{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:40:30Z","timestamp":1774950030355,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276238"],"award-info":[{"award-number":["62276238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276238"],"award-info":[{"award-number":["62276238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276238"],"award-info":[{"award-number":["62276238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276238"],"award-info":[{"award-number":["62276238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s12083-023-01566-x","type":"journal-article","created":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T06:01:46Z","timestamp":1695621706000},"page":"2915-2928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["BW-PBFT: Practical byzantine fault tolerance consensus algorithm based on credit bidirectionally waning"],"prefix":"10.1007","volume":"16","author":[{"given":"Zhen-Fei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shi-Qi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Pu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li-Ying","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,25]]},"reference":[{"key":"1566_CR1","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, p 21260.\u00a0https:\/\/bitcoin.org\/bitcoin.pdf. Accessed 19 Apr 2023"},{"key":"1566_CR2","first-page":"80","volume":"15","author":"Y Lu","year":"2019","unstructured":"Lu Y (2019) The blockchain: State-of-the-art and research challenges. J Ind Inf Integr 15:80\u201390","journal-title":"J Ind Inf Integr"},{"key":"1566_CR3","first-page":"1937","volume":"38","author":"H Shen","year":"2021","unstructured":"Shen H, Chen Q, Huang H (2021) Review on research of semantic blockchain. Appl Res Comput 38:1937\u20131942","journal-title":"Appl Res Comput"},{"key":"1566_CR4","doi-asserted-by":"publisher","first-page":"57037","DOI":"10.1109\/ACCESS.2022.3169902","volume":"10","author":"SS Kushwaha","year":"2022","unstructured":"Kushwaha SS, Joshi S, Singh D, Kaur M, Lee H-N (2022) Ethereum smart contract analysis tools: A systematic review. IEEE Access 10:57037\u201357062. https:\/\/doi.org\/10.1109\/ACCESS.2022.3169902","journal-title":"IEEE Access"},{"key":"1566_CR5","doi-asserted-by":"publisher","unstructured":"Ou W, Huang S, Zheng J, Zhang Q, Zeng G, Han W (2022) An overview on cross-chain: Mechanism, platforms, challenges and advances. Comput Netw 218. https:\/\/doi.org\/10.1016\/j.comnet.2022.109378","DOI":"10.1016\/j.comnet.2022.109378"},{"key":"1566_CR6","first-page":"134","volume":"41","author":"S Zeng","year":"2020","unstructured":"Zeng S, Huo R, Huang T, Liu J, Wang S, Feng W (2020) Survey of blockchain:principle, progress and application. Appl Res Comput 41:134\u2013151","journal-title":"Appl Res Comput"},{"key":"1566_CR7","doi-asserted-by":"publisher","unstructured":"Ali O, Ally M, Clutterbuck, Dwivedi Y (2020) The state of play of blockchain technology in the financial services sector: A systematic literature review. Int J Inf Manag 54. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102199","DOI":"10.1016\/j.ijinfomgt.2020.102199"},{"issue":"5","key":"1566_CR8","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1093\/jamia\/ocy185","volume":"26","author":"T-T Kuo","year":"2019","unstructured":"Kuo T-T, Rojas HZ, Ohno-Machado L (2019) Comparison of blockchain platforms: a systematic review and healthcare examples. J Am Med Inform Assoc 26(5):462\u2013478. https:\/\/doi.org\/10.1093\/jamia\/ocy185","journal-title":"J Am Med Inform Assoc"},{"key":"1566_CR9","doi-asserted-by":"publisher","first-page":"10127","DOI":"10.1109\/ACCESS.2018.2890507","volume":"7","author":"K Salah","year":"2019","unstructured":"Salah K, Rehman MHU, Nizamuddin N, Al-Fuqaha A (2019) Blockchain for AI: Review and open research challenges. IEEE Access 7:10127\u201310149. https:\/\/doi.org\/10.1109\/ACCESS.2018.2890507","journal-title":"IEEE Access"},{"issue":"2","key":"1566_CR10","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2020","unstructured":"Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo K-KR (2020) A systematic literature review of blockchain cyber security. Digital Communications and Networks 6(2):147\u2013156. https:\/\/doi.org\/10.1016\/j.dcan.2019.01.005","journal-title":"Digital Communications and Networks"},{"key":"1566_CR11","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.jnca.2018.10.019","volume":"125","author":"I Makhdoom","year":"2019","unstructured":"Makhdoom I, Abolhasan M, Abbas H, Ni W (2019) Blockchain\u2019s adoption in IOT: The challenges, and a way forward. J Netw Comput Appl 125:251\u2013279. https:\/\/doi.org\/10.1016\/j.jnca.2018.10.019","journal-title":"J Netw Comput Appl"},{"issue":"12","key":"1566_CR12","first-page":"1","volume":"46","author":"M-S Tan","year":"2020","unstructured":"Tan M-S, Jie Y, Lin D, Li X-J, Xia S (2020) Review of consensus mechanism of blockchain. Comput Eng 46(12):1\u201311","journal-title":"Comput Eng"},{"issue":"2","key":"1566_CR13","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1007\/s12083-021-01268-2","volume":"15","author":"X Cao","year":"2022","unstructured":"Cao X, Zhang J, Wu X, Liu B (2022) A survey on security in consensus and smart contracts. Peer-to-peer Netw Appl 15(2):1008\u20131028. https:\/\/doi.org\/10.1007\/s12083-021-01268-2","journal-title":"Peer-to-peer Netw Appl"},{"key":"1566_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.rser.2018.10.014","volume":"100","author":"M Andoni","year":"2019","unstructured":"Andoni M, Robu V, Flynn D, Abram S, Geach D, Jenkins D, McCallum P, Peacock A (2019) Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renew Sustain Energy Rev 100:143\u2013174","journal-title":"Renew Sustain Energy Rev"},{"issue":"3","key":"1566_CR15","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1093\/rfs\/hhaa075","volume":"34","author":"F Saleh","year":"2021","unstructured":"Saleh F (2021) Blockchain without waste: Proof-of-stake. The Review of financial studies 34(3):1156\u20131190","journal-title":"The Review of financial studies"},{"key":"1566_CR16","unstructured":"King S, Nadal S (2012) Ppcoin: peer-to-peer crypto-currency with proof-of-stake. Self-published paper 19(1). https:\/\/decred.org\/research\/king2012.pdf. Accessed 19 Apr 2023"},{"key":"1566_CR17","unstructured":"Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. In: OsDI, vol. 99, pp. 173\u2013186"},{"issue":"4","key":"1566_CR18","first-page":"329","volume":"49","author":"L Feng","year":"2022","unstructured":"Feng L, Ding Y, Liu K, Ma K, Chang J (2022) Research advance on BFT consensus algorithms. Peer-to-peer Netw Appl 49(4):329\u2013339","journal-title":"Peer-to-peer Netw Appl"},{"key":"1566_CR19","doi-asserted-by":"publisher","unstructured":"Wang ZF, Ren YW, Cao ZY, Zhang LY (2023) LRBFT: Improvement of practical byzantine fault tolerance consensus protocol for blockchains based on lagrange interpolation. Peer-to-peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-022-01431-3","DOI":"10.1007\/s12083-022-01431-3"},{"issue":"1","key":"1566_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ejor.2004.04.028","volume":"169","author":"OS Vaidya","year":"2006","unstructured":"Vaidya OS, Kumar S (2006) Analytic hierarchy process: An overview of applications. Eur J Oper Res 169(1):1\u201329","journal-title":"Eur J Oper Res"},{"key":"1566_CR21","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Kim DI (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7:22328\u201322370","journal-title":"IEEE Access"},{"key":"1566_CR22","doi-asserted-by":"publisher","unstructured":"Liu W, Li Y, Wang X, Peng Y, She W, Tian Z (2021) A donation tracing blockchain model using improved dpos consensus algorithm. Peer-to-peer Netw Appl 14(5, SI), 2789\u20132800. https:\/\/doi.org\/10.1007\/s12083-021-01102-9","DOI":"10.1007\/s12083-021-01102-9"},{"key":"1566_CR23","unstructured":"Neo (2020) Neo White Paper. https:\/\/docs.neo.org\/v2\/docs\/en-us\/basic\/whitepaper.html. Accessed 19 Apr 2023"},{"issue":"4","key":"1566_CR24","doi-asserted-by":"publisher","first-page":"102602","DOI":"10.1016\/j.ipm.2021.102602","volume":"58","author":"C Li","year":"2021","unstructured":"Li C, Zhang J, Yang X, Youlong L (2021) Lightweight blockchain consensus mechanism and storage optimization for resource-constrained iot devices. Inf Process Manage 58(4)102602","journal-title":"Inf Process Manage"},{"key":"1566_CR25","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.future.2022.09.014","volume":"139","author":"B Zhang","year":"2023","unstructured":"Zhang B, Kong L, Li Q, Min X, Liu Y, Che Z (2023) Eb-bft: An elastic batched bft consensus protocol in blockchain. Futur Gener Comput Syst 139:267\u2013279","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"1566_CR26","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/s12083-022-01408-2","volume":"16","author":"J Qi","year":"2023","unstructured":"Qi J, Guan Y (2023) Practical Byzantine fault tolerance consensus based on comprehensive reputation. Peer-to-peer Netw Appl 16(1):420\u2013430. https:\/\/doi.org\/10.1007\/s12083-022-01408-2","journal-title":"Peer-to-peer Netw Appl"},{"key":"1566_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2022.01.029","volume":"164","author":"G Xu","year":"2022","unstructured":"Xu G, Bai H, Xing J, Luo T, Xiong NN, Cheng X, Liu S, Zheng X (2022) SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles. J Parallel Distrib Comput 164:1\u201311. https:\/\/doi.org\/10.1016\/j.jpdc.2022.01.029","journal-title":"J Parallel Distrib Comput"},{"key":"1566_CR28","doi-asserted-by":"publisher","unstructured":"Riahi K, Abouaissa A, Idoumghar L (2022) FPBFT: A Fast PBFT Protocol for Private Blockchains. In: 2022 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1\u20138. https:\/\/doi.org\/10.1109\/IOTSMS58070.2022.10062170","DOI":"10.1109\/IOTSMS58070.2022.10062170"},{"key":"1566_CR29","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ins.2020.12.077","volume":"559","author":"Y Zhan","year":"2021","unstructured":"Zhan Y, Wang B, Lu R, Yu Y (2021) Drbft: Delegated randomization byzantine fault tolerance consensus protocol for blockchains. Inf Sci 559:8\u201321","journal-title":"Inf Sci"},{"issue":"2","key":"1566_CR30","first-page":"274","volume":"39","author":"K Qiao","year":"2022","unstructured":"Qiao K, Tang H, You W, Wang L (2022) Improved byzantine fault tolerance algorithm based on trusted lists. Comput Appl Softw 39(2):274\u2013280","journal-title":"Comput Appl Softw"},{"issue":"3","key":"1566_CR31","doi-asserted-by":"publisher","first-page":"3085","DOI":"10.1007\/s40747-022-00907-2","volume":"9","author":"J Zhang","year":"2023","unstructured":"Zhang J, Yang Y, Zhao D, Wang Y (2023) A node selection algorithm with a genetic method based on PBFT in consortium blockchains. Complex Intell Syst 9(3):3085\u20133105","journal-title":"Complex Intell Syst"},{"key":"1566_CR32","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1007\/s12083-021-01103-8","volume":"14","author":"Y Li","year":"2021","unstructured":"Li Y, Qiao L, Lv Z (2021) An optimized byzantine fault tolerance algorithm for consortium blockchain. Peer-to-Peer Netw Appl 14:2826\u20132839","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"5","key":"1566_CR33","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.1007\/s12083-022-01363-y","volume":"15","author":"H Qushtom","year":"2022","unstructured":"Qushtom H, Misic J, Misic VB, Chang X (2022) A high performance two-layer consensus architecture for blockchain-based iot systems. Peer-to-peer Netw Appl 15(5):2444\u20132456. https:\/\/doi.org\/10.1007\/s12083-022-01363-y","journal-title":"Peer-to-peer Netw Appl"},{"key":"1566_CR34","doi-asserted-by":"publisher","unstructured":"Li J, Li X, Zhao H, Yu B, Zhou T, Cheng H, Sheng N (2023) Mandala: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm. Peer-to-peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-022-01373-w","DOI":"10.1007\/s12083-022-01373-w"},{"key":"1566_CR35","first-page":"19","volume":"12","author":"G Becker","year":"2008","unstructured":"Becker G (2008) Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum, Tech. Rep 12:19","journal-title":"Ruhr-University Bochum, Tech. Rep"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01566-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01566-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01566-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T11:59:06Z","timestamp":1712059146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01566-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,25]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1566"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01566-x","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2900100\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,25]]},"assertion":[{"value":"6 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Yes.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"l declare that the authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/ordiscussion reported in this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}