{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:58:35Z","timestamp":1769299115906,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484784","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"3487-3501","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Mining in Logarithmic Space"],"prefix":"10.1145","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[{"name":"University of Edinburgh &amp; IOHK, Edinburgh, United Kingdom"}]},{"given":"Nikos","family":"Leonardos","sequence":"additional","affiliation":[{"name":"University of Athens, Athens, Greece"}]},{"given":"Dionysis","family":"Zindros","sequence":"additional","affiliation":[{"name":"University of Athens, Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"23rd Financial Cryptography and Data Security (FC)","author":"Avarikioti Georgia","unstructured":"Georgia Avarikioti, Lukas Kappeli, Yuyi Wang, and Roger Wattenhofer. 2019 a. Bitcoin Security under Temporary Dishonest Majority. In 23rd Financial Cryptography and Data Security (FC). Springer."},{"key":"e_1_3_2_1_2_1","volume-title":"2019 b. Divide and scale: Formalization of distributed ledger sharding protocols. arXiv preprint arXiv:1910.10434","author":"Avarikioti Georgia","year":"2019","unstructured":"Georgia Avarikioti, Eleftherios Kokoris-Kogias, and Roger Wattenhofer. 2019 b. Divide and scale: Formalization of distributed ledger sharding protocols. arXiv preprint arXiv:1910.10434 (2019)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_11"},{"key":"e_1_3_2_1_4_1","volume-title":"Cerberus Channels: Incentivizing Watchtowers for Bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 346--366","author":"Avarikioti Zeta","year":"2020","unstructured":"Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos, and Roger Wattenhofer. 2020. Cerberus Channels: Incentivizing Watchtowers for Bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 346--366."},{"key":"e_1_3_2_1_5_1","unstructured":"Christian Badertscher Peter Gazi Aggelos Kiayias Alexander Russell and Vassilis Zikas. 2020. Consensus redux: distributed ledgers in the face of adversarial supremacy. Technical Report. Cryptology ePrint Archive Report 2020\/1021."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_7_1","first-page":"46","article-title":"Scalable, transparent, and post-quantum secure computational integrity","volume":"2018","author":"Ben-Sasson Eli","year":"2018","unstructured":"Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. 2018. Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch., Vol. 2018 (2018), 46.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_10_1","volume-title":"Flyclient: Super-Light Clients for Cryptocurrencies. IACR Cryptology ePrint Archive","author":"B\u00fcnz Benedikt","year":"2019","unstructured":"Benedikt B\u00fcnz, Lucianna Kiffer, Loi Luu, and Mahdi Zamani. 2019. Flyclient: Super-Light Clients for Cryptocurrencies. IACR Cryptology ePrint Archive, Vol. 2019 (2019). https:\/\/eprint.iacr.org\/2019\/226"},{"key":"e_1_3_2_1_11_1","volume-title":"Blockhash refactoring. URL: https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-210.md","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin. 2017. Blockhash refactoring. URL: https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-210.md (2017)."},{"key":"e_1_3_2_1_12_1","unstructured":"Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. white paper (2014)."},{"key":"e_1_3_2_1_13_1","volume-title":"a blockchain with safely pruneable full blocks. arXiv preprint arXiv:1603.07926","author":"Chepurnoy Alexander","year":"2016","unstructured":"Alexander Chepurnoy, Mario Larangeira, and Alexander Ojiganov. 2016. Rollerchain, a blockchain with safely pruneable full blocks. arXiv preprint arXiv:1603.07926 (2016)."},{"key":"e_1_3_2_1_14_1","first-page":"968","article-title":"Edrax: A Cryptocurrency with Stateless Transaction Validation","volume":"2018","author":"Chepurnoy Alexander","year":"2018","unstructured":"Alexander Chepurnoy, Charalampos Papamanthou, and Yupeng Zhang. 2018. Edrax: A Cryptocurrency with Stateless Transaction Validation. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 968.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_15_1","volume-title":"Ergo: A resilient platform for contractual money .","author":"Developers Ergo","year":"2019","unstructured":"Ergo Developers. 2019. Ergo: A resilient platform for contractual money ."},{"key":"e_1_3_2_1_16_1","unstructured":"The Bitcoin Developers. [n.d.]. Developer Guide - Bitcoin. https:\/\/bitcoin.org\/en\/developer-guide"},{"key":"e_1_3_2_1_17_1","first-page":"611","article-title":"Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set","volume":"2019","author":"Dryja Thaddeus","year":"2019","unstructured":"Thaddeus Dryja. 2019. Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set. IACR Cryptol. ePrint Arch., Vol. 2019 (2019), 611.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_18_1","volume-title":"Annual International Cryptology Conference. Springer, Springer, 139--147","author":"Dwork Cynthia","year":"1992","unstructured":"Cynthia Dwork and Moni Naor. 1992. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference. Springer, Springer, 139--147."},{"key":"e_1_3_2_1_19_1","volume-title":"CRYPTO'86 (LNCS","volume":"194","author":"Fiat Amos","year":"1987","unstructured":"Amos Fiat and Adi Shamir. 1987. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO'86 (LNCS, Vol. 263), Andrew M. Odlyzko (Ed.). Springer, Heidelberg, 186--194."},{"key":"e_1_3_2_1_20_1","volume-title":"The Bitcoin Backbone Protocol: Analysis and Applications (revised","author":"Garay Juan","year":"2019","unstructured":"Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2014. The Bitcoin Backbone Protocol: Analysis and Applications (revised 2019). Cryptology ePrint Archive, Report 2014\/765. https:\/\/eprint.iacr.org\/2014\/765."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--46803--6_10"},{"key":"e_1_3_2_1_22_1","volume-title":"The Bitcoin Backbone Protocol with Chains of Variable Difficulty. In Annual International Cryptology Conference (LNCS","volume":"323","author":"Garay Juan A.","year":"2017","unstructured":"Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. 2017. The Bitcoin Backbone Protocol with Chains of Variable Difficulty. In Annual International Cryptology Conference (LNCS, Vol. 10401), Jonathan Katz and Hovav Shacham (Eds.). Springer, 291--323."},{"key":"e_1_3_2_1_23_1","unstructured":"Ethan Heilman Alison Kendler Aviv Zohar and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. Cryptology ePrint Archive Report 2015\/263. http:\/\/eprint.iacr.org\/2015\/263."},{"key":"e_1_3_2_1_24_1","volume-title":"Renaming SUICIDE opcode. URL: https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-6.md","author":"Jameson Hudson","year":"2015","unstructured":"Hudson Jameson. 2015. Renaming SUICIDE opcode. URL: https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-6.md (2015)."},{"key":"e_1_3_2_1_25_1","volume-title":"Enabling NIPoPoW Applications on Bitcoin Cash. Master's thesis","author":"Karantias Kostis","unstructured":"Kostis Karantias. 2019. Enabling NIPoPoW Applications on Bitcoin Cash. Master's thesis. University of Ioannina, Ioannina, Greece."},{"key":"e_1_3_2_1_26_1","unstructured":"Kostis Karantias. 2020. SoK: A Taxonomy of Cryptocurrency Wallets. Technical Report. IACR Cryptology ePrint Archive 2020: 868."},{"key":"e_1_3_2_1_27_1","volume-title":"Compact Storage of Superblocks for NIPoPoW Applications. In The 1st International Conference on Mathematical Research for Blockchain Economy. Springer Nature, Springer Nature.","author":"Karantias Kostis","year":"2019","unstructured":"Kostis Karantias, Aggelos Kiayias, and Dionysis Zindros. 2019. Compact Storage of Superblocks for NIPoPoW Applications. In The 1st International Conference on Mathematical Research for Blockchain Economy. Springer Nature, Springer Nature."},{"key":"e_1_3_2_1_28_1","volume-title":"Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, IEEE.","author":"Kiayias Aggelos","year":"2019","unstructured":"Aggelos Kiayias, Peter Gav zi, and Dionysis Zindros. 2019. Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, IEEE."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_5"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00031"},{"key":"e_1_3_2_1_31_1","unstructured":"Aggelos Kiayias Andrew Miller and Dionysis Zindros. 2017. Non-Interactive Proofs of Proof-of-Work."},{"key":"e_1_3_2_1_32_1","first-page":"1122","article-title":"The Velvet Path to Superlight Blockchain Clients","volume":"2020","author":"Kiayias Aggelos","year":"2020","unstructured":"Aggelos Kiayias, Andrianna Polydouri, and Dionysis Zindros. 2020. The Velvet Path to Superlight Blockchain Clients. IACR Cryptology ePrint Archive, Vol. 2020 (2020), 1122.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_33_1","volume-title":"Proof-of-Work Sidechains. In International Conference on Financial Cryptography and Data Security: Workshop on Trusted Smart Contracts. Springer, Springer.","author":"Kiayias Aggelos","year":"2019","unstructured":"Aggelos Kiayias and Dionysis Zindros. 2019. Proof-of-Work Sidechains. In International Conference on Financial Cryptography and Data Security: Workshop on Trusted Smart Contracts. Springer, Springer."},{"key":"e_1_3_2_1_34_1","volume-title":"FlyClient - Consensus-Layer Changes. URL: https:\/\/zips.z.cash\/zip-0221","author":"Lai Ying Tong","year":"2019","unstructured":"Ying Tong Lai, James Prestwich, and Georgios Konstantopoulos. 2019. FlyClient - Consensus-Layer Changes. URL: https:\/\/zips.z.cash\/zip-0221 (2019)."},{"key":"e_1_3_2_1_35_1","volume-title":"2020 IFIP Networking Conference (Networking). IEEE, 298--306","author":"Matzutt Roman","year":"2020","unstructured":"Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, and Klaus Wehrle. 2020. How to Securely Prune Bitcoin's Blockchain. In 2020 IFIP Networking Conference (Networking). IEEE, 298--306."},{"key":"e_1_3_2_1_36_1","volume-title":"Coda: Decentralized cryptocurrency at scale. https:\/\/cdn.codaprotocol.com\/v2\/static\/coda-whitepaper-05--10--2018-0.pdf.","author":"Meckler Izaak","year":"2018","unstructured":"Izaak Meckler and Evan Shapiro. 2018. Coda: Decentralized cryptocurrency at scale. https:\/\/cdn.codaprotocol.com\/v2\/static\/coda-whitepaper-05--10--2018-0.pdf."},{"key":"e_1_3_2_1_37_1","volume-title":"Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378."},{"key":"e_1_3_2_1_38_1","unstructured":"Andrew Miller. 2012. The high-value-hash highway. bitcoin forum post."},{"key":"e_1_3_2_1_39_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_40_1","volume-title":"Plasma: Scalable autonomous smart contracts. White paper","author":"Poon Joseph","year":"2017","unstructured":"Joseph Poon and Vitalik Buterin. 2017. Plasma: Scalable autonomous smart contracts. White paper (2017)."},{"key":"e_1_3_2_1_41_1","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments."},{"key":"e_1_3_2_1_42_1","volume-title":"A scalable verification solution for blockchains. arXiv preprint arXiv:1908.04756","author":"Teutsch Jason","year":"2019","unstructured":"Jason Teutsch and Christian Reitwie\u00dfner. 2019. A scalable verification solution for blockchains. arXiv preprint arXiv:1908.04756 (2019)."},{"key":"e_1_3_2_1_43_1","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, Vol. 151 (2014), 1--32.","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_3_2_1_44_1","unstructured":"Karl W\u00fcst and Arthur Gervais. 2016. Ethereum eclipse attacks. Technical Report. ETH Zurich."},{"key":"e_1_3_2_1_45_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer.","author":"Zamyatin Alexei","year":"2018","unstructured":"Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William Knottenbelt, and Alexei Zamyatin. 2018. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In International Conference on Financial Cryptography and Data Security. Springer."},{"key":"e_1_3_2_1_46_1","volume-title":"Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks. In International Conference on Financial Cryptography and Data Security. Springer, Springer.","author":"Zindros Dionysis","year":"2021","unstructured":"Dionysis Zindros. 2021. Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks. In International Conference on Financial Cryptography and Data Security. Springer, Springer."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484784","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:52:09Z","timestamp":1763499129000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":46,"alternative-id":["10.1145\/3460120.3484784","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484784","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}