{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:01:19Z","timestamp":1742990479443,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031257339"},{"type":"electronic","value":"9783031257346"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25734-6_12","type":"book-chapter","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T16:03:22Z","timestamp":1677168202000},"page":"185-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Ticket Price Matters in\u00a0Sharding Blockchain"],"prefix":"10.1007","author":[{"given":"Geunwoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Michael","family":"Franz","sequence":"additional","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,24]]},"reference":[{"key":"12_CR1","unstructured":"Ethereum 2.0 ([n d]). https:\/\/ethereum.org\/en\/upgrades\/"},{"key":"12_CR2","unstructured":"Abdelatif, H., Abdelhakim, S.H., Mustapha, S.: A tractable probabilistic approach to analyze sybil attacks in sharding-based blockchain protocols. arXiv preprint arXiv:2104.07215 (2021)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Al-Bassam, M., Sonnino, A., Bano, S., Hrycyszyn, D., Danezis, G.: Chainspace: a sharded smart contracts platform. arXiv preprint arXiv:1708.03778 (2017)","DOI":"10.14722\/ndss.2018.23241"},{"key":"12_CR4","unstructured":"Buchman, E.: Tendermint: Byzantine fault tolerance in the age of blockchains. Ph.D. thesis, University of Guelph (2016)"},{"key":"12_CR5","unstructured":"Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White Pap. 3(37) (2014)"},{"key":"12_CR6","unstructured":"Castro, M., Liskov, B., et al.: Practical byzantine fault tolerance. In: OSDI 1999, pp. 173\u2013186 (1999)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Danezis, G., Meiklejohn, S.: Centrally banked cryptocurrencies. arXiv preprint arXiv:1505.06895 (2015)","DOI":"10.14722\/ndss.2016.23187"},{"key":"12_CR8","unstructured":"De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V.: PBFT vs proof-of-authority: applying the cap theorem to permissioned blockchain (2018)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-662-58387-6_24","volume-title":"Financial Cryptography and Data Security","author":"AE Gencer","year":"2018","unstructured":"Gencer, A.E., Basu, S., Eyal, I., van Renesse, R., Sirer, E.G.: Decentralization in bitcoin and ethereum networks. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 439\u2013457. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_24"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51\u201368 (2017)","DOI":"10.1145\/3132747.3132757"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"125244","DOI":"10.1109\/ACCESS.2020.3007251","volume":"8","author":"A Hafid","year":"2020","unstructured":"Hafid, A., Hafid, A.S., Samih, M.: Scaling blockchains: a comprehensive survey. IEEE Access 8, 125244\u2013125262 (2020)","journal-title":"IEEE Access"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Hong, Z., Guo, S., Li, P., Chen, W.: Pyramid: a layered sharding blockchain system. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488747"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"4291","DOI":"10.1109\/JIOT.2020.3028449","volume":"8","author":"C Huang","year":"2020","unstructured":"Huang, C., et al.: Repchain: a reputation based secure, fast and high incentive blockchain system via sharding. IEEE Internet Things J. 8, 4291\u20134304 (2020)","journal-title":"IEEE Internet Things J."},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-030-51280-4_28","volume-title":"Financial Cryptography and Data Security","author":"K Karantias","year":"2020","unstructured":"Karantias, K., Kiayias, A., Zindros, D.: Proof-of-burn. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 523\u2013540. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_28"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"12_CR17","unstructured":"Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 279\u2013296 (2016)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: OmniLedger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583\u2013598. IEEE (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"12_CR19","unstructured":"Kwon, J., Buchman, E.: Cosmos whitepaper (2019)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Kwon, Y., Liu, J., Kim, M., Song, D., Kim, Y.: Impossibility of full decentralization in permissionless blockchains. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 110\u2013123 (2019)","DOI":"10.1145\/3318041.3355463"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 17\u201330 (2016)","DOI":"10.1145\/2976749.2978389"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Manuskin, A., Mirkin, M., Eyal, I.: Ostraka: secure blockchain scaling by node sharding. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 397\u2013406. IEEE (2020)","DOI":"10.1109\/EuroSPW51379.2020.00060"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Miller, A.: Permissioned and permissionless blockchains. In: Blockchain for Distributed Systems Security, pp. 193\u2013204. Wiley, Hoboken (2019)","DOI":"10.1002\/9781119519621.ch9"},{"key":"12_CR24","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. 21260 (2008)"},{"key":"12_CR25","unstructured":"Pass, R., Shi, E.: Hybrid consensus: efficient consensus in the permissionless model. In: 31st International Symposium on Distributed Computing (DISC 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2017)"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Ratta, P., Kaur, A., Sharma, S., Shabaz, M., Dhiman, G.: Application of blockchain and internet of things in healthcare and medical sector: applications, challenges, and future perspectives. J. Food Qual. 2021 (2021)","DOI":"10.1155\/2021\/7608296"},{"issue":"7","key":"12_CR27","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1016\/j.joule.2019.05.012","volume":"3","author":"C Stoll","year":"2019","unstructured":"Stoll, C., Klaa\u00dfen, L., Gallersd\u00f6rfer, U.: The carbon footprint of bitcoin. Joule 3(7), 1647\u20131661 (2019)","journal-title":"Joule"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Team, Z., et al.: The ZILLIQA technical whitepaper. Retrieved September 16, 2019 (2017)","DOI":"10.2139\/ssrn.3442330"},{"key":"12_CR29","unstructured":"Wang, J., Wang, H.: Monoxide: scale out blockchains with asynchronous consensus zones. In: 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2019), pp. 95\u2013112 (2019)"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"14155","DOI":"10.1109\/ACCESS.2020.2965147","volume":"8","author":"G Yu","year":"2020","unstructured":"Yu, G., Wang, X., Yu, K., Ni, W., Zhang, J.A., Liu, R.P.: Survey: sharding in blockchains. IEEE Access 8, 14155\u201314181 (2020)","journal-title":"IEEE Access"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Zamani, M., Movahedi, M., Raykova, M.: RapidChain: scaling blockchain via full sharding. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 931\u2013948 (2018)","DOI":"10.1145\/3243734.3243853"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, J., Hong, Z., Qiu, X., Zhan, Y., Guo, S., Chen, W.: SkyChain: a deep reinforcement learning-empowered dynamic blockchain sharding system. In: 49th International Conference on Parallel Processing-ICPP, pp. 1\u201311 (2020)","DOI":"10.1145\/3404397.3404460"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25734-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T16:05:08Z","timestamp":1677168308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25734-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031257339","9783031257346"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25734-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CBT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cryptocurrencies and Blockchain Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cbt2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/deic.uab.cat\/cbt\/cbt2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}