{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:46:44Z","timestamp":1742402804143,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s00446-023-00449-x","type":"journal-article","created":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T00:02:09Z","timestamp":1684454529000},"page":"349-371","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Permissionless and asynchronous asset transfer"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1148-1228","authenticated-orcid":false,"given":"Petr","family":"Kuznetsov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0837-7948","authenticated-orcid":false,"given":"Yvonne-Anne","family":"Pignolet","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6183-1332","authenticated-orcid":false,"given":"Pavel","family":"Ponomarev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8764-8760","authenticated-orcid":false,"given":"Andrei","family":"Tonkikh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,18]]},"reference":[{"key":"449_CR1","doi-asserted-by":"publisher","first-page":"104869","DOI":"10.1016\/j.ic.2022.104869","volume":"285","author":"H Attiya","year":"2022","unstructured":"Attiya, H., Kumari, S., Somani, A., Welch, J.L.: Store-collect in the presence of continuous churn with application to snapshots and lattice agreement. Inf. Comput. 285, 104869 (2022)","journal-title":"Inf. Comput."},{"key":"449_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Annual International Cryptology Conference, pp. 431\u2013448, Berlin, Springer (1999)","DOI":"10.1007\/3-540-48405-1_28"},{"key":"449_CR3","doi-asserted-by":"crossref","unstructured":"Bentov, I., Gabizon, A., Mizrahi, A.: Cryptocurrencies without proof of work. In: Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers, pp. 142\u2013157, Berlin. Springer (2016)","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"449_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3","volume-title":"Introduction to Reliable and Secure Distributed Programming","author":"C Cachin","year":"2011","unstructured":"Cachin, C., Guerraoui, R., Rodrigues, L.: Introduction to Reliable and Secure Distributed Programming, 2nd edn. Springer Publishing Company, Incorporated, Berlin (2011)","edition":"2"},{"key":"449_CR5","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.tcs.2019.02.001","volume":"777","author":"J Chen","year":"2019","unstructured":"Chen, J., Micali, S.: Algorand: a secure and efficient distributed ledger. Theor. Comput. Sci. 777, 155\u2013183 (2019)","journal-title":"Theor. Comput. Sci."},{"key":"449_CR6","unstructured":"CoinMarketCap. Cryptocurrency prices, charts and market capitalizations. https:\/\/coinmarketcap.com\/ (2021). Accessed 05 Feb 2021"},{"key":"449_CR7","doi-asserted-by":"crossref","unstructured":"Collins, D., Guerraoui, R., Komatovic, J., Kuznetsov, P., Monti, M., Pavlovic, M., Pignolet, Y.A., Seredinschi, D.-A., Tonkikh, A., Xygkis, A.: Online payments by merely broadcasting messages. In: 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2020, Valencia, Spain, June 29 - July 2, 2020, pp. 26\u201338. IEEE (2020)","DOI":"10.1109\/DSN48063.2020.00023"},{"key":"449_CR8","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers, pp. 251\u2013260, Heidelberg, Springer (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"449_CR9","unstructured":"Drijvers, M., Gorbunov, S., Neven, G., Wee, H.: Pixel: multi-signatures for consensus. In: 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, August 2020. USENIX Association. URL: https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/drijvers (2020)"},{"key":"449_CR10","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Faust, S., Kolmogorov, V., Pietrzak, K.: Proofs of space. In: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, pp. 585\u2013605 (2015)","DOI":"10.1007\/978-3-662-48000-7_29"},{"key":"449_CR11","doi-asserted-by":"crossref","unstructured":"Falerio, J.M., Rajamani, S.K., Rajan, K., Ramalingam, G., Vaswani, K.: Generalized lattice agreement. In: Darek, K., and Alessandro, P. (eds.) ACM Symposium on Principles of Distributed Computing, PODC \u201912, Funchal, Madeira, Portugal, July 16-18, 2012, pp. 125\u2013134. ACM (2012)","DOI":"10.1145\/2332432.2332458"},{"issue":"2","key":"449_CR12","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"MJ Fischer","year":"1985","unstructured":"Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. JACM 32(2), 374\u2013382 (1985)","journal-title":"JACM"},{"key":"449_CR13","doi-asserted-by":"crossref","unstructured":"Gifford, D.K.: Weighted voting for replicated data. In: SOSP, pp. 150\u2013162 (1979)","DOI":"10.1145\/800215.806583"},{"key":"449_CR14","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51\u201368 (2017)","DOI":"10.1145\/3132747.3132757"},{"key":"449_CR15","unstructured":"Guerraoui, R., Komatovic, J., Kuznetsov, P., Yvonne, A.P., Dragos-Adrian, S., Andrei, T.: Dynamic Byzantine reliable broadcast. In: OPODIS (2020)"},{"key":"449_CR16","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., Kuznetsov, P., Monti, M., Pavlovic, M., Seredinschi, D.-A.: The consensus number of a cryptocurrency. In: PODC. https:\/\/arxiv.org\/abs\/1906.05574 (2019)","DOI":"10.1145\/3293611.3331589"},{"key":"449_CR17","unstructured":"Gupta, S.: A Non-Consensus Based Decentralized Financial Transaction Processing Model with Support for Efficient Auditing. Master\u2019s thesis, Arizona State University, USA (2016)"},{"issue":"5","key":"449_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1317379.1317381","volume":"41","author":"A-M Kermarrec","year":"2007","unstructured":"Kermarrec, A.-M., van Steen, M.: Gossiping in distributed systems. SIGOPS Oper. Syst. Rev. 41(5), 2\u20137 (2007). https:\/\/doi.org\/10.1145\/1317379.1317381","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"449_CR19","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I, pp. 357\u2013388 (2017)","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"449_CR20","unstructured":"Kumar, S., Welch, J.L.: Byzantine-tolerant register in a system with continuous churn. CoRR, abs\/1910.06716 (2019). http:\/\/arxiv.org\/abs\/1910.06716"},{"key":"449_CR21","unstructured":"Kuznetsov, P., Rieutord, T., Tucci, P.S.: Reconfigurable lattice agreement and applications. In: Pascal, F., Roy, F., Seth, G., Avery, M. (eds.) 23rd International Conference on Principles of Distributed Systems, OPODIS 2019, December 17-19, 2019, Neuch\u00e2tel, Switzerland, volume 153 of LIPIcs, pp. 31:1\u201331:17 (2019)"},{"key":"449_CR22","doi-asserted-by":"crossref","unstructured":"Kuznetsov, P., Tonkikh, A.: Asynchronous reconfiguration with byzantine failures. Distrib. Comput. 35(6), 477\u2013502 (2022)","DOI":"10.1007\/s00446-022-00421-1"},{"key":"449_CR23","unstructured":"Di Antonio, L., Giuseppe, A., Emmanuelle, Q.L.: Byzantine generalized lattice agreement. In: 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, May 18-22, 2020, pp. 674\u2013683. IEEE (2020)"},{"issue":"4","key":"449_CR24","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s004460050050","volume":"11","author":"D Malkhi","year":"1998","unstructured":"Malkhi, D., Reiter, M.: Byzantine quorum systems. Distrib. Comput. 11(4), 203\u2013213 (1998)","journal-title":"Distrib. Comput."},{"key":"449_CR25","doi-asserted-by":"crossref","unstructured":"Malkin, T., Micciancio, D., Miner, S.: Efficient generic forward-secure signatures with an unbounded number of time periods. In: Advances in Cryptology-Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pp. 400\u2013417, Amsterdam, The Netherlands, April 28\u2013May 2 2002. IACR, Springer-Verlag (2002)","DOI":"10.1007\/3-540-46035-7_27"},{"key":"449_CR26","unstructured":"Moran, T., Orlov, I.: Proofs of space-time and rational proofs of storage. IACR Cryptol. ePrint Arch. 2016, 35 (2016)"},{"key":"449_CR27","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"449_CR28","doi-asserted-by":"crossref","unstructured":"Rabin, M.O.: Randomized byzantine generals. In: 24th Annual Symposium on Foundations of Computer Science (sfcs 1983), pp. 403\u2013409. IEEE (1983)","DOI":"10.1109\/SFCS.1983.48"},{"key":"449_CR29","doi-asserted-by":"crossref","unstructured":"Shapiro, M., Pregui\u00e7a, N.M., Baquero, C., Zawirski, M.: Conflict-free replicated data types. In: SSS, pp. 386\u2013400 (2011)","DOI":"10.1007\/978-3-642-24550-3_29"},{"key":"449_CR30","unstructured":"Sliwinski, J., Wattenhofer, R.: ABC: asynchronous blockchain without consensus. CoRR, abs\/1909.10926, 2019. arXiv:1909.10926"},{"key":"449_CR31","unstructured":"Spiegelman, A., Keidar, I., Malkhi, D.: Dynamic reconfiguration: abstraction and optimal asynchronous solution. In: DISC, pp. 40:1\u201340:15 (2017)"},{"key":"449_CR32","unstructured":"Paul, W., Ryan, C., Tentodev, A.S., Sam, R.: Ethereum proof-of-stake (pos). https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pos\/ (2008). Accessed 15 Feb 2021"},{"key":"449_CR33","unstructured":"Gavin, W.E.: A secure decentralized generalized transaction ledger. White paper (2015)"},{"key":"449_CR34","unstructured":"Zheng, X., Garg, V.K.: Byzantine lattice agreement in asynchronous systems. In: OPODIS, pp. 4:1\u20134:16 (2020)"}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-023-00449-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00446-023-00449-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-023-00449-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T18:03:33Z","timestamp":1690826613000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00446-023-00449-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,18]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["449"],"URL":"https:\/\/doi.org\/10.1007\/s00446-023-00449-x","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"type":"print","value":"0178-2770"},{"type":"electronic","value":"1432-0452"}],"subject":[],"published":{"date-parts":[[2023,5,18]]},"assertion":[{"value":"21 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}