{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:14:15Z","timestamp":1743142455454,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_26","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"439-459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hydra: An Efficient Asynchronous DAG-Based BFT Protocol"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8795-2471","authenticated-orcid":false,"given":"Zhuo","family":"An","sequence":"first","affiliation":[]},{"given":"Mingsheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dongdong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Taotao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"26_CR1","unstructured":"Baird, L.: The swirlds hashgraph consensus algorithm: fair, fast, Byzantine fault tolerance (2016)"},{"key":"26_CR2","doi-asserted-by":"publisher","unstructured":"Bracha, G.: Asynchronous Byzantine agreement protocols. Inf. Comput. 75(2), 130\u2013143 (1987). https:\/\/doi.org\/10.1016\/0890-5401(87)90054-X. https:\/\/www.sciencedirect.com\/science\/article\/pii\/089054018790054X","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"26_CR3","unstructured":"Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White Paper 3(37), 2\u20131 (2014)"},{"key":"26_CR4","unstructured":"Castro, M.: Practical Byzantine fault tolerance. In: USENIX Symposium on Operating Systems Design and Implementation (1999)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Cristian, F., Aghili, H., Strong, H.R., Dolev, D.: Atomic broadcast: from simple message diffusion to Byzantine agreement. In: Twenty-Fifth International Symposium on Fault-Tolerant Computing, \u2018Highlights from Twenty-Five Years\u2019, p. 431 (1995)","DOI":"10.1006\/inco.1995.1060"},{"key":"26_CR6","unstructured":"Danezis, G., Kogias, E.K., Sonnino, A., Spiegelman, A.: Narwhal and tusk: a DAG-based mempool and efficient BFT consensus. https:\/\/arxiv.org\/abs\/2105.11827"},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Duan, S., Reiter, M.K., Zhang, H.: Beat: asynchronous BFT made practical. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2028\u20132041. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243812","DOI":"10.1145\/3243734.3243812"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Gao, Y., Lu, Y., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Dumbo-NG: fast asynchronous BFT consensus with throughput-oblivious latency (2022). https:\/\/arxiv.org\/abs\/2209.00750","DOI":"10.1145\/3548606.3559379"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"G\u0105gol, A., Le\u015bniak, D., Straszak, D., \u015awi\u0229tek, M.: Aleph: efficient atomic broadcast in asynchronous networks with Byzantine nodes (2019). https:\/\/arxiv.org\/abs\/1908.05156","DOI":"10.1145\/3318041.3355467"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Guo, B., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Dumbo: faster asynchronous BFT protocols. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 803\u2013818 (2020)","DOI":"10.1145\/3372297.3417262"},{"key":"26_CR11","first-page":"5684","volume":"63","author":"V Guruswami","year":"2015","unstructured":"Guruswami, V., Wootters, M.: Repairing Reed-Solomon codes. IEEE Trans. Inf. Theory 63, 5684\u20135698 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"26_CR12","unstructured":"Keidar, I., Kokoris-Kogias, E., Naor, O., Spiegelman, A.: All you need is DAG. https:\/\/arxiv.org\/abs\/2102.08325"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.L.: Zyzzyva: speculative Byzantine fault tolerance. ACM Trans. Comput. Syst. 27, 7:1\u20137:39 (2007)","DOI":"10.1145\/1658357.1658358"},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"key":"26_CR15","unstructured":"Li, C., Li, P., Zhou, D., Xu, W., Long, F., Yao, A.: Scaling Nakamoto consensus to thousands of transactions per second (2018). https:\/\/arxiv.org\/abs\/1805.03870"},{"key":"26_CR16","doi-asserted-by":"publisher","unstructured":"Libert, B., Joye, M., Yung, M.: Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares. In: Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing, pp. 303\u2013312. ACM (2014). https:\/\/doi.org\/10.1145\/2611462.2611498. https:\/\/dl.acm.org\/doi\/10.1145\/2611462.2611498","DOI":"10.1145\/2611462.2611498"},{"key":"26_CR17","doi-asserted-by":"publisher","unstructured":"Miller, A., Xia, Y., Croman, K., Shi, E., Song, D.: The honey badger of BFT protocols. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 31\u201342. ACM (2016). https:\/\/doi.org\/10.1145\/2976749.2978399. https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978399","DOI":"10.1145\/2976749.2978399"},{"key":"26_CR18","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. White Paper (2008)"},{"key":"26_CR19","unstructured":"Sompolinsky, Y., Lewenberg, Y., Zohar, A.: Spectre: a fast and scalable cryptocurrency protocol. https:\/\/eprint.iacr.org\/undefined\/undefined"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: Financial Cryptography (2015)","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"26_CR21","unstructured":"Spiegelman, A., Giridharan, N., Sonnino, A., Kokoris-Kogias, L.: Bullshark: DAG BFT protocols made practical. https:\/\/arxiv.org\/abs\/2201.05677"},{"key":"26_CR22","unstructured":"Stathakopoulou, C., David, T., Pavlovic, M., Vukoli\u0107, M.: Mir-BFT: high-throughput robust BFT for decentralized networks. https:\/\/arxiv.org\/abs\/1906.05552"},{"key":"26_CR23","unstructured":"Yang, L., Park, S.J., Alizadeh, M., Kannan, S., Tse, D.: DispersedLedger: high-throughput Byzantine consensus on variable bandwidth networks. https:\/\/arxiv.org\/abs\/2110.04371"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Yin, M., Malkhi, D., Reiter, M.K., Gueta, G.G., Abraham, I.: Hotstuff: BFT consensus in the lens of blockchain. arXiv, Distributed, Parallel, and Cluster Computing (2018)","DOI":"10.1145\/3293611.3331591"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:06:33Z","timestamp":1700471193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}