{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T10:32:56Z","timestamp":1775903576887,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11432-019-2790-1","type":"journal-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T07:02:57Z","timestamp":1606287777000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":159,"title":["A survey of Blockchain consensus algorithms: mechanism, design and applications"],"prefix":"10.1007","volume":"64","author":[{"given":"Xiang","family":"Fu","sequence":"first","affiliation":[]},{"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peichang","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,18]]},"reference":[{"key":"2790_CR1","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2008. http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"2790_CR2","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z B Zheng","year":"2018","unstructured":"Zheng Z B, Xie S A, Dai H N, et al. Blockchain challenges and opportunities: a survey. Int J Web Grid Serv, 2018, 14: 352","journal-title":"Int J Web Grid Serv"},{"key":"2790_CR3","first-page":"481","volume":"42","author":"Y Yuan","year":"2016","unstructured":"Yuan Y, Wang F Y. Blockchain: the state of the art and future trends. Acta Autom Sin, 2016, 42: 481\u2013494","journal-title":"Acta Autom Sin"},{"key":"2790_CR4","unstructured":"Wood G. Ethereum: a secure decentralised generalised transaction ledger. 2014. http:\/\/gavwood.com\/Paper.pdf"},{"key":"2790_CR5","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TSMC.2018.2854904","volume":"48","author":"Y Yuan","year":"2018","unstructured":"Yuan Y, Wang F Y. Blockchain and cryptocurrencies: model, techniques, and applications. IEEE Trans Syst Man Cybern Syst, 2018, 48: 1421\u20131428","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"2790_CR6","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M. Blockchains and smart contracts for the internet of things. IEEE Access, 2016, 4: 2292\u20132303","journal-title":"IEEE Access"},{"key":"2790_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"P K Sharma","year":"2018","unstructured":"Sharma P K, Chen M Y, Park J H. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access, 2018, 6: 115\u2013124","journal-title":"IEEE Access"},{"key":"2790_CR8","doi-asserted-by":"crossref","unstructured":"Chen Q, Bridges R A. Automated behavioral analysis of malware: a case study of wannacry ransomware. In: Proceedings of the 16th IEEE International Conference on Machine Learning and Applications (ICMLA), 2017. 454\u2013460","DOI":"10.1109\/ICMLA.2017.0-119"},{"key":"2790_CR9","doi-asserted-by":"crossref","unstructured":"Bencic F M, Zarko I P. Distributed ledger technology: blockchain compared to directed acyclic graph. In: Proceedings of the 38th International Conference on Distributed Computing Systems (ICDCS), 2018. 1569\u20131570","DOI":"10.1109\/ICDCS.2018.00171"},{"key":"2790_CR10","first-page":"227","volume":"3","author":"Z D Chen","year":"2017","unstructured":"Chen Z D, Dong A Q, Sun H, et al. Research on private blockchain based on crowdfunding. J Inf Secur Res, 2017, 3: 227\u2013236","journal-title":"J Inf Secur Res"},{"key":"2790_CR11","doi-asserted-by":"crossref","unstructured":"Pongnumkul S, Siripanpornchana C, Thajchayapong S. Performance analysis of private blockchain platforms in varying workloads. In: Proceedings of the 26th International Conference on Computer Communication and Networks (ICCCN), 2017","DOI":"10.1109\/ICCCN.2017.8038517"},{"key":"2790_CR12","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport L, Shostak R, Pease M. The Byzantine generals problem. ACM Trans Program Lang Syst, 1982, 4: 382\u2013401","journal-title":"ACM Trans Program Lang Syst"},{"key":"2790_CR13","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TSE.1986.6312888","volume":"12","author":"K J Perry","year":"1986","unstructured":"Perry K J, Toueg S. Distributed agreement in the presence of processor and communication faults. IEEE Trans Softw Eng, 1986, 12: 477\u2013482","journal-title":"IEEE Trans Softw Eng"},{"key":"2790_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/279227.279229","volume":"16","author":"L Lamport","year":"1998","unstructured":"Lamport L. The part-time parliament. ACM Trans Comput Syst, 1998, 16: 133\u2013169","journal-title":"ACM Trans Comput Syst"},{"key":"2790_CR15","first-page":"18","volume":"32","author":"L Lamport","year":"2001","unstructured":"Lamport L. Paxos made simple. ACM Sigact News, 2001, 32: 18\u201325","journal-title":"ACM Sigact News"},{"key":"2790_CR16","unstructured":"Ongaro D, Ousterhout J. In search of an understandable consensus algorithm. In: Proceedings of USENIX Annual Technical Conference, 2014. 305\u2013319"},{"key":"2790_CR17","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"M J Fischer","year":"1985","unstructured":"Fischer M J, Lynch N A, Paterson M S. Impossibility of distributed consensus with one faulty process. J ACM, 1985, 32: 374\u2013382","journal-title":"J ACM"},{"key":"2790_CR18","doi-asserted-by":"crossref","unstructured":"Karame G, Androulaki E, Capkun S. Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. 2012. https:\/\/eprint.iacr.org\/2012\/248.pdf","DOI":"10.1145\/2382196.2382292"},{"key":"2790_CR19","doi-asserted-by":"crossref","unstructured":"Karame G. On the security and scalability of bitcoin\u2019s blockchain. In: Proceedings of ACM Sigsac Conference on Computer and Communications Security, 2016. 1861\u20131862","DOI":"10.1145\/2976749.2976756"},{"key":"2790_CR20","unstructured":"King S, Nadal S. Ppcoin: peer-to-peer crypto-currency with proof-of-stake. 2012. https:\/\/decred.org\/research\/king2012.pdf"},{"key":"2790_CR21","unstructured":"Castro M, Liskov B. Practical byzantine fault tolerance. In: Proceedings of Symposium on Operating Systems Design and Implementation, 1999. 173\u2013186"},{"key":"2790_CR22","unstructured":"Bano S, Sonnino A, Al-Bassam M, et al. Consensus in the age of blockchains. 2017. ArXiv:1711.03936"},{"key":"2790_CR23","doi-asserted-by":"crossref","unstructured":"Bach L, Mihaljevic B, Zagar M. Comparative analysis of blockchain consensus algorithms. In: Proceedings of the 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2018. 1545\u20131550","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"2790_CR24","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Hoang D T, Hu P, et al. A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access, 2019, 7: 22328\u201322370","journal-title":"IEEE Access"},{"key":"2790_CR25","unstructured":"Eyal I, Gencer A E, Sirer E G, et al. Bitcoin-ng: a scalable blockchain protocol. In: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI16), 2016. 45\u201359"},{"key":"2790_CR26","doi-asserted-by":"crossref","unstructured":"Gilad Y, Hemo R, Micali S, et al. Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, 2017. 51\u201368","DOI":"10.1145\/3132747.3132757"},{"key":"2790_CR27","unstructured":"Zhang Z W. A byzantine fault-tolerant algorithm for blockchains. 2016. https:\/\/docs.neo.org\/en-us\/basic\/consensus\/whitepaper.html"},{"key":"2790_CR28","unstructured":"Churyumov A. Byteball: a decentralized system for storage and transfer of value. 2016. https:\/\/byteball.org\/Byteball.pdf"},{"key":"2790_CR29","unstructured":"Baird L. The Swirlds Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerance. Swirlds Tech Reports SWIRLDS-TR-2016-01. 2016"},{"key":"2790_CR30","unstructured":"Micali S, Rabin M, Vadhan S. Verifiable random functions. In: Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999. 120\u2013130"},{"key":"2790_CR31","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Q Li","year":"2020","unstructured":"Li X Q, Jiang P, Chen T, et al. A survey on the security of blockchain systems. Future Generation Comput Syst, 2020, 107: 841\u2013853","journal-title":"Future Generation Comput Syst"},{"key":"2790_CR32","first-page":"2748","volume":"42","author":"X Fu","year":"2019","unstructured":"Fu X, Wang H M, Shi P C, et al. Jointgraph: a DAG-based efficient consensus algorithm for consortium blockchains. Softw-Pract Exper, 2019, 42: 2748","journal-title":"Softw-Pract Exper"},{"key":"2790_CR33","doi-asserted-by":"publisher","first-page":"012116","DOI":"10.1088\/1742-6596\/978\/1\/012116","volume":"978","author":"D Rachmawati","year":"2018","unstructured":"Rachmawati D, Tarigan J T, Ginting A B C. A comparative study of message digest 5(MD5) and SHA256 algorithm. J Phys-Conf Ser, 2018, 978: 012116","journal-title":"J Phys-Conf Ser"},{"key":"2790_CR34","doi-asserted-by":"crossref","unstructured":"O\u2019Dwyer K J, Malone D. Bitcoin mining and its energy footprint. In: Proceedings of the 25th IET Irish Signals & Systems Conference, 2014","DOI":"10.1049\/cp.2014.0699"},{"key":"2790_CR35","unstructured":"Li C X, Li P L, Xu W, et al. Scaling nakamoto consensus to thousands of transactions per second. 2018. ArXiv:1805.03870"},{"key":"2790_CR36","unstructured":"Larimer D. Delegated Proof-of-Stake (DPOS). Bitshare whitepaper, 2014"},{"key":"2790_CR37","doi-asserted-by":"crossref","unstructured":"Milutinovic M, He W, Wu H, et al. Proof of luck: an efficient blockchain consensus protocol. In: proceedings of the 1st Workshop on System Software for Trusted Execution, 2016","DOI":"10.1145\/3007788.3007790"},{"key":"2790_CR38","doi-asserted-by":"crossref","unstructured":"Karantias K, Kiayias A, Zindros D. Proof-of-burn. In: Proceedings of International Conference on Financial Cryptography and Data Security, 2020. 523\u2013540","DOI":"10.1007\/978-3-030-51280-4_28"},{"key":"2790_CR39","doi-asserted-by":"crossref","unstructured":"Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: what it is, and what it is not. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2015","DOI":"10.1109\/Trustcom.2015.357"},{"key":"2790_CR40","unstructured":"Fabric H. Simple BFT. 2018. https:\/\/jira.hyperledger.org\/browse\/FAB-378"},{"key":"2790_CR41","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of European Conference on Computer Systems, 2018","DOI":"10.1145\/3190508.3190538"},{"key":"2790_CR42","doi-asserted-by":"crossref","unstructured":"Yin M F, Malkhi D, Reiter M K, et al. Hotstuff: BFT consensus with linearity and responsiveness. In: Proceedings of ACM Symposium on Principles of Distributed Computing, 2019","DOI":"10.1145\/3293611.3331591"},{"key":"2790_CR43","unstructured":"Stathakopoulou C, David T, Vukoli\u0107 M. Mir-BFT: high-throughput BFT for blockchains. 2019. ArXiv:1906.05552"},{"key":"2790_CR44","unstructured":"Baudet M, Ching A, Chursin A, et al. State machine replication in the libra blockchain. 2019. https:\/\/developers.libra.org\/docs\/assets\/papers\/libra-consensus-state-machine-replication-in-the-libra-blockchain\/2019-09-19.pdf"},{"key":"2790_CR45","unstructured":"Amsden Z, Arora R, Bano S, et al. The libra blockchain. 2019. https:\/\/developers.libra.org\/docs\/the-libra-blockchain-paper"},{"key":"2790_CR46","doi-asserted-by":"crossref","unstructured":"Miller A, Xia Y, Croman K, et al. The honey badger of BFT protocols. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2016. 31\u201342","DOI":"10.1145\/2976749.2978399"},{"key":"2790_CR47","doi-asserted-by":"crossref","unstructured":"Ben-Or M, Kelmer B, Rabin T. Asynchronous secure computations with optimal resilience. In: Proceedings of the 13th Annual ACM Symposium on Principles of distributed computing, 1994. 183\u2013192","DOI":"10.1145\/197917.198088"},{"key":"2790_CR48","doi-asserted-by":"publisher","unstructured":"Fu X, Wang H M, Shi P C. Proof of previous transactions (PoPT): an efficient approach to consensus for JCLedger. IEEE Trans Syst Man Cybern Syst, 2019. doi: https:\/\/doi.org\/10.1109\/tsmc.2019.2913007","DOI":"10.1109\/tsmc.2019.2913007"},{"key":"2790_CR49","unstructured":"Popov S. The tangle. 2018. http:\/\/www.descryptions.com\/Iota.pdf"},{"key":"2790_CR50","doi-asserted-by":"crossref","unstructured":"Bentov I, Lee C, Mizrahi A, et al. Proof of activity: extending bitcoin\u2019s proof of work via proof of stake. 2014. https:\/\/eprint.iacr.org\/2014\/452.pdf","DOI":"10.1145\/2695533.2695545"},{"key":"2790_CR51","unstructured":"Buchman E. Tendermint: Byzantine fault tolerance in the age of blockchains. Dissertation for Ph.D. Degree. Guelph: University of Guelph, 2016"},{"key":"2790_CR52","doi-asserted-by":"crossref","unstructured":"Buterin V, Reijsbergen D, Leonardos S, et al. Incentives in Ethereum\u2019s hybrid casper protocol. 2019. ArXiv:1903.04205","DOI":"10.1109\/BLOC.2019.8751241"},{"key":"2790_CR53","doi-asserted-by":"crossref","unstructured":"Dinh T T A, Wang J, Chen G, et al. Blockbench: a framework for analyzing private blockchains. In: Proceedings of ACM International Conference on Management of Data, 2017. 1085\u20131100","DOI":"10.1145\/3035918.3064033"},{"key":"2790_CR54","first-page":"101","volume":"14","author":"G Nguyen","year":"2018","unstructured":"Nguyen G, Kim K. A survey about consensus algorithms used in blockchain. J Inf Process Syst, 2018, 14: 101\u2013128","journal-title":"J Inf Process Syst"},{"key":"2790_CR55","unstructured":"Chalaemwongwan N, Kurutach W. State of the art and challenges facing consensus protocols on blockchain. In: Proceedings of International Conference on Information Networking (ICOIN), 2018. 957\u2013962"},{"key":"2790_CR56","doi-asserted-by":"crossref","unstructured":"Douceur J R. The sybil attack. In: Proceedings of International Workshop on Peer to Peer Systems, 2002","DOI":"10.1007\/3-540-45748-8_24"},{"key":"2790_CR57","doi-asserted-by":"crossref","unstructured":"Singh A, Ngan T W, Druschel P, et al. Eclipse attacks on overlay networks: threats and defenses. In: Proceedings of IEEE International Conference Computer and Communications, 2006","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"2790_CR58","unstructured":"Kroll J A, Davey I C, Felten E W. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of the 12th Workshop on the Economics of Information Securit, 2013"},{"key":"2790_CR59","doi-asserted-by":"crossref","unstructured":"Wang H M, Shi P C, Zhang Y M. Jointcloud: a cross-cloud cooperation architecture for integrated internet service customization. In: Proceedings of IEEE International Conference on Distributed Computing Systems, 2017. 1846\u20131855","DOI":"10.1109\/ICDCS.2017.237"},{"key":"2790_CR60","doi-asserted-by":"publisher","first-page":"049102","DOI":"10.1007\/s11432-017-9245-1","volume":"61","author":"J Liang","year":"2018","unstructured":"Liang J, Han W L, Guo Z Q, et al. DESC: enabling secure data exchange based on smart contracts. Sci China Inf Sci, 2018, 61: 049102","journal-title":"Sci China Inf Sci"},{"key":"2790_CR61","doi-asserted-by":"publisher","first-page":"032109","DOI":"10.1007\/s11432-018-9611-3","volume":"62","author":"Y B Wu","year":"2019","unstructured":"Wu Y B, Fan H N, Wang X Y, et al. A regulated digital currency. Sci China Inf Sci, 2019, 62: 032109","journal-title":"Sci China Inf Sci"},{"key":"2790_CR62","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TC.2011.221","volume":"62","author":"G S Veronese","year":"2013","unstructured":"Veronese G S, Correia M, Bessani A N, et al. Efficient Byzantine fault-tolerance. IEEE Trans Comput, 2013, 62: 16\u201330","journal-title":"IEEE Trans Comput"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-2790-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-019-2790-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-2790-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T21:26:56Z","timestamp":1647984416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-019-2790-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":62,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["2790"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-2790-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,18]]},"assertion":[{"value":"3 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"121101"}}