."},{"key":"e_1_3_2_1_54_1","volume-title":"Japanese Cryptocurrency Monacoin Hit by Selfish Mining Attack. CCN (May","author":"Gutteridge Dave","year":"2018","unstructured":"Dave Gutteridge . 2018. Japanese Cryptocurrency Monacoin Hit by Selfish Mining Attack. CCN (May 2018 ). https:\/\/www.ccn.com\/japanese-cryptocurrency-monacoin-hit-by-selfish-mining-attack\/. Dave Gutteridge. 2018. Japanese Cryptocurrency Monacoin Hit by Selfish Mining Attack. CCN (May 2018). https:\/\/www.ccn.com\/japanese-cryptocurrency-monacoin-hit-by-selfish-mining-attack\/."},{"key":"e_1_3_2_1_55_1","volume-title":"Bitcoin Has Saved My Family. The New York Times (February 23","author":"Hern\u00e1ndez Carlos","year":"2019","unstructured":"Carlos Hern\u00e1ndez . 2019. Bitcoin Has Saved My Family. The New York Times (February 23 2019 ). https:\/\/www.nytimes.com\/2019\/02\/23\/opinion\/sunday\/venezuela-bitcoin-inflation-cryptocurrencies.html. Carlos Hern\u00e1ndez. 2019. Bitcoin Has Saved My Family. The New York Times (February 23 2019). https:\/\/www.nytimes.com\/2019\/02\/23\/opinion\/sunday\/venezuela-bitcoin-inflation-cryptocurrencies.html."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-010-0107-3"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00048"},{"key":"e_1_3_2_1_59_1","unstructured":"Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. http:\/\/peercoin.net\/assets\/paper\/peercoin-paper.pdf.  Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. http:\/\/peercoin.net\/assets\/paper\/peercoin-paper.pdf."},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security (WEIS).","author":"Kroll Joshua A","year":"2013","unstructured":"Joshua A Kroll , Ian C Davey , and Edward W Felten . 2013 . The economics of Bitcoin mining, or Bitcoin in the presence of adversaries . In Proceedings of the Workshop on the Economics of Information Security (WEIS). Joshua A Kroll, Ian C Davey, and Edward W Felten. 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of the Workshop on the Economics of Information Security (WEIS)."},{"key":"e_1_3_2_1_61_1","volume-title":"Tendermint: Consensus without Mining","author":"Kwon Jae","year":"2014","unstructured":"Jae Kwon . 2014 . Tendermint: Consensus without Mining . http:\/\/tendermint.com\/docs\/tendermint.pdf. Jae Kwon. 2014. Tendermint: Consensus without Mining. http:\/\/tendermint.com\/docs\/tendermint.pdf."},{"key":"e_1_3_2_1_62_1","unstructured":"\u0141ukasz Lachowski. 2019. Complexity of the Quorum Intersection Property of the Federated Byzantine Agreement System. https:\/\/arxiv.org\/abs\/1902.06493.  \u0141ukasz Lachowski. 2019. Complexity of the Quorum Intersection Property of the Federated Byzantine Agreement System. https:\/\/arxiv.org\/abs\/1902.06493."},{"key":"e_1_3_2_1_63_1","first-page":"7","article-title":"Analysis of IP Prefix Hijacking and Traffic Interception","volume":"10","author":"ThidaLatt Khin","year":"2010","unstructured":"Khin ThidaLatt , Yasuhiro Ohara , Satoshi Uda , and Yoichi Shinoda . 2010 . Analysis of IP Prefix Hijacking and Traffic Interception . International Journal of Computer Science and Network Security 10 , 7 (July 2010), 22--31. Khin ThidaLatt, Yasuhiro Ohara, Satoshi Uda, and Yoichi Shinoda. 2010. Analysis of IP Prefix Hijacking and Traffic Interception. International Journal of Computer Science and Network Security 10, 7 (July 2010), 22--31.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 4th Symposium on Networked Systems Design and Implementation. 131--144","author":"Li Jinyuan","year":"2007","unstructured":"Jinyuan Li and David Mazi\u00e8res . 2007 . Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems . In Proceedings of the 4th Symposium on Networked Systems Design and Implementation. 131--144 . Jinyuan Li and David Mazi\u00e8res. 2007. Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. In Proceedings of the 4th Symposium on Networked Systems Design and Implementation. 131--144."},{"key":"e_1_3_2_1_65_1","unstructured":"Giuliano Losa. 2019. Formal Verification of SCP. https:\/\/github.com\/stellar\/scp-proofs.  Giuliano Losa. 2019. Formal Verification of SCP. https:\/\/github.com\/stellar\/scp-proofs."},{"key":"e_1_3_2_1_66_1","volume-title":"Cobalt: BFT Governance in Open Networks. arXiv:1802.07240v1. https:\/\/arxiv.org\/abs\/1802.07240v1.","author":"MacBrough Ethan","year":"2018","unstructured":"Ethan MacBrough . 2018 . Cobalt: BFT Governance in Open Networks. arXiv:1802.07240v1. https:\/\/arxiv.org\/abs\/1802.07240v1. Ethan MacBrough. 2018. Cobalt: BFT Governance in Open Networks. arXiv:1802.07240v1. https:\/\/arxiv.org\/abs\/1802.07240v1."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050050"},{"key":"e_1_3_2_1_68_1","volume-title":"The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. (February","author":"Mazi\u00e8res David","year":"2016","unstructured":"David Mazi\u00e8res . 2016. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. (February 2016 ). https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf. David Mazi\u00e8res. 2016. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. (February 2016). https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf."},{"key":"e_1_3_2_1_69_1","volume-title":"McMillan and Oded Padon","author":"Kenneth","year":"2018","unstructured":"Kenneth L. McMillan and Oded Padon . 2018 . Deductive Verification in Decidable Fragments with Ivy. In International Static Analysis Symposium. Springer , 43--55. Kenneth L. McMillan and Oded Padon. 2018. Deductive Verification in Decidable Fragments with Ivy. In International Static Analysis Symposium. Springer, 43--55."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_71_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system . http:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795281232"},{"key":"e_1_3_2_1_73_1","volume-title":"Analyzing the 2013 Bitcoin fork: centralized decision-making saved the day. (July","author":"Narayanan Arvind","year":"2015","unstructured":"Arvind Narayanan . 2015. Analyzing the 2013 Bitcoin fork: centralized decision-making saved the day. (July 2015 ). https:\/\/freedom-to-tinker.com\/2015\/07\/28\/analyzing-the-2013-bitcoin-fork-centralized-decision-making-saved-the-day\/. Arvind Narayanan. 2015. Analyzing the 2013 Bitcoin fork: centralized decision-making saved the day. (July 2015). https:\/\/freedom-to-tinker.com\/2015\/07\/28\/analyzing-the-2013-bitcoin-fork-centralized-decision-making-saved-the-day\/."},{"key":"e_1_3_2_1_75_1","volume-title":"A Proof Assistant for Higher-Order Logic","author":"Nipkow Tobias","unstructured":"Tobias Nipkow , Lawrence C. Paulson , and Markus Wenzel . 2002. Isabelle\/HOL : A Proof Assistant for Higher-Order Logic . Vol. 2283 . Springer Science & Business Media . Tobias Nipkow, Lawrence C. Paulson, and Markus Wenzel. 2002. Isabelle\/HOL: A Proof Assistant for Higher-Order Logic. Vol. 2283. Springer Science & Business Media."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0699"},{"key":"e_1_3_2_1_77_1","first-page":"4","article-title":"The log-structured merge-tree (LSM-tree)","volume":"33","author":"O'Neil Patrick","year":"1996","unstructured":"Patrick O'Neil , Edward Cheng , Dieter Gawlick , and Elizabeth O'Neil . 1996 . The log-structured merge-tree (LSM-tree) . Acta Informatica 33 , 4 (June 1996), 351--385. Patrick O'Neil, Edward Cheng, Dieter Gawlick, and Elizabeth O'Neil. 1996. The log-structured merge-tree (LSM-tree). Acta Informatica 33, 4 (June 1996), 351--385.","journal-title":"Acta Informatica"},{"key":"e_1_3_2_1_78_1","volume-title":"Re: Venmo to Paypal payments. https:\/\/www.paypal-community.com\/t5\/PayPal-Basics\/Venmo-to-Paypal-payments\/m-p\/1520181#M15025.","year":"2018","unstructured":"Oregon11. 2018 . Re: Venmo to Paypal payments. https:\/\/www.paypal-community.com\/t5\/PayPal-Basics\/Venmo-to-Paypal-payments\/m-p\/1520181#M15025. Oregon11. 2018. Re: Venmo to Paypal payments. https:\/\/www.paypal-community.com\/t5\/PayPal-Basics\/Venmo-to-Paypal-payments\/m-p\/1520181#M15025."},{"key":"e_1_3_2_1_79_1","volume-title":"Slimcoin: A Peer-to-Peer Crypto-Currency with Proof-of-Burn. https:\/\/github.com\/slimcoin-project\/slimcoin-project.github.io\/raw\/master\/whitepaperSLM.pdf.","year":"2017","unstructured":"P4Titan. 2017 . Slimcoin: A Peer-to-Peer Crypto-Currency with Proof-of-Burn. https:\/\/github.com\/slimcoin-project\/slimcoin-project.github.io\/raw\/master\/whitepaperSLM.pdf. P4Titan. 2017. Slimcoin: A Peer-to-Peer Crypto-Currency with Proof-of-Burn. https:\/\/github.com\/slimcoin-project\/slimcoin-project.github.io\/raw\/master\/whitepaperSLM.pdf."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158114"},{"key":"e_1_3_2_1_81_1","volume-title":"Temporal Prophecy for Proving Temporal Properties of Infinite-State Systems. In 2018 Formal Methods in Computer Aided Design (FMCAD)","author":"Padon Oded","unstructured":"Oded Padon , Jochen Hoenicke , Kenneth L. McMillan , Andreas Podelski , Mooly Sagiv , and Sharon Shoham . 2018. Temporal Prophecy for Proving Temporal Properties of Infinite-State Systems. In 2018 Formal Methods in Computer Aided Design (FMCAD) . IEEE , 1--11. Oded Padon, Jochen Hoenicke, Kenneth L. McMillan, Andreas Podelski, Mooly Sagiv, and Sharon Shoham. 2018. Temporal Prophecy for Proving Temporal Properties of Infinite-State Systems. In 2018 Formal Methods in Computer Aided Design (FMCAD). IEEE, 1--11."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140568"},{"key":"e_1_3_2_1_83_1","volume-title":"KYC Optimization Using Distributed Ledger Technology. Business & Information Systems Engineering 59, 6 (01","author":"Moyano Jos\u00e9 Parra","year":"2017","unstructured":"Jos\u00e9 Parra Moyano and Omri Ross . 2017. KYC Optimization Using Distributed Ledger Technology. Business & Information Systems Engineering 59, 6 (01 Dec 2017 ), 411--423. Jos\u00e9 Parra Moyano and Omri Ross. 2017. KYC Optimization Using Distributed Ledger Technology. Business & Information Systems Engineering 59, 6 (01 Dec 2017), 411--423."},{"key":"e_1_3_2_1_84_1","volume-title":"Thunderella: Blockchains with Optimistic Instant Confirmation. Technical Report 2017\/913. Cryptography ePrint Archive. https:\/\/eprint.iacr.org\/2017\/913.pdf.","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Thunderella: Blockchains with Optimistic Instant Confirmation. Technical Report 2017\/913. Cryptography ePrint Archive. https:\/\/eprint.iacr.org\/2017\/913.pdf. Rafael Pass and Elaine Shi. 2017. Thunderella: Blockchains with Optimistic Instant Confirmation. Technical Report 2017\/913. Cryptography ePrint Archive. https:\/\/eprint.iacr.org\/2017\/913.pdf."},{"key":"e_1_3_2_1_85_1","volume-title":"Climate Rescue: Empowering People to Save the Planet with Every Purachase. https:\/\/poseidon.eco\/assets\/documents\/Poseidon-Climate-Rescue.pdf.","year":"2019","unstructured":"Poseidon. 2019 . Climate Rescue: Empowering People to Save the Planet with Every Purachase. https:\/\/poseidon.eco\/assets\/documents\/Poseidon-Climate-Rescue.pdf. Poseidon. 2019. Climate Rescue: Empowering People to Save the Planet with Every Purachase. https:\/\/poseidon.eco\/assets\/documents\/Poseidon-Climate-Rescue.pdf."},{"key":"e_1_3_2_1_86_1","unstructured":"Protocol Labs. 2017. Proof of Replication. https:\/\/filecoin.io\/proof-of-replication.pdf.  Protocol Labs. 2017. Proof of Replication. https:\/\/filecoin.io\/proof-of-replication.pdf."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_11"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_89_1","unstructured":"David Schwartz Noah Youngs and Arthur Britto. 2014. The Ripple Protocol Consensus Algorithm. https:\/\/ripple.com\/files\/ripple_consensus_whitepaper.pdf.  David Schwartz Noah Youngs and Arthur Britto. 2014. The Ripple Protocol Consensus Algorithm. https:\/\/ripple.com\/files\/ripple_consensus_whitepaper.pdf."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_3_2_1_92_1","unstructured":"Smartlands. [n.d.]. https:\/\/rise.smartlands.io\/.  Smartlands. [n.d.]. https:\/\/rise.smartlands.io\/."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"crossref","unstructured":"Yee Jiun Song Robbert van Renesse Fred B. Schneider and Danny Dolev. 2008. The Building Blocks of Consensus. In Distributed Computing and Networking Shrisha Rao Mainak Chatterjee Prasad Jayanti C. Siva Ram Murthy and Sanjoy Kumar Saha (Eds.). 54--72.  Yee Jiun Song Robbert van Renesse Fred B. Schneider and Danny Dolev. 2008. The Building Blocks of Consensus. In Distributed Computing and Networking Shrisha Rao Mainak Chatterjee Prasad Jayanti C. Siva Ram Murthy and Sanjoy Kumar Saha (Eds.). 54--72.","DOI":"10.1007\/978-3-540-77444-0_5"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/320071.320076"},{"key":"e_1_3_2_1_95_1","unstructured":"Greg Thomson. 2019. Coinbase Sides with Bitcoin Cash (BCH) Miners on 51% Attack Smack. CCN. https:\/\/www.ccn.com\/coinbase-bitcoin-cash-bch-miners-51-attack-smack\/.  Greg Thomson. 2019. Coinbase Sides with Bitcoin Cash (BCH) Miners on 51% Attack Smack. CCN. https:\/\/www.ccn.com\/coinbase-bitcoin-cash-bch-miners-51-attack-smack\/."},{"key":"e_1_3_2_1_96_1","unstructured":"VeridiumLabs. [n.d.]. https:\/\/www.veridium.io\/.  VeridiumLabs. [n.d.]. https:\/\/www.veridium.io\/."},{"key":"e_1_3_2_1_97_1","volume-title":"Exchanges Lose Millions. CCN (May","author":"Wilmoth Josiah","year":"2018","unstructured":"Josiah Wilmoth . 2018. Bitcoin Gold Hit by Double Spend Attack , Exchanges Lose Millions. CCN (May 2018 ). https:\/\/www.ccn.com\/bitcoin-gold-hit-by-double-spend-attack-exchanges-lose-millions\/. Josiah Wilmoth. 2018. Bitcoin Gold Hit by Double Spend Attack, Exchanges Lose Millions. CCN (May 2018). https:\/\/www.ccn.com\/bitcoin-gold-hit-by-double-spend-attack-exchanges-lose-millions\/."},{"key":"e_1_3_2_1_98_1","volume-title":"Privacy Coin Verge Succumbs to 51% Attack [Again]. CCN (May","author":"Wilmoth Josiah","year":"2018","unstructured":"Josiah Wilmoth . 2018. Privacy Coin Verge Succumbs to 51% Attack [Again]. CCN (May 2018 ). https:\/\/www.ccn.com\/privacy-coin-verge-succumbs-to-51-attack-again\/. Josiah Wilmoth. 2018. Privacy Coin Verge Succumbs to 51% Attack [Again]. CCN (May 2018). https:\/\/www.ccn.com\/privacy-coin-verge-succumbs-to-51-attack-again\/."},{"key":"e_1_3_2_1_99_1","volume-title":"Guy Golan Gueta, and Ittai Abraham","author":"Yin Maofan","year":"2018","unstructured":"Maofan Yin , Dahlia Malkhi , Michael K. Reiter , Guy Golan Gueta, and Ittai Abraham . 2018 . HotStuff: BFT Consensus in the Lens of Blockchain . arXiv:1803.05069. https:\/\/arxiv.org\/abs\/1803.05069. Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan Gueta, and Ittai Abraham. 2018. HotStuff: BFT Consensus in the Lens of Blockchain. arXiv:1803.05069. https:\/\/arxiv.org\/abs\/1803.05069."}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","location":"Huntsville Ontario Canada","acronym":"SOSP '19","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 27th ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341301.3359636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:26Z","timestamp":1750202606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":95,"alternative-id":["10.1145\/3341301.3359636","10.1145\/3341301"],"URL":"https:\/\/doi.org\/10.1145\/3341301.3359636","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}