{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:59:13Z","timestamp":1772859553322,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>After the Ethereum DAO attack in 2016, which resulted in significant economic losses, blockchain governance has become a prominent research area. However, there is a lack of comprehensive and systematic literature review on blockchain governance. To deeply understand the process of blockchain governance and provide guidance for the future design of the blockchain governance model, we provide an in-depth review of blockchain governance. In this paper, first we introduce the consensus algorithms currently used in blockchain and relate them to governance theory. Second, we present the main content of off-chain governance and investigate two well-known off-chain governance projects. Third, we investigate four common on-chain governance voting techniques, then summarize the seven attributes that the on-chain governance voting process should meet, and finally analyze four well-known on-chain governance blockchain projects based on the previous research. We hope this survey will provide an in-depth insight into the potential development direction of blockchain governance and device future research agenda.<\/jats:p>","DOI":"10.1007\/s11704-023-3113-x","type":"journal-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T14:02:32Z","timestamp":1701871352000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["The governance technology for blockchain systems: a survey"],"prefix":"10.1007","volume":"18","author":[{"given":"Guocheng","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Haoyang","family":"An","sequence":"additional","affiliation":[]},{"given":"Min","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,6]]},"reference":[{"key":"3113_CR1","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, 2008, 2120"},{"key":"3113_CR2","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G. Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014, 151: 1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"issue":"23","key":"3113_CR3","doi-asserted-by":"publisher","first-page":"15659","DOI":"10.3390\/su142315659","volume":"14","author":"S Bhattacharya","year":"2022","unstructured":"Bhattacharya S, Victor N, Chengoden R, Ramalingam M, Selvi G C, Maddikunta P K R, Donta P K, Dustdar S, Jhaveri R H, Gadekallu T R. Blockchain for internet of underwater things: State-of-the-art, applications, challenges, and future directions. Sustainability, 2022, 14(23): 15659","journal-title":"Sustainability"},{"key":"3113_CR4","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.jpdc.2021.03.011","volume":"153","author":"G N Nguyen","year":"2021","unstructured":"Nguyen G N, Le Viet N H, Elhoseny M, Shankar K, Gupta B B, El-Latif A A A. Secure blockchain enabled cyber-physical systems in healthcare using deep belief network with resnet model. Journal of Parallel and Distributed Computing, 2021, 153: 150\u2013160","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"7","key":"3113_CR5","doi-asserted-by":"publisher","first-page":"6074","DOI":"10.1109\/JIOT.2022.3223576","volume":"10","author":"S Rani","year":"2023","unstructured":"Rani S, Babbar H, Srivastava G, Gadekallu T R, Dhiman G. Security framework for internet-of-things-based software-defined networks using blockchain. IEEE Internet of Things Journal, 2023, 10(7): 6074\u20136081","journal-title":"IEEE Internet of Things Journal"},{"issue":"12","key":"3113_CR6","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/JAS.2021.1004003","volume":"8","author":"Mamta","year":"2021","unstructured":"Mamta, Gupta B B, Li K C, Leung V C M, Psannis K E, Yamaguchi S. Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA Journal of Automatica Sinica, 2021, 8(12): 1877\u20131890","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"11","key":"3113_CR7","doi-asserted-by":"publisher","first-page":"9798","DOI":"10.1002\/int.23014","volume":"37","author":"B B Gupta","year":"2022","unstructured":"Gupta B B, Mamta, Mehla R, Alhalabi W, Alsharif H. Blockchain technology with its application in medical and healthcare systems: a survey. International Journal of Intelligent Systems, 2022, 37(11): 9798\u20139832","journal-title":"International Journal of Intelligent Systems"},{"issue":"8","key":"3113_CR8","doi-asserted-by":"publisher","first-page":"083022","DOI":"10.1088\/1367-2630\/aba062","volume":"22","author":"J H Lin","year":"2020","unstructured":"Lin J H, Primicerio K, Squartini T, Decker C, Tessone C J. Lightning network: a second path towards centralisation of the Bitcoin economy*. New Journal of Physics, 2020, 22(8): 083022","journal-title":"New Journal of Physics"},{"issue":"4","key":"3113_CR9","first-page":"283","volume":"19","author":"N Webb","year":"2018","unstructured":"Webb N. A fork in the blockchain: income tax and the bitcoin\/bitcoin cash hard fork. North Carolina Journal of Law & Technology, 2018, 19(4): 283\u2013311","journal-title":"North Carolina Journal of Law & Technology"},{"key":"3113_CR10","unstructured":"Bitcoin Cash. Bitcoin cash. See bitcoincash website, 2019"},{"key":"3113_CR11","unstructured":"del Castillo M. The DAO attacked: Code issue leads to $60 million ether theft. See baypayforumblockchain-coins\/the-dao-attacked-code-issue-leads-to-60-million-ether-theft website, 2016"},{"key":"3113_CR12","unstructured":"Ethereum Classic. Ethereum classic. Ethereum Classic. See ethereumclassic.github website, 2017"},{"issue":"1","key":"3113_CR13","first-page":"1","volume":"3","author":"P Weill","year":"2004","unstructured":"Weill P. Don\u00e2\u0102\u0179t just lead, govern: how top-performing firms govern it. MIS Quarterly Executive, 2004, 3(1): 1\u201317","journal-title":"MIS Quarterly Executive"},{"issue":"8","key":"3113_CR14","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/j.cose.2004.10.006","volume":"23","author":"S Posthumus","year":"2004","unstructured":"Posthumus S, Von Solms R. A framework for the governance of information security. Computers & security, 2004, 23(8): 638\u2013646","journal-title":"Computers & security"},{"issue":"2","key":"3113_CR15","doi-asserted-by":"publisher","first-page":"205395172094808","DOI":"10.1177\/2053951720948087","volume":"7","author":"M Micheli","year":"2020","unstructured":"Micheli M, Ponti M, Craglia M, Berti Suman A. Emerging models of data governance in the age of datafication. Big Data & Society, 2020, 7(2): 2053951720948087","journal-title":"Big Data & Society"},{"issue":"3","key":"3113_CR16","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1093\/jamia\/ocz192","volume":"27","author":"S Reddy","year":"2020","unstructured":"Reddy S, Allan S, Coghlan S, Cooper P. A governance model for the application of AI in health care. Journal of the American Medical Informatics Association, 2020, 27(3): 491\u2013497","journal-title":"Journal of the American Medical Informatics Association"},{"key":"3113_CR17","doi-asserted-by":"publisher","first-page":"111576","DOI":"10.1016\/j.jss.2022.111576","volume":"197","author":"Y Liu","year":"2023","unstructured":"Liu Y, Lu Q, Zhu L, Paik H Y, Staples M. A systematic literature review on blockchain governance. Journal of Systems and Software, 2023, 197: 111576","journal-title":"Journal of Systems and Software"},{"key":"3113_CR18","doi-asserted-by":"crossref","unstructured":"Liu Y, Lu Q, Yu G, Paik H Y, Perera H, Zhu L. A pattern collection for blockchain governance. 2022, arXiv preprint arXiv: 2203.00268","DOI":"10.1145\/3551902.3564802"},{"key":"3113_CR19","doi-asserted-by":"publisher","first-page":"102090","DOI":"10.1016\/j.is.2022.102090","volume":"109","author":"Y Liu","year":"2022","unstructured":"Liu Y, Lu Q, Yu G, Paik H Y, Zhu L. Defining blockchain governance principles: a comprehensive framework. Information Systems, 2022, 109: 102090","journal-title":"Information Systems"},{"key":"3113_CR20","doi-asserted-by":"crossref","unstructured":"Kiayias A, Lazos P. SoK: blockchain governance. In: Proceedings of the 4th ACM Conference on Advances in Financial Technologies. 2022, 61\u201373","DOI":"10.1145\/3558535.3559794"},{"issue":"1","key":"3113_CR21","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/10580530.2020.1720046","volume":"38","author":"R van Pelt","year":"2021","unstructured":"van Pelt R, Jansen S, Baars D, Overbeek S. Defining blockchain governance: A framework for analysis and comparison. Information Systems Management, 2021, 38(1): 21\u201341","journal-title":"Information Systems Management"},{"key":"3113_CR22","unstructured":"Schuh F, Larimer D. Bitshares 2.0: general overview. See https:\/\/cb-devplatform-images.s3.eu-west-1.amazonaws.com\/project\/whitepaper\/bitshares website, 2017"},{"key":"3113_CR23","unstructured":"Duffield E, Diaz D. Dash: a privacy-centric crypto-currency. See https:\/\/exodus.com\/assets\/docs\/dash-whitepaper website, 2015"},{"issue":"1","key":"3113_CR24","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3390\/su11010167","volume":"11","author":"M S Kim","year":"2018","unstructured":"Kim M S, Chung J Y. Sustainable growth and token economy design: the case of steemit. Sustainability, 2018, 11(1): 167","journal-title":"Sustainability"},{"key":"3113_CR25","unstructured":"Jepson C. Dtb001: Decred technical brief. See decred.org\/dtb001 website, 2015"},{"key":"3113_CR26","unstructured":"Goodman L M. Tezos-a self-amending crypto-ledger white paper. See https:\/\/tezos.com\/whitepaper website, 2014"},{"key":"3113_CR27","doi-asserted-by":"crossref","unstructured":"Elrom E. EOS.IO Wallets and Smart Contracts. The Blockchain Developer, 2019, 213\u2013256","DOI":"10.1007\/978-1-4842-4847-8_6"},{"issue":"3","key":"3113_CR28","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov I, Lee C, Mizrahi A, Rosenfeld M. Proof of activity: extending bitcoin\u2019s proof of work via proof of stake [extended abstractly. ACM SIGMETRICS Performance Evaluation Review, 2014, 42(3): 34\u201337","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"issue":"1","key":"3113_CR29","first-page":"012110","volume":"1828","author":"D Alves","year":"2021","unstructured":"Alves D. Proof-of-Concept (POC) of Restaurant\u2019s food requests in the Lisk Blockchain\/sidechain. Journal of Physics: Conference Series, 2021, 1828(1): 012110","journal-title":"Journal of Physics: Conference Series"},{"key":"3113_CR30","unstructured":"Hanke T, Movahedi, M. Williams D. DFINITY technology overview series consensus system, 2018"},{"issue":"4","key":"3113_CR31","doi-asserted-by":"publisher","first-page":"102556","DOI":"10.1016\/j.ipm.2021.102556","volume":"58","author":"T Dursun","year":"2021","unstructured":"Dursun T, \u00dcst\u00fcnda\u011f B B. A novel framework for policy based on-chain governance of blockchain networks. Information Processing & Management, 2021, 58(4): 102556","journal-title":"Information Processing & Management"},{"key":"3113_CR32","doi-asserted-by":"publisher","unstructured":"Pasquini R. Quadratic funding under constrained matching funds. SSRN Electronic Journal, 2020, doi: https:\/\/doi.org\/10.2139\/ssrn.3702318","DOI":"10.2139\/ssrn.3702318"},{"key":"3113_CR33","doi-asserted-by":"publisher","first-page":"e680","DOI":"10.7717\/peerj-cs.680","volume":"7","author":"M A Abdullah","year":"2021","unstructured":"Abdullah M A, Ibrahim M A R, Shapiee M N A, et al. The classification of skateboarding tricks via transfer learning pipelines, PeerJ Computer Science, 2021, 7: e680","journal-title":"PeerJ Computer Science"},{"key":"3113_CR34","doi-asserted-by":"crossref","unstructured":"Fan X, Chai Q, Zhong Z. MULTAV: a multi-chain token backed voting framework for decentralized blockchain governance. In: Proceedings of the 3rd International Conference on Blockchain. 2020, 33\u201347","DOI":"10.1007\/978-3-030-59638-5_3"},{"key":"3113_CR35","doi-asserted-by":"crossref","unstructured":"Merrill P, Austin T H, Rietz J, Pearce J. Ping-pong governance: token locking for enabling blockchain self-governance. In: Proceedings of the 1st Mathematical Research for Blockchain Economy. 2020, 13\u201329","DOI":"10.1007\/978-3-030-37110-4_2"},{"issue":"2","key":"3113_CR36","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF01718520","volume":"29","author":"T Groves","year":"1977","unstructured":"Groves T, Ledyard J O. Some limitations of demand revelaing processes. Public Choice, 1977, 29(2): 107\u2013124","journal-title":"Public Choice"},{"key":"3113_CR37","doi-asserted-by":"publisher","unstructured":"Berg A, Berg C, Novak M. Crypto Public Choice. SSRN Electronic Journal, 2018, doi: https:\/\/doi.org\/10.2139\/ssrn.3236025","DOI":"10.2139\/ssrn.3236025"},{"issue":"1","key":"3113_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11127-017-0404-5","volume":"172","author":"E A Posner","year":"2017","unstructured":"Posner E A, Weyl E G. Quadratic voting and the public good: introduction. Public Choice, 2017, 172(1): 1\u201322","journal-title":"Public Choice"},{"issue":"1","key":"3113_CR39","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11127-017-0405-4","volume":"172","author":"E G Weyl","year":"2017","unstructured":"Weyl E G. The robustness of quadratic voting. Public Choice, 2017, 172(1): 75\u2013107","journal-title":"Public Choice"},{"key":"3113_CR40","doi-asserted-by":"crossref","unstructured":"Demers A, Greene D, Hauser C, Irish W, Larson J, Shenker S, Sturgis H, Swinehart D, Terry D. Epidemic algorithms for replicated database maintenance. In: Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing. 1987, 1\u201312","DOI":"10.1145\/41840.41841"},{"key":"3113_CR41","unstructured":"Becze M, Jameson H. Eip-1: Eip purpose and guidelines. See https:\/\/eips.ethereum.org\/EIPS\/eip-1 website, 2015"},{"issue":"2","key":"3113_CR42","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D L Chaum","year":"1981","unstructured":"Chaum D L. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981, 24(2): 84\u201390","journal-title":"Communications of the ACM"},{"key":"3113_CR43","doi-asserted-by":"crossref","unstructured":"Chaum D, van Heyst E. Group signatures. In: Proceedings of Workshop on the Theory and Application of of Cryptographic Techniques. 1991, 257\u2013265","DOI":"10.1007\/3-540-46416-6_22"},{"key":"3113_CR44","doi-asserted-by":"crossref","unstructured":"Rivest R L, Shamir A, Tauman Y. How to leak a secret. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 552\u2013565","DOI":"10.1007\/3-540-45682-1_32"},{"key":"3113_CR45","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.cose.2017.06.007","volume":"71","author":"O Kulyk","year":"2017","unstructured":"Kulyk O, Neumann S, Marky K, Budurushi J, Volkamer M. Coercion-resistant proxy voting. Computers & Security, 2017, 71: 88\u201399","journal-title":"Computers & Security"},{"key":"3113_CR46","doi-asserted-by":"crossref","unstructured":"Clarkson M R, Chong S, Myers A C. Civitas: toward a secure voting system. In: Proceedings of 2008 IEEE Symposium on Security and Privacy (sp 2008). 2008, 354\u2013368","DOI":"10.1109\/SP.2008.32"},{"key":"3113_CR47","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","volume":"476","author":"C Zhao","year":"2019","unstructured":"Zhao C, Zhao S, Zhao M et al. Secure multi-party computation: theory, practice and applications. Information Sciences, 2019, 476: 357\u2013372","journal-title":"Information Sciences"},{"key":"3113_CR48","doi-asserted-by":"crossref","unstructured":"Allombert V, Bourgoin M, Tesson J. Introduction to the Tezos blockchain. In: Proceedings of 2019 International Conference on High Performance Computing & Simulation (HPCS). 2019, 1\u201310","DOI":"10.1109\/HPCS48598.2019.9188227"},{"key":"3113_CR49","volume-title":"Will that smart contract really do what you expect it to do?","author":"M H Everts","year":"2018","unstructured":"Everts M H, Muller F. Will that smart contract really do what you expect it to do?. Groningen: TNO, 2018"},{"key":"3113_CR50","doi-asserted-by":"publisher","first-page":"100539","DOI":"10.1016\/j.gfj.2020.100539","volume":"51","author":"N Khan","year":"2022","unstructured":"Khan N, Kchouri B, Yatoo N A, Kr\u00e4ussl Z, Patel A, State R. Tokenization of sukuk: Ethereum case study. Global Finance Journal, 2022, 51: 100539","journal-title":"Global Finance Journal"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-3113-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-023-3113-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-3113-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T14:09:41Z","timestamp":1701871781000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-023-3113-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["3113"],"URL":"https:\/\/doi.org\/10.1007\/s11704-023-3113-x","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"13 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"<b>Competing interests<\/b> The authors declare that they have no competing interests or financial conflicts to disclose.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}],"article-number":"182813"}}