{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:32:21Z","timestamp":1773513141273,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Technology Research and Development Program of China","award":["2020YFB2009503"],"award-info":[{"award-number":["2020YFB2009503"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s12083-022-01337-0","type":"journal-article","created":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T12:07:54Z","timestamp":1654862874000},"page":"2037-2056","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["PoTA: A hybrid consensus protocol to avoid miners\u2019 collusion for BaaS platform"],"prefix":"10.1007","volume":"15","author":[{"given":"Kaiyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhiying","family":"Tu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6686-3819","authenticated-orcid":false,"given":"Zhenzhou","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"1337_CR1","unstructured":"Zhu YJ, Yao JG, Guan HB (2020) Blockchain as a service: Next generation of cloud services. Ruan Jian Xue Bao\/Journal of Software, 31(1):1\u201319 (in Chinese). http:\/\/www.jos.org.cn\/1000-9825\/5891.htm"},{"key":"1337_CR2","volume-title":"Microeconomics, Englewood Cliffs","author":"RS Pindyck","year":"1995","unstructured":"Pindyck RS, Rubinfeld DL, Mehta PL (1995) Microeconomics, Englewood Cliffs. Prentice Hall, NJ"},{"key":"1337_CR3","unstructured":"Ethereum statistics website (2021) https:\/\/www.oklink.com\/eth"},{"key":"1337_CR4","unstructured":"Ethereum statistics website. (2021)\u00a0https:\/\/www.gasnow.org\/"},{"key":"1337_CR5","unstructured":"Ethereum statistics website (2021) https:\/\/etherchain.org\/"},{"key":"1337_CR6","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review\u00a021260. http:\/\/www.bitcoin.org"},{"key":"1337_CR7","unstructured":"King S, Nadal S (2012) PPcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper\u00a019(1)"},{"key":"1337_CR8","doi-asserted-by":"publisher","unstructured":"Onik MMH, Miraz MH (2019) Performance analytical comparison of blockchain-as-a-service (baas) platforms, in: International Conference for Emerging Technologies in Computing. Springer, Cham, 3\u201318. https:\/\/doi.org\/10.1007\/978-3-030-23943-5_1","DOI":"10.1007\/978-3-030-23943-5_1"},{"key":"1337_CR9","unstructured":"Blockchain Technology and Application (2021)\u00a0https:\/\/azure.microsoft.com\/en-us\/solutions\/blockchain\/. 2021"},{"key":"1337_CR10","unstructured":"Blockchain on AWS (2021) https:\/\/aws.amazon.com\/partners\/blockchain\/"},{"key":"1337_CR11","unstructured":"IBM Blockchain Platform (2021) https:\/\/www.ibm.com\/blockchain\/platform"},{"key":"1337_CR12","doi-asserted-by":"publisher","unstructured":"Dao TC, Nguyen BM, Do BL (2019) Challenges and strategies for developing decentralized applications based on blockchain technology, in: International Conference on Advanced Information Networking and Applications. Springer, Cham\u00a0952\u2013962. https:\/\/doi.org\/10.1007\/978-3-030-15032-7_80","DOI":"10.1007\/978-3-030-15032-7_80"},{"key":"1337_CR13","doi-asserted-by":"publisher","unstructured":"Zou W, Lo D, Kochhar PS et al (2019) Smart contract development: Challenges and opportunities [J]. IEEE Trans Software Eng\u00a047(10):2084\u20132106. https:\/\/doi.org\/10.1109\/TSE.2019.2942301","DOI":"10.1109\/TSE.2019.2942301"},{"key":"1337_CR14","doi-asserted-by":"publisher","unstructured":"Douceur JR (2002) The sybil attack, in: International workshop on peer-to-peer systems. Berlin, Heidelberg, Springer 251\u2013260. https:\/\/doi.org\/10.1007\/3-540-45748-8_24","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"3","key":"1337_CR15","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov I, Lee C, Mizrahi A et al (2014) Proof of activity: Extending bitcoin\u2019s proof of work via proof of stake [extended abstract]. ACM SIGMETRICS Performance Evaluation Review 42(3):34\u201337. https:\/\/doi.org\/10.1145\/2695533.2695545","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"1337_CR16","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.future.2019.02.059","volume":"96","author":"Z Liu","year":"2019","unstructured":"Liu Z, Tang S, Chow SSM et al (2019) Fork-free hybrid consensus with flexible proof-of-activity. Futur Gener Comput Syst 96:515\u2013524. https:\/\/doi.org\/10.1016\/j.future.2019.02.059","journal-title":"Futur Gener Comput Syst"},{"key":"1337_CR17","doi-asserted-by":"publisher","unstructured":"Huang Y, Zeng Y, Ye F et al (2020) Incentive Assignment in PoW and PoS Hybrid Blockchain in Pervasive Edge Environments, in: 2020 IEEE\/ACM 28th International Symposium on Quality of Service (IWQoS), Hang Zhou, China, 15\u201317 Jun, 2020, IEEE\u00a01\u201310.\u00a0https:\/\/doi.org\/10.1109\/IWQoS49365.2020.9212842","DOI":"10.1109\/IWQoS49365.2020.9212842"},{"key":"1337_CR18","doi-asserted-by":"publisher","unstructured":"Gupta KD, Rahman A, Poudyal S et al (2019) A hybrid POW-POS implementation against 51 percent attack in cryptocurrency system, in: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, NSW, Australia, 11-13 Dec. 2019, IEEE 396\u2013403. https:\/\/doi.org\/10.1109\/CloudCom.2019.00068","DOI":"10.1109\/CloudCom.2019.00068"},{"key":"1337_CR19","unstructured":"Sun Y, Rajasekaran A (2019) An Interleaving Hybrid Consensus Protocol[J]. arXiv preprint arXiv:1911.09262"},{"key":"1337_CR20","unstructured":"Santos RP, Swan M (2018) PoW, PoS and Hybrid protocols: A Matter of Complexity?[J]. arXiv e-prints. arXiv: 1805.08674"},{"key":"1337_CR21","unstructured":"Gibbons R (1992) A primer in game theory"},{"key":"1337_CR22","unstructured":"Sompolinsky Y, Zohar A (2013) Accelerating bitcoin\u2019s transaction processing, Fast money grows on trees, not chains"},{"key":"1337_CR23","unstructured":"Eyal I, Gencer AE, Sirer EG et al (2016) Bitcoin-ng: A scalable blockchain protocol, in: 13th USENIX symposium on networked systems design and implementation (NSDI 16), Santa Clara, CA, pp. 45\u201359"},{"key":"1337_CR24","doi-asserted-by":"publisher","unstructured":"Karame GO, Androulaki E, Capkun S (2012) Double-spending fast payments in bitcoin, in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS 2012), Raleigh, North Carolina, USA, pp. 906\u2013917. https:\/\/doi.org\/10.1145\/2382196.2382292","DOI":"10.1145\/2382196.2382292"},{"key":"1337_CR25","doi-asserted-by":"publisher","unstructured":"Eyal I, Sirer EG (2014) Majority is not enough: Bitcoin mining is vulnerable, in: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg pp. 436\u2013454. https:\/\/doi.org\/10.1007\/978-3-662-45472-5_28","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"1337_CR26","unstructured":"Nothing at stake attack Ethereum (2021) https:\/\/github.com\/ethereum\/wiki\/wiki\/Proof-of-Stake-FAQs\/what-is-the-nothing-at-stake-problem-and-how-can-it-be-fixed"},{"key":"1337_CR27","unstructured":"Long range attack Ethereum (2021) https:\/\/blog.ethereum.org\/2014\/05\/15\/long-range-attacks-the-serious-problem-with-adaptive-proof-of-work\/"},{"key":"1337_CR28","unstructured":"Mininet (2021)\u00a0http:\/\/mininet.org\/"},{"issue":"2","key":"1337_CR29","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.dss.2003.10.006","volume":"39","author":"J Freixas","year":"2005","unstructured":"Freixas J (2005) The Shapley-Shubik power index for games with several levels of approval in the input and output. Decis Support Syst 39(2):185\u2013195. https:\/\/doi.org\/10.1016\/j.dss.2003.10.006","journal-title":"Decis Support Syst"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01337-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01337-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01337-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T12:31:31Z","timestamp":1656765091000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01337-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,10]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["1337"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01337-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,10]]},"assertion":[{"value":"24 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}