{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T23:05:43Z","timestamp":1762556743965,"version":"build-2065373602"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T00:00:00Z","timestamp":1762473600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T00:00:00Z","timestamp":1762473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Joint Key Project of National Natural Science Foundation of China","award":["U2468205"],"award-info":[{"award-number":["U2468205"]}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"crossref","award":["2025JJ50399"],"award-info":[{"award-number":["2025JJ50399"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-08009-9","type":"journal-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T10:36:10Z","timestamp":1762511770000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DX protocol: a high-performance sketch-based set reconciliation protocol for blockchain propagation"],"prefix":"10.1007","volume":"81","author":[{"given":"Xu","family":"Ma","sequence":"first","affiliation":[]},{"given":"Xiangwei","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Ce","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Kuanching","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanrong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Esposito","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,7]]},"reference":[{"issue":"12","key":"8009_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3676164","volume":"56","author":"W Liang","year":"2024","unstructured":"Liang W, Liu Y, Yang C, Xie S (2024) On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: a comprehensive survey. ACM Comput Surv 56(12):1\u201335. https:\/\/doi.org\/10.1145\/3676164","journal-title":"ACM Comput Surv"},{"key":"8009_CR2","unstructured":"Ethereum white paper (2020)"},{"key":"8009_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3364370","author":"W Liang","year":"2024","unstructured":"Liang W, Xie S, Li K-C, Li X, Kui X, Zomaya AY (2024) Mc-dsc: a dynamic secure resource configuration scheme based on medical consortium blockchain. IEEE Trans Inf Forensics Secur. https:\/\/doi.org\/10.1109\/TIFS.2024.3364370","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"8009_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-025-07317-4","volume":"81","author":"N Xu","year":"2025","unstructured":"Xu N, Chen Y, Liang W (2025) N-lock: a transaction-released shard reconfigura- tion protocol with zero-knowledge proof. The J Supercomp 81(7):1\u201332","journal-title":"The J Supercomp"},{"key":"8009_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3379363","author":"S Zhou","year":"2024","unstructured":"Zhou S, Li K, Chen Y, Yang C, Liang W, Zomaya AY (2024) Trustbcfl: Mitigat- ing data bias in iot through blockchain-enabled federated learning. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2024.3379363","journal-title":"IEEE Internet Things J"},{"key":"8009_CR6","doi-asserted-by":"publisher","first-page":"21838","DOI":"10.1109\/JIOT.2022.3181609","volume":"9","author":"X Jia","year":"2022","unstructured":"Jia X, Luo M, Wang H, Shen J, He D (2022) A blockchain-assisted privacy-aware authentication scheme for internet of medical things. IEEE Internet Things J 9:21838\u201321850","journal-title":"IEEE Internet Things J"},{"key":"8009_CR7","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Satoshi Nakamoto"},{"key":"8009_CR8","doi-asserted-by":"crossref","unstructured":"Hao W, Zeng J, Dai X, Xiao J, Hua Q, Chen H, Li KC, Jin H. (2019) Blockp2p: Enabling fast blockchain broadcast with scalable peer-to-peer network topology. Green, Pervasive, and Cloud Computing, 223\u2013237","DOI":"10.1007\/978-3-030-19223-5_16"},{"key":"8009_CR9","doi-asserted-by":"publisher","first-page":"21502","DOI":"10.1109\/JIOT.2023.3296469","volume":"10","author":"J Cai","year":"2023","unstructured":"Cai J, Liang W, Li X, Li K, Gui Z, Khan MK (2023) Gtxchain: a secure iot smart blockchain architecture based on graph neural network. IEEE Internet Things J 10:21502\u201321514. https:\/\/doi.org\/10.1109\/JIOT.2023.3296469","journal-title":"IEEE Internet Things J"},{"key":"8009_CR10","doi-asserted-by":"crossref","unstructured":"Croman K, Decker C, Eyal I, Gencer AE, Juels A, Kosba A, Miller A, Saxena P, Shi E, Sirer EG, Song D, Wattenhofer R. (2016) On scaling decen- tralized blockchains: (a position paper). International conference on financial cryptography and data security, 106\u2013125","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"8009_CR11","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"H-N Dai","year":"2019","unstructured":"Dai H-N, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6:8076\u20138094","journal-title":"IEEE Internet Things J"},{"key":"8009_CR12","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1109\/COMST.2020.2989392","volume":"22","author":"K Gai","year":"2020","unstructured":"Gai K, Guo J, Zhu L, Yu S (2020) Blockchain meets cloud computing: a survey. IEEE Commun Surv Tutor 22:2009\u20132030","journal-title":"IEEE Commun Surv Tutor"},{"key":"8009_CR13","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.1109\/TPDS.2021.3074440","volume":"32","author":"L Luo","year":"2021","unstructured":"Luo L, Guo D, Zhao Y, Rottenstreich O, Ma RT, Luo X (2021) Mcfsyn: a multi- party set reconciliation protocol with the marked cuckoo filter. IEEE Trans Parallel Distrib Syst 32:2705\u20132718","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"8009_CR14","doi-asserted-by":"crossref","unstructured":"Zhou M, Zeng L, Han Y, Li P, Long F, Zhou D, Beschastnikh I, Wu M (2023) Mercury: Fast transaction broadcast in high performance blockchain systems. IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1\u201310","DOI":"10.1109\/INFOCOM53939.2023.10228972"},{"key":"8009_CR15","doi-asserted-by":"publisher","first-page":"3269","DOI":"10.1109\/TNET.2023.3279897","volume":"31","author":"E Rohrer","year":"2023","unstructured":"Rohrer E, Tschorsch F (2023) Kadcast-ng: A structured broadcast protocol for blockchain networks. IEEE ACM Trans Netw 31:3269\u20133283","journal-title":"IEEE ACM Trans Netw"},{"key":"8009_CR16","doi-asserted-by":"crossref","unstructured":"Naumenko G, Maxwell G, Wuille P, Fedorova A, Beschastnikh I (2019) Bandwidth-efficient transaction relay for bitcoin. ACM","DOI":"10.1145\/3319535.3354237"},{"key":"8009_CR17","doi-asserted-by":"crossref","unstructured":"Han Y, Li C, Li P, Wu M, Zhou D, Long F (2020) Shrec: Bandwidth-efficient transaction relay in high-throughput blockchain systems. Proceedings of the 11th ACM Symposium on Cloud Computing, 238\u2013252","DOI":"10.1145\/3419111.3421283"},{"key":"8009_CR18","doi-asserted-by":"crossref","unstructured":"Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD. (2014) Cuckoo filter: Practically better than bloom. Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 75\u201388","DOI":"10.1145\/2674005.2674994"},{"key":"8009_CR19","doi-asserted-by":"crossref","unstructured":"Yang T, Jiang J, Liu P, Huang Q, Gong J, Zhou Y, Miao R, Li X, Uhlig S (2018) Elastic sketch: Adaptive and fast network-wide measurements. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 561\u2013575","DOI":"10.1145\/3230543.3230544"},{"key":"8009_CR20","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu Z, Wang R, Yang T, Li J, Miao R, Liu P, Zhang R, Jiang J (2021) Cocosketch: High-performance sketch-based measurement over arbitrary par- tial key query. Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 207\u2013222","DOI":"10.1145\/3452296.3472892"},{"key":"8009_CR21","doi-asserted-by":"crossref","unstructured":"Chen L, Chen Y, Liang W, Li X, Li KC, Wang J, Xiong N (2024) Mass: A multi-attribute sketch secure data sharing scheme for iot wearable medical devices based on blockchain. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3468733"},{"key":"8009_CR22","doi-asserted-by":"publisher","first-page":"24035","DOI":"10.1109\/JIOT.2024.3387934","volume":"11","author":"S Zhang","year":"2024","unstructured":"Zhang S, Yan Z, Liang W, Li K-C, Martino BD (2024) Bcae: a blockchain-based cross domain authentication scheme for edge computing. IEEE Internet Things J 11:24035\u201324048. https:\/\/doi.org\/10.1109\/JIOT.2024.3387934","journal-title":"IEEE Internet Things J"},{"key":"8009_CR23","doi-asserted-by":"crossref","unstructured":"Ozisik AP, Andresen G, Levine BN, Tapp D, Bissias G, Katkuri S (2019) Graphene: efficient interactive set reconciliation applied to blockchain propaga- tion. Proceedings of the ACM Special Interest Group on Data Communication, 303\u2013317","DOI":"10.1145\/3341302.3342082"},{"key":"8009_CR24","unstructured":"Corallo M (2016) Bip152: Compact block relay"},{"key":"8009_CR25","doi-asserted-by":"publisher","first-page":"11885","DOI":"10.1109\/TKDE.2023.3237009","volume":"35","author":"S Lee","year":"2023","unstructured":"Lee S, Byun H, Lim H (2023) Set reconciliation using ternary and invertible bloom filters. IEEE Trans Knowl Data Eng 35:11885\u201311898","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"8009_CR26","doi-asserted-by":"publisher","unstructured":"Li Y, Liang W, Xie Kea (2023) Lightnestle: Quick and accurate neural sequential tensor completion via meta learning. IEEE INFOCOM 2023 - IEEE Conference on Computer Communications. https:\/\/doi.org\/10.1109\/INFOCOM53939. 2023.10228967","DOI":"10.1109\/INFOCOM53939"},{"key":"8009_CR27","doi-asserted-by":"crossref","unstructured":"Chattaraj D, Saha S, Bera B, Das AK (2020) On the design of blockchain-based access control scheme for software defined networks. IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 237\u2013242","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162669"},{"key":"8009_CR28","doi-asserted-by":"crossref","unstructured":"Ghaffari F, Bertin E, Crespi N (2021) A novel approach for network resource sharing via blockchain. Proceedings of the SIGCOMM\u201921 Poster and Demo Sessions, 50\u201352","DOI":"10.1145\/3472716.3472867"},{"key":"8009_CR29","unstructured":"Tschipper P (2016) Buip010: Xtreme thinblocks"},{"key":"8009_CR30","doi-asserted-by":"crossref","unstructured":"Mao Y, Deb S, Venkatakrishnan SB, Kannan S, Srinivasan K (2020) Perigee: Efficient peer-to-peer network design for blockchains. Proceedings of the 39th Symposium on Principles of Distributed Computing, 428\u2013437","DOI":"10.1145\/3382734.3405704"},{"issue":"7","key":"8009_CR31","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space\/time trade-offs in hash coding with allowable errors. Com- munications of the ACM 13(7):422\u2013426. https:\/\/doi.org\/10.1145\/362686.362692","journal-title":"Com- munications of the ACM"},{"key":"8009_CR32","doi-asserted-by":"publisher","unstructured":"Eppstein D, Goodrich MT, Hui F, Mitzenmacher M (2011) What\u2019s the difference? efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 218\u2013229. ACM, Toronto, Ontario, Canada. https:\/\/doi.org\/10.1145\/2018436.2018463","DOI":"10.1145\/2018436.2018463"},{"issue":"2","key":"8009_CR33","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.jalgor.2003.12.002","volume":"51","author":"R Pagh","year":"2004","unstructured":"Pagh R, Rodler FF (2004) Cuckoo hashing. J Algorithms 51(2):122\u2013144. https:\/\/doi.org\/10.1016\/j.jalgor.2003.12.002","journal-title":"J Algorithms"},{"key":"8009_CR34","doi-asserted-by":"publisher","unstructured":"Luby M Lt codes. (2002) Proceedings of the 43rd annual IEEE Symposium on foun- dations of computer science (FOCS), 271\u2013280. https:\/\/doi.org\/10.1109\/SFCS.2002.1181950","DOI":"10.1109\/SFCS.2002.1181950"},{"issue":"6","key":"8009_CR35","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","volume":"52","author":"A Shokrollahi","year":"2006","unstructured":"Shokrollahi A (2006) Raptor codes. IEEE Trans Inf Theory 52(6):2551\u20132567. https:\/\/doi.org\/10.1109\/TIT.2006.874390","journal-title":"IEEE Trans Inf Theory"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08009-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-08009-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08009-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T23:02:27Z","timestamp":1762556547000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-08009-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,7]]},"references-count":35,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["8009"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-08009-9","relation":{},"ISSN":["1573-0484"],"issn-type":[{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2025,11,7]]},"assertion":[{"value":"5 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"1530"}}