{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:40:09Z","timestamp":1744206009109,"version":"3.40.3"},"publisher-location":"Cham","reference-count":103,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031875403","type":"print"},{"value":"9783031875410","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87541-0_3","type":"book-chapter","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:59:33Z","timestamp":1744203573000},"page":"31-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vision Paper: Do We Need Standardization of\u00a0Blockchain Consensus?"],"prefix":"10.1007","author":[{"given":"Zhaoxin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Mingfei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rujia","family":"Li","sequence":"additional","affiliation":[]},{"given":"Sisi","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"3_CR1","unstructured":"Abraham, I., Malkhi, D., et\u00a0al.: The blockchain consensus layer and BFT. Bull. EATCS 3(123) (2017)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et\u00a0al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, p.\u00a030. ACM (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"3_CR3","unstructured":"Aptos. https:\/\/aptosfoundation.org\/"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: STOC, pp. 52\u201361. ACM (1993)","DOI":"10.1145\/167088.167109"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience. In: Proceedings of the 13th Annual Symposium on Principles of Distributed Computing, pp. 183\u2013192. ACM (1994)","DOI":"10.1145\/197917.198088"},{"key":"3_CR6","unstructured":"Bentov, I., Pass, R., Shi, E.: Snow white: provably secure proofs of stake. In: FC (2019)"},{"key":"3_CR7","unstructured":"Binance: BNB chain documentation (2024). https:\/\/docs.bnbchain.org\/"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Bracha, G.: An asynchronous [(n-1)\/3]-resilient consensus protocol. In: Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, pp. 154\u2013162. ACM (1984)","DOI":"10.1145\/800222.806743"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/0890-5401(87)90054-X","volume":"75","author":"G Bracha","year":"1987","unstructured":"Bracha, G.: Asynchronous byzantine agreement protocols. Inf. Comput. 75(2), 130\u2013143 (1987)","journal-title":"Inf. Comput."},{"key":"3_CR10","unstructured":"Buchman, E.: Tendermint: byzantine fault tolerance in the age of blockchains (2017)"},{"key":"3_CR11","unstructured":"Buterin, V., et al.: Combining ghost and Casper. arXiv preprint arXiv:2003.03052 (2020)"},{"key":"3_CR12","unstructured":"Buterin, V., et al.: Ethereum white paper. GitHub Repository 1, 22\u201323 (2013)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Cachin, C., Guerraoui, R., Rodrigues, L.: Introduction to Reliable and Secure Distributed Programming. Springer Science & Business Media (2011)","DOI":"10.1007\/978-3-642-15260-3"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Cachin, C., Kursawe, K., Petzold, F., Shoup, V.: Secure and efficient asynchronous broadcast protocols. In: Annual International Cryptology Conference, pp. 524\u2013541. Springer (2001)","DOI":"10.1007\/3-540-44647-8_31"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Cachin, C., Vukolic, M.: Blockchain consensus protocols in the wild. In: DISC (2017)","DOI":"10.1109\/EDCC.2017.36"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Canetti, R., Rabin, T.: Fast asynchronous byzantine agreement with optimal resilience. In: STOC, vol.\u00a093, pp. 42\u201351. Citeseer (1993)","DOI":"10.1145\/167088.167105"},{"key":"3_CR17","unstructured":"Cardano (2024). https:\/\/cardano.org\/"},{"issue":"4","key":"3_CR18","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM TOCS 20(4), 398\u2013461 (2002)","journal-title":"ACM TOCS"},{"key":"3_CR19","unstructured":"Chia (2024). https:\/\/www.chia.net\/"},{"issue":"3","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3427097","volume":"1","author":"J Clavin","year":"2020","unstructured":"Clavin, J., et al.: Blockchains for government: use cases and challenges. Digital Gov. Res. Pract. 1(3), 1\u201321 (2020)","journal-title":"Digital Gov. Res. Pract."},{"key":"3_CR21","unstructured":"Cosmos network. https:\/\/cosmos.network\/"},{"issue":"1","key":"3_CR22","first-page":"24:1","volume":"54","author":"T Distler","year":"2021","unstructured":"Distler, T.: Byzantine fault-tolerant state-machine replication from a systems perspective. ACM Comput. Surv. 54(1), 24:1-24:38 (2021)","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"3_CR23","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/JAS.2023.123642","volume":"10","author":"L Duan","year":"2023","unstructured":"Duan, L., Sun, Y., Ni, W., Ding, W., Liu, J., Wang, W.: Attacks against cross-chain systems and defense approaches: a contemporary survey. IEEE\/CAA J. Automatica Sinica 10(8), 1647\u20131667 (2023)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Duan, S., Meling, H., Peisert, S., Zhang, H.: BChain: byzantine replication with high throughput and embedded reconfiguration. In: OPODIS, pp. 91\u2013106 (2014)","DOI":"10.1007\/978-3-319-14472-6_7"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Duan, S., Reiter, M.K., Zhang, H.: Beat: asynchronous BFT made practical. In: CCS, pp. 2028\u20132041. ACM (2018)","DOI":"10.1145\/3243734.3243812"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Duan, S., Wang, X., Zhang, H.: Practical signature-free asynchronous common subset in constant time. In: CCS (2023)","DOI":"10.1145\/3576915.3616633"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Duan, S., Zhang, H.: Foundations of dynamic BFT. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1317\u20131334 (2022)","DOI":"10.1109\/SP46214.2022.9833787"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Duan, S., et al.: Dashing and star: byzantine fault tolerance from weak certificates. In: Eurosys (2024)","DOI":"10.1145\/3627703.3650073"},{"issue":"2","key":"3_CR29","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1145\/42282.42283","volume":"32","author":"C Dwork","year":"1988","unstructured":"Dwork, C., Lynch, N., Stockmeyer, L.: Consensus in the presence of partial synchrony. J. ACM 32(2), 288\u2013323 (1988)","journal-title":"J. ACM"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Ekparinya, P., Gramoli, V., Jourjon, G.: The attack of the clones against proof-of-authority. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.24082"},{"key":"3_CR31","unstructured":"Eos (2024). https:\/\/eosnetwork.com\/"},{"key":"3_CR32","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., Van\u00a0Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: NSDI, pp. 45\u201359 (2016)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM (2018)","DOI":"10.1145\/3212998"},{"key":"3_CR34","unstructured":"Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process, Technical report, Massachusetts Institute of Technology Cambridge Lab for Computer Science (1982)"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Gao, Y., Lu, Y., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Dumbo-NG: fast asynchronous BFT consensus with throughput-oblivious latency. In: CCS (2022)","DOI":"10.1145\/3548606.3559379"},{"issue":"4","key":"3_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3653445","volume":"71","author":"J Garay","year":"2024","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. J. ACM 71(4), 1\u201349 (2024)","journal-title":"J. ACM"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT, vol. 9057, pp. 281\u2013310. Springer (2015)","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Gelashvili, R., Kokoris-Kogias, L., Sonnino, A., Spiegelman, A., Xiang, Z.: Jolteon and Ditto: network-adaptive efficient consensus with asynchronous fallback. In: FC, pp. 296\u2013315 (2022)","DOI":"10.1007\/978-3-031-18283-9_14"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51\u201368. ACM (2017)","DOI":"10.1145\/3132747.3132757"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Giridharan, N., Suri-Payer, F., Abraham, I., Alvisi, L., Crooks, N.: Autobah : seamless high speed BFT. In: SOSP (2024)","DOI":"10.1145\/3694715.3695942"},{"issue":"3","key":"3_CR41","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOMSTD.2018.1800022","volume":"2","author":"V Gramoli","year":"2018","unstructured":"Gramoli, V., Staples, M.: Blockchain standard: can we reach consensus? IEEE Commun. Stan. Mag. 2(3), 16\u201321 (2018)","journal-title":"IEEE Commun. Stan. Mag."},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: Layertwo blockchain protocols. In: Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10\u201314, 2020 Revised Selected Papers 24, pp. 201\u2013226. Springer (2020)","DOI":"10.1007\/978-3-030-51280-4_12"},{"issue":"4","key":"3_CR43","first-page":"12:1","volume":"32","author":"R Guerraoui","year":"2015","unstructured":"Guerraoui, R., Kne\u017eevi\u0107, N., Qu\u00e9ma, V., Vukoli\u0107, M.: The next 700 BFT protocols. ACM Trans. Comput. Syst. 32(4), 12:1-12:45 (2015)","journal-title":"ACM Trans. Comput. Syst."},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Guo, B., Lu, Y., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Speeding Dumbo: pushing asynchronous BFT closer to practice. NDSS (2022)","DOI":"10.14722\/ndss.2022.24385"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Guo, B., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Dumbo: faster asynchronous BFT protocols. In: CCS (2020)","DOI":"10.1145\/3372297.3417262"},{"key":"3_CR46","unstructured":"IEEE blockchain technical community (2024). https:\/\/blockchain.ieee.org\/"},{"key":"3_CR47","unstructured":"Introduction to ITU (2024). https:\/\/www.itu.int\/en\/Pages\/default.aspx"},{"key":"3_CR48","unstructured":"Technical committee ISO\/TC 307 blockchain and distributed ledger technologies (2024). https:\/\/www.iso.org\/committee\/6266604.html"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Jalalzai, M.M., Niu, J., Feng, C., Gai, F.: Fast-hotstuff: a fast and robust BFT protocol for blockchains. IEEE Trans. Dependable Sec. Comput. (2023)","DOI":"10.1109\/TDSC.2023.3308848"},{"issue":"2","key":"3_CR50","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.32604\/cmes.2023.026357","volume":"137","author":"X Jia","year":"2023","unstructured":"Jia, X., Xu, J., Han, M., Zhang, Q., Zhang, L., Chen, X.: International standardization of blockchain and distributed ledger technology: overlaps, gaps and challenges. CMES-Comput. Modeling Eng. Sci. 137(2), 1491\u20131523 (2023)","journal-title":"CMES-Comput. Modeling Eng. Sci."},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Junqueira, F.P., Reed, B.C., Serafini, M.: Zab: high-performance broadcast for primary-backup systems. In: DSN, pp. 245\u2013256. IEEE (2011)","DOI":"10.1109\/DSN.2011.5958223"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Keidar, I., Kokoris-Kogias, E., Naor, O., Spiegelman, A.: All you need is DAG. In: PODC, pp. 165\u2013175. ACM (2021)","DOI":"10.1145\/3465084.3467905"},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Annual International Cryptology Conference, pp. 357\u2013388 (2017)","DOI":"10.1007\/978-3-319-63688-7_12"},{"issue":"3","key":"3_CR54","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM TOPLAS 4(3), 382\u2013401 (1982)","journal-title":"ACM TOPLAS"},{"key":"3_CR55","doi-asserted-by":"crossref","unstructured":"Li, H., et al.: FISCO-BCOS: an enterprise-grade permissioned blockchain system with high-performance. In: SC, pp. 1\u201317 (2023)","DOI":"10.1145\/3581784.3607053"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Li, R., Wang, Q., Wang, Q., Galindo, D., Ryan, M.: Sok: tee-assisted confidential smart contract. In: Proceedings on Privacy Enhancing Technologies (2022)","DOI":"10.56553\/popets-2022-0093"},{"key":"3_CR57","unstructured":"Litecoin (2024). https:\/\/litecoin.org\/"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Liu, C., Duan, S., Zhang, H.: Epic: efficient asynchronous BFT with adaptive security. In: DSN (2020)","DOI":"10.1109\/DSN48063.2020.00058"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Momose, A., Ren, L.: Towards practical sleepy BFT. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 490\u2013503 (2023)","DOI":"10.1145\/3576915.3623073"},{"key":"3_CR60","unstructured":"Malkhi, D., Nayak, K.: Hotstuff-2: optimal two-phase responsive BFT. Cryptology ePrint Archive (2023)"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Meng, X., et al.: Rondo: Scalable and reconfiguration-friendly randomness beacon. In: NDSS (2025)","DOI":"10.14722\/ndss.2025.230549"},{"key":"3_CR62","doi-asserted-by":"crossref","unstructured":"Miller, A.: Permissioned and permissionless blockchains. In: Blockchain for Distributed Systems Security, pp. 193\u2013204 (2019)","DOI":"10.1002\/9781119519621.ch9"},{"key":"3_CR63","doi-asserted-by":"crossref","unstructured":"Miller, A., Xia, Y., Croman, K., Shi, E., Song, D.: The honey badger of BFT protocols. In: ACM CCS, pp. 31\u201342 (2016)","DOI":"10.1145\/2976749.2978399"},{"key":"3_CR64","unstructured":"Mirkin, M., Zhou, L., Eyal, I., Zhang, F.: Sprints: intermittent blockchain PoW mining. In: 33rd USENIX Security Symposium (USENIX Security 24) (2024)"},{"key":"3_CR65","doi-asserted-by":"crossref","unstructured":"Momose, A., Ren, L.: Constant latency in sleepy consensus. In: CCS, pp. 2295\u20132308 (2022)","DOI":"10.1145\/3548606.3559347"},{"key":"3_CR66","unstructured":"Monero (2024). https:\/\/www.dash.org\/"},{"key":"3_CR67","doi-asserted-by":"crossref","unstructured":"Mostefaoui, A., Moumen, H., Raynal, M.: Signature-free asynchronous Byzantine consensus with $$t \\le n\/3$$ and $$o(n^2)$$ messages. In: PODC, pp.\u00a02\u20139. ACM (2014)","DOI":"10.1145\/2611462.2611468"},{"key":"3_CR68","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"3_CR69","doi-asserted-by":"crossref","unstructured":"Neu, J., Tas, E.N., Tse, D.: Ebb-and-flow protocols: a resolution of the availability-finality dilemma. In: SP (2021)","DOI":"10.1109\/SP40001.2021.00045"},{"key":"3_CR70","doi-asserted-by":"crossref","unstructured":"Neu, J., Tas, E.N., Tse, D.: Two more attacks on proof-of-stake ghost\/ethereum. In: ConsensusDay, pp. 43\u201352 (2022)","DOI":"10.1145\/3560829.3563560"},{"key":"3_CR71","unstructured":"Neuder, M., Moroz, D.J., Rao, R., Parkes, D.C.: Low-cost attacks on Ethereum 2.0 by sub-1\/3 stakeholders. arXiv preprint arXiv:2102.02247 (2021)"},{"key":"3_CR72","unstructured":"Ongaro, D., Ousterhout, J.: In search of an understandable consensus algorithm. In: USENIX ATC, pp. 305\u2013319 (2014)"},{"key":"3_CR73","doi-asserted-by":"crossref","unstructured":"Pass, R., Shi, E.: The sleepy model of consensus. In: Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), pp. 380\u2013409. Springer (2017)","DOI":"10.1007\/978-3-319-70697-9_14"},{"key":"3_CR74","unstructured":"peercoin (2024). https:\/\/www.peercoin.net\/"},{"key":"3_CR75","unstructured":"Ponomarev, E.: DAPP developers survey results (2024). https:\/\/hackernoon.com\/dapp-developers-survey-results-1c763901e756"},{"key":"3_CR76","unstructured":"Ponomarev, E.: Dapp survey results 2019 (2024). https:\/\/medium.com\/fluence-network\/dapp-survey-results-2019-a04373db6452"},{"key":"3_CR77","unstructured":"Project mbridge. https:\/\/www.bis.org\/about\/bisih\/topics\/cbdc\/mcbdc_bridge.htm"},{"key":"3_CR78","unstructured":"Itu publications : Standardization (itu-t) (2024). https:\/\/www.itu.int\/en\/Pages\/default.aspx"},{"key":"3_CR79","unstructured":"Notice on the release of the first batch of national standards for cybersecurity in 2023 (2024). https:\/\/www.tc260.org.cn\/front\/postDetail.html?id=20230413185511"},{"key":"3_CR80","doi-asserted-by":"crossref","unstructured":"Schwarz-Schilling, C., Neu, J., Monnot, B., Asgaonkar, A., Tas, E.N., Tse, D.: Three attacks on proof-of-stake Ethereum. In: FC, pp. 560\u2013576 (2022)","DOI":"10.1007\/978-3-031-18283-9_28"},{"key":"3_CR81","unstructured":"Scrypt POW (2024). https:\/\/github.com\/litecoin-project\/litecoin\/blob\/master\/src\/crypto\/scrypt.cpp"},{"issue":"1","key":"3_CR82","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSEC.2019.2893730","volume":"17","author":"AT Sherman","year":"2019","unstructured":"Sherman, A.T., Javani, F., Zhang, H., Golaszewski, E.: On the origins and variations of blockchain technologies. IEEE Sec. Privacy 17(1), 72\u201377 (2019)","journal-title":"IEEE Sec. Privacy"},{"key":"3_CR83","unstructured":"SlowMist: The analysis of etc 51 (2024). https:\/\/slowmist.medium.com\/the-analysis-of-etc-51-attack-from-slowmist-team-728596d76ead"},{"key":"3_CR84","unstructured":"Standardization Administration of the People\u2019s Republic of China: Information security technology - specifications for Blockchain security framework, Technical report, GB\/T 42570-2023 (2023)"},{"key":"3_CR85","unstructured":"Standards by IEEE blockchain (2024). https:\/\/blockchain.ieee.org\/standards"},{"key":"3_CR86","doi-asserted-by":"crossref","unstructured":"Sui, X., Duan, S., Zhang, H.: Marlin: two-phase BFT with linearity. DSN (2022)","DOI":"10.1109\/DSN53405.2022.00018"},{"key":"3_CR87","unstructured":"TESTNET Sepolia (ETH) blockchain explorer. https:\/\/sepolia.etherscan.io\/"},{"key":"3_CR88","unstructured":"The merge (2024). https:\/\/ethereum.org\/en\/roadmap\/merge\/"},{"key":"3_CR89","unstructured":"Tron (2024). https:\/\/tron.network\/"},{"key":"3_CR90","unstructured":"Vechain: Vechain: Web3 for better (2024). https:\/\/vechain.org\/"},{"key":"3_CR91","unstructured":"Wang, Q., Li, R., Wang, Q., Chen, S.: Non-fungible token (NFT): overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447 (2021)"},{"key":"3_CR92","doi-asserted-by":"crossref","unstructured":"Wang, X., Duan, S., Clavin, J., Zhang, H.: BFT in blockchains: from protocols to use cases. ACM Comput. Surv. (2022)","DOI":"10.1145\/3503042"},{"key":"3_CR93","doi-asserted-by":"crossref","unstructured":"Werner, S., Perez, D., Gudgeon, L., Klages-Mundt, A., Harz, D., Knottenbelt, W.: Sok: decentralized finance (DeFi). In: Proceedings of the 4th ACM Conference on Advances in Financial Technologies, pp. 30\u201346 (2022)","DOI":"10.1145\/3558535.3559780"},{"key":"3_CR94","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151 (2014)"},{"key":"3_CR95","unstructured":"Wood, G.: PoA private chains (2015). https:\/\/github.com\/ethereum\/guide\/blob\/master\/poa.md"},{"key":"3_CR96","unstructured":"Wu, K., Ma, Y., Huang, G., Liu, X.: A first look at blockchain-based decentralized applications. Softw. Pract. Exp. (2021)"},{"issue":"11","key":"3_CR97","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3570639","volume":"55","author":"J Xu","year":"2023","unstructured":"Xu, J., Paruch, K., Cousaert, S., Feng, Y.: Sok: decentralized exchanges (DEX) with automated market maker (AMM) protocols. ACM Comput. Surv. 55(11), 1\u201350 (2023)","journal-title":"ACM Comput. Surv."},{"key":"3_CR98","doi-asserted-by":"crossref","unstructured":"Yin, M., Malkhi, D., Reiter, M.K., Gueta, G.G., Abraham, I.: Hotstuff: BFT consensus with linearity and responsiveness. In: PODC (2019)","DOI":"10.1145\/3293611.3331591"},{"key":"3_CR99","doi-asserted-by":"crossref","unstructured":"Zhang, H., Duan, S.: Pace: fully parallelizable BFT from reproposable byzantine agreement. In: CCS (2022)","DOI":"10.1145\/3548606.3559348"},{"key":"3_CR100","unstructured":"Zhang, M., Li, R., Duan, S.: Max attestation matters: making honest parties lose their incentives in Ethereum POS. In: USENIX Security (2024)"},{"key":"3_CR101","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, R., Wang, Q., Wang, Q., Duan, S.: Time-manipulation attack: breaking fairness against proof of authority aura. In: Proceedings of the ACM Web Conference 2023, pp. 2076\u20132086 (2023)","DOI":"10.1145\/3543507.3583252"},{"key":"3_CR102","doi-asserted-by":"crossref","unstructured":"Zhao, Q., et al.: A comprehensive overview of security vulnerability penetration methods in blockchain cross-chain bridges. Authorea Preprints (2023)","DOI":"10.22541\/au.169760541.13864334\/v1"},{"key":"3_CR103","doi-asserted-by":"crossref","unstructured":"Zheng, P., Jiang, Z., Wu, J., Zheng, Z.: Blockchain-based decentralized application: a survey. IEEE Open J. Comput. Soc. (2023)","DOI":"10.1109\/OJCS.2023.3251854"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87541-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:01:05Z","timestamp":1744203665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87541-0_3"}},"subtitle":["Progress and Challenges to Standardizing Blockchain Consensus"],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031875403","9783031875410"],"references-count":103,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87541-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssresearch24.github.io\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}