{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:02:59Z","timestamp":1772863379429,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T00:00:00Z","timestamp":1622419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T00:00:00Z","timestamp":1622419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11390-020-0158-2","type":"journal-article","created":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T12:02:57Z","timestamp":1623758577000},"page":"693-706","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["SE-Chain: A Scalable Storage and Efficient Retrieval Model for Blockchain"],"prefix":"10.1007","volume":"36","author":[{"given":"Da-Yu","family":"Jia","sequence":"first","affiliation":[]},{"given":"Jun-Chang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Zhi-Qiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Han","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Guo-Ren","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,31]]},"reference":[{"key":"158_CR1","doi-asserted-by":"crossref","unstructured":"Chen W L, Zheng Z B, Cui J H, Ngai E C H, Zheng P L, Zhou Y R. Detecting Ponzi schemes on Ethereum: Towards healthier blockchain technology. In Proc. the 2018 World Wide Web Conference on World Wide Web, April 2018, pp.1409-1418. DOI: 10.1145\/3178876.3186046.","DOI":"10.1145\/3178876.3186046"},{"key":"158_CR2","unstructured":"Vo H T, Kundu A, Mohania M K. Research directions in blockchain data management and analytics. In Proc. the 21st International Conference on Extending Database Technology, March 2018, pp.445-448. DOI: 10.5441\/002\/edbt.2018.43."},{"key":"158_CR3","unstructured":"Eyal I, Gencer A E, Sirer E G, van Renesse R. Bitcoin-NG: A scalable blockchain protocol. In Proc. the 13th USENIX Symposium on Networked Systems Design and Implementation, March 2016, pp.45-59."},{"key":"158_CR4","unstructured":"Yong Y,Wang F Y. Blockchain: The state of the art and future trends. Acta Automatica Sinica, 2016, 42(4): 481-494. DOI: 10.16383\/j.aas.2016.c160158. (in Chinese)"},{"key":"158_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau J, Miller A, Clark J, Narayanan A, Kroll J A, Felten E W. SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies. In Proc. the 2015 IEEE Symposium on Security and Privacy, May 2015, pp.104-121. DOI: 10.1109\/SP.2015.14.","DOI":"10.1109\/SP.2015.14"},{"issue":"4","key":"158_CR6","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2018.3111245","volume":"16","author":"R Henry","year":"2018","unstructured":"Henry R, Herzberg A, Kate A. Blockchain access privacy: Challenges and directions. IEEE Security and Privacy, 2018, 16(4): 38-45. DOI: https:\/\/doi.org\/10.1109\/MSP.2018.3111245.","journal-title":"IEEE Security and Privacy"},{"key":"158_CR7","doi-asserted-by":"crossref","unstructured":"Li J R, Wolf T. A one-way proof-of-work protocol to protect controllers in software-de_ned networks. In Proc. the 2016 Symposium on Architectures for Networking and Communications Systems, March 2016, pp.123-124. DOI: 10.1145\/2881025.2889481.","DOI":"10.1145\/2881025.2889481"},{"key":"158_CR8","doi-asserted-by":"crossref","unstructured":"Jia D Y, Xin J C, Wang Z Q, Guo W, Wang G R. ElasticChain: Support very large Blockchain by reducing data redundancy. In Proc. the 2nd International Joint Conference on Web and Big Data, July 2018, pp.440-454. DOI: 10.1007\/978-3-319-96893-3 33.","DOI":"10.1007\/978-3-319-96893-3_33"},{"key":"158_CR9","doi-asserted-by":"crossref","unstructured":"Al-Bassam M, Sonnino A, Bano S, Hrycyszyn D, Danezis G. Chainspace: A sharded smart contracts platform. In Proc. the 25th Annual Network and Distributed System Security Symposium, February 2018. DOI: 10.14722\/ndss.2018.23244.","DOI":"10.14722\/ndss.2018.23241"},{"key":"158_CR10","doi-asserted-by":"crossref","unstructured":"Zamani M, Movahedi M, Raykova M. RapidChain: Scaling blockchain via full sharding. In Proc. the 2018 ACM SIGSAC Conference on Computer and Communications Security, October 2018, pp.931-948. DOI: 10.1145\/3243734.3243853.","DOI":"10.1145\/3243734.3243853"},{"key":"158_CR11","doi-asserted-by":"crossref","unstructured":"Xu Z H, Han S Y, Chen L. CUB, a consensus unit-based storage scheme for Blockchain system. In Proc. the 34th IEEE International Conference on Data Engineering, April 2018, pp.173-184. DOI: 10.1109\/ICDE.2018.00025.","DOI":"10.1109\/ICDE.2018.00025"},{"key":"158_CR12","doi-asserted-by":"crossref","unstructured":"Luu L, Narayanan V, Zheng C D, Baweja K, Gilbert S, Saxena P. A secure sharding protocol for open blockchains. In Proc. the 2016 ACM SIGSAC Conference on Computer and Communications Security, October 2016, pp.17-30. DOI: 10.1145\/2976749.2978389.","DOI":"10.1145\/2976749.2978389"},{"key":"158_CR13","doi-asserted-by":"crossref","unstructured":"Xu C, Zhang C, Xu J L. vChain: Enabling verifiable Boolean range queries over blockchain databases. In Proc. the 2019 International Conference on Management of Data, June 2019, pp.141-158. DOI: 10.1145\/3299869.3300083.","DOI":"10.1145\/3299869.3300083"},{"key":"158_CR14","doi-asserted-by":"crossref","unstructured":"Zhang C, Xu C, Xu J L, Tang Y Z, Choi B. GEM2-Tree: A gas-efficient structure for authenticated range queries in blockchain. In Proc. the 35th IEEE International Conference on Data Engineering, April 2019, pp.842-853. DOI: 10.1109\/ICDE.2019.00080.","DOI":"10.1109\/ICDE.2019.00080"},{"key":"158_CR15","doi-asserted-by":"crossref","unstructured":"Third A, Domingue J. Linked data indexing of distributed ledgers. In Proc. the 26th International Conference on World Wide Web Companion, April 2017, pp.1431-1436. DOI: 10.1145\/3041021.3053895.","DOI":"10.1145\/3041021.3053895"},{"key":"158_CR16","doi-asserted-by":"crossref","unstructured":"Li Y, Zheng K, Yan Y, Liu Q, Zhou X F. EtherQL: A query layer for blockchain system. In Proc. the 22nd International Conference on Database Systems for Advanced Applications, March 2017, pp.556-567. DOI: 10.1007\/978-3-319-55699-4 34.","DOI":"10.1007\/978-3-319-55699-4_34"},{"key":"158_CR17","doi-asserted-by":"crossref","unstructured":"Wang S, Dinh T T A, Lin Q, Xie Z L, Zhang M H, Cai Q C, Chen G, Ooi B C, Ruan P C. ForkBase: An efficient storage engine for blockchain and forkable applications. Proceedings of the VLDB Endowment, 2018, 11(10): 1137-1150. DOI: 10.14778\/3231751.3231762.","DOI":"10.14778\/3231751.3231762"},{"key":"158_CR18","unstructured":"Jia D Y, Xin J C, Wang Z Q, Guo W, Wang G R. Efficient query model for storage capacity scalable Blockchain system. Journal of Software, 2019, 30(9): 91-106. DOI: 10.13328\/j.cnki.jos.005774. (in Chinese)"},{"key":"158_CR19","unstructured":"Baudin \u00c9. Probabilities and Life. Dover Publications Inc, 1962."},{"issue":"3","key":"158_CR20","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TNET.2009.2034047","volume":"18","author":"HF Yu","year":"2010","unstructured":"Yu H F, Gibbons P B, Kaminsky M, Xiao F. SybilLimit: A near-optimal social network defense against sybil attacks. IEEE\/ACM Transactions on Networking, 2010, 18(3): 885-898. DOI: https:\/\/doi.org\/10.1109\/TNET.2009.2034047.","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-0158-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-020-0158-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-0158-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T12:24:41Z","timestamp":1623759881000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-020-0158-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,31]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["158"],"URL":"https:\/\/doi.org\/10.1007\/s11390-020-0158-2","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,31]]},"assertion":[{"value":"4 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}