{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:44:41Z","timestamp":1765827881561,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,2,29]],"date-time":"2020-02-29T00:00:00Z","timestamp":1582934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Queue"],"published-print":{"date-parts":[[2020,2,29]]},"abstract":"<jats:p>Self-sovereign stablecoins are interesting and probably here to stay; however, they face numerous regulatory hurdles from banking, financial tracking, and securities laws. For stablecoins backed by a governmental currency, the ultimate expression would be a CBDC. Since paper currency has been in steady decline (and disproportionately for legitimate transactions), a CBDC could reintroduce cash with technological advantages and efficient settlement while minimizing user fees.<\/jats:p>","DOI":"10.1145\/3387945.3388781","type":"journal-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T22:19:17Z","timestamp":1584397157000},"page":"39-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Demystifying Stablecoins"],"prefix":"10.1145","volume":"18","author":[{"given":"Jeremy","family":"Clark","sequence":"first","affiliation":[{"name":"Concordia University"}]},{"given":"Didem","family":"Demirag","sequence":"additional","affiliation":[{"name":"Concordia University"}]},{"given":"Seyedehmahsa","family":"Moosavi","sequence":"additional","affiliation":[{"name":"Concordia University"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_2_1_2_1","unstructured":"Champagne P. 2014. The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto. e53 Publishing."},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Clark J. Demirag D. Moosavi S. 2019. SoK: Demystifying Stablecoins. Social Sciences Research Network; https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3466371.","DOI":"10.2139\/ssrn.3466371"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23187"},{"key":"e_1_2_1_5_1","volume-title":"Is Bitcoin really un-tethered? Social Sciences Research Network","author":"Griffin J. M.","year":"1950","unstructured":"Griffin, J. M., Shams, A. 2018. Is Bitcoin really un-tethered? Social Sciences Research Network; https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3195066."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Moin A. Sekniqi K. Sirer E. G. 2020. SoK: A classification framework for stablecoin designs. In Financial Cryptography.","DOI":"10.1007\/978-3-030-51280-4_11"},{"key":"e_1_2_1_7_1","unstructured":"Nakamoto S. 2008. Bitcoin: a peer-to-peer electronic cash system; https:\/\/bitcoin.org\/bitcoin.pdf."},{"volume-title":"Bitcoin and Cryptocurrency Technologies","author":"Narayanan A.","key":"e_1_2_1_8_1","unstructured":"Narayanan, A., et al. 2016. Bitcoin and Cryptocurrency Technologies. Princeton University Press."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2019.00011"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Pimentel E. Boulianne E. Eskandari S. Clark J. 2019. Systemizing the challenges of auditing blockchain-based assets. Social Sciences Research Network Electronic Journal.","DOI":"10.2139\/ssrn.3359985"},{"volume-title":"The Curse of Cash: How Large-Denomination Bills Aid Crime and Tax Evasion and Constrain Monetary Policy","author":"Rogoff K. S.","key":"e_1_2_1_11_1","unstructured":"Rogoff, K. S. 2017. The Curse of Cash: How Large-Denomination Bills Aid Crime and Tax Evasion and Constrain Monetary Policy. Princeton University Press."}],"container-title":["Queue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387945.3388781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387945.3388781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:47Z","timestamp":1750199927000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387945.3388781"}},"subtitle":["Cryptography meets monetary policy"],"short-title":[],"issued":{"date-parts":[[2020,2,29]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2,29]]}},"alternative-id":["10.1145\/3387945.3388781"],"URL":"https:\/\/doi.org\/10.1145\/3387945.3388781","relation":{},"ISSN":["1542-7730","1542-7749"],"issn-type":[{"type":"print","value":"1542-7730"},{"type":"electronic","value":"1542-7749"}],"subject":[],"published":{"date-parts":[[2020,2,29]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}