{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:36:39Z","timestamp":1768980999519,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173066"],"award-info":[{"award-number":["62173066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173066"],"award-info":[{"award-number":["62173066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173066"],"award-info":[{"award-number":["62173066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173066"],"award-info":[{"award-number":["62173066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12083-022-01371-y","type":"journal-article","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T07:03:42Z","timestamp":1662015822000},"page":"2633-2649","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Scaling proof-of-authority protocol to improve performance and security"],"prefix":"10.1007","volume":"15","author":[{"given":"Xiaohua","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jinpeng","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Hongji","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Xueqi","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"key":"1371_CR1","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 21260"},{"key":"1371_CR2","doi-asserted-by":"publisher","first-page":"43620","DOI":"10.1109\/ACCESS.2021.3065880","volume":"9","author":"B Lashkari","year":"2021","unstructured":"Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620\u201343652","journal-title":"IEEE Access"},{"key":"1371_CR3","doi-asserted-by":"crossref","unstructured":"Bhushan B, Sinha P, Sagayam KM, Andrew J (2021) Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions.\u00a0Comput Electr Eng\u00a090:106897","DOI":"10.1016\/j.compeleceng.2020.106897"},{"key":"1371_CR4","doi-asserted-by":"crossref","unstructured":"Deepa N, Pham QV, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR, Maddikunta PKR, Fang F, Pathirana PN (2022) A survey on blockchain for big data: approaches, opportunities, and future directions.\u00a0Future Gener Comput Syst","DOI":"10.1016\/j.future.2022.01.017"},{"key":"1371_CR5","doi-asserted-by":"crossref","unstructured":"Chen Y, Lu Y, Bulysheva L, Kataev MY (2022) Applications of blockchain in industry 4.0: A review.\u00a0Inf Syst Front 1\u201315","DOI":"10.1007\/s10796-022-10248-7"},{"issue":"2","key":"1371_CR6","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","volume":"22","author":"Y Xiao","year":"2020","unstructured":"Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Communications Surveys & Tutorials 22(2), 1432\u20131465","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1371_CR7","unstructured":"Rebello GAF, Camilo GF, Guimar\u00e3es LC, de\u00a0Souza LAC, Thomaz GA, Duarte OC (2021) A security and performance analysis of proof-based consensus protocols.\u00a0Ann Telecommun 1\u201321"},{"key":"1371_CR8","unstructured":"King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19(1)"},{"key":"1371_CR9","unstructured":"Barinov I, Baranov V, Khahulin P (2018) Poa network white paper. https:\/\/github.com\/poanetwork\/wiki\/wiki\/POA-Network-Whitepaper"},{"key":"1371_CR10","doi-asserted-by":"crossref","unstructured":"Dhillon V, Metcalf D, Hooper M (2017) The hyperledger project. In: Blockchain enabled applications, Springer, pp 139\u2013149","DOI":"10.1007\/978-1-4842-3081-7_10"},{"key":"1371_CR11","unstructured":"De\u00a0Angelis S, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2018) Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain"},{"key":"1371_CR12","doi-asserted-by":"crossref","unstructured":"Ekparinya P, Gramoli V, Jourjon G (2020) The attack of the clones against proof-of-authority. In: Network and Distributed Systems Security (NDSS) Symposium","DOI":"10.14722\/ndss.2020.24082"},{"key":"1371_CR13","doi-asserted-by":"crossref","unstructured":"Boneh D, Bonneau J, B\u00fcnz B, Fisch B (2018) Verifiable delay functions. In: Annual international cryptology conference, Springer, pp 757\u2013788","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"1371_CR14","doi-asserted-by":"crossref","unstructured":"Wesolowski B (2019) Efficient verifiable delay functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 379\u2013407","DOI":"10.1007\/978-3-030-17659-4_13"},{"key":"1371_CR15","doi-asserted-by":"crossref","unstructured":"Shi E (2019) Analysis of deterministic longest-chain protocols. In: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), IEEE, pp 122\u201312213","DOI":"10.1109\/CSF.2019.00016"},{"key":"1371_CR16","doi-asserted-by":"crossref","unstructured":"Samuel CN, Glock S, Verdier F, Guitton-Ouhamou P (2021) Choice of ethereum clients for private blockchain: Assessment from proof of authority perspective. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, pp 1\u20135","DOI":"10.1109\/ICBC51069.2021.9461085"},{"key":"1371_CR17","first-page":"1","volume-title":"2021 International Conference on Cyber Situational Awareness","author":"S Alrubei","year":"2021","unstructured":"Alrubei S, Ball E, Rigelsford J (2021) Securing iot-blockchain applications through honesty-based distributed proof of authority consensus algorithm. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp 1\u20137"},{"key":"1371_CR18","doi-asserted-by":"crossref","unstructured":"Yang J, Dai J, Gooi HB, Nguyen H, Paudel A (2022) A proof-of-authority blockchain based distributed control system for islanded microgrids. IEEE Transactions on Industrial Informatics","DOI":"10.1109\/TII.2022.3142755"},{"key":"1371_CR19","doi-asserted-by":"crossref","unstructured":"Pass R, Shi E (2017) Fruitchains: A fair blockchain. In: Proceedings of the ACM symposium on principles of distributed computing, pp 315\u2013324","DOI":"10.1145\/3087801.3087809"},{"key":"1371_CR20","unstructured":"Martino W, Quaintance M, Popejoy S (2018) Chainweb: A proof-of-work parallel-chain architecture for massive throughput. Chainweb Whitepaper 19"},{"key":"1371_CR21","doi-asserted-by":"crossref","unstructured":"Bagaria V, Kannan S, Tse D, Fanti G, Viswanath P (2019) Prism: Deconstructing the blockchain to approach physical limits. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 585\u2013602","DOI":"10.1145\/3319535.3363213"},{"key":"1371_CR22","doi-asserted-by":"crossref","unstructured":"Yu H, Nikoli\u0107 I, Hou R, Saxena P (2020) Ohie: Blockchain scaling made simple. In: 2020 IEEE Symposium on Security and Privacy (SP), IEEE, pp 90\u2013105","DOI":"10.1109\/SP40000.2020.00008"},{"key":"1371_CR23","unstructured":"Stathakopoulou C, David T, Pavlovic M, Vukoli\u0107 M (2021) Mir-bft: High-throughput robust bft for decentralized networks. arXiv preprint arXiv:190605552v3"},{"key":"1371_CR24","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. OsDI 99:173\u2013186","journal-title":"OsDI"},{"key":"1371_CR25","doi-asserted-by":"crossref","unstructured":"Crain T, Natoli C, Gramoli V (2021) Red belly: A secure, fair and scalable open blockchain. In: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, pp 466\u2013483","DOI":"10.1109\/SP40001.2021.00087"},{"key":"1371_CR26","unstructured":"Hu K, Guo K, Tang Q, Zhang Z, Cheng H, Zhao Z (2021) Leopard: Scaling bft without sacrificing efficiency. arXiv preprint arXiv:210608114"},{"issue":"2","key":"1371_CR27","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1145\/42282.42283","volume":"35","author":"C Dwork","year":"1988","unstructured":"Dwork C, Lynch N, Stockmeyer L (1988) Consensus in the presence of partial synchrony. Journal of the ACM (JACM) 35(2):288\u2013323","journal-title":"Journal of the ACM (JACM)"},{"issue":"2","key":"1371_CR28","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein DJ, Duif N, Lange T, Schwabe P, Yang BY (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77\u201389","journal-title":"J Cryptogr Eng"},{"key":"1371_CR29","unstructured":"NIST U (2001) Descriptions of sha-256, sha-384 and sha-512"},{"key":"1371_CR30","unstructured":"Alibaba (2021) Dubbo. https:\/\/dubbo.apache.org\/"},{"key":"1371_CR31","unstructured":"WonderNetwork (2018) Global ping statistics: Ping times between wondernetwork servers. https:\/\/wondernetwork.com\/pings"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01371-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01371-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01371-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T09:40:24Z","timestamp":1667900424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01371-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["1371"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01371-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"26 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}