{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T06:05:10Z","timestamp":1750831510297,"version":"3.40.5"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100019062","name":"Tianjin Research Innovation Project for Postgraduate Students","doi-asserted-by":"publisher","award":["No.2022BKYZ043"],"award-info":[{"award-number":["No.2022BKYZ043"]}],"id":[{"id":"10.13039\/501100019062","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072336"],"award-info":[{"award-number":["62072336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015406","name":"Tianjin Municipal Science and Technology Bureau","doi-asserted-by":"publisher","award":["19ZXZNGX00080"],"award-info":[{"award-number":["19ZXZNGX00080"]}],"id":[{"id":"10.13039\/501100015406","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01831-7","type":"journal-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:42:56Z","timestamp":1732693376000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hague: a hybrid scaling stateless blockchain"],"prefix":"10.1007","volume":"18","author":[{"given":"Yi","family":"Li","sequence":"first","affiliation":[]},{"given":"Jinsong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zening","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Duobin","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"1831_CR1","doi-asserted-by":"publisher","first-page":"100492","DOI":"10.1016\/j.cosrev.2022.100492","volume":"45","author":"D Marijan","year":"2022","unstructured":"Marijan D, Lal C (2022) Blockchain verification and validation: techniques, challenges, and research directions. Comput Sci Rev 45:100492","journal-title":"Comput Sci Rev"},{"issue":"1","key":"1831_CR2","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/COMST.2022.3204702","volume":"25","author":"B Cao","year":"2023","unstructured":"Cao B, Wang Z, Zhang L et al (2023) Blockchain systems, technologies, and applications: a methodology perspective. IEEE Communications Surveys & Tutorials 25(1):353\u2013385. https:\/\/doi.org\/10.1109\/COMST.2022.3204702","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1831_CR3","doi-asserted-by":"crossref","unstructured":"Musa Baig S, Javed MU, Almogren A, et al (2023) A blockchain and stacked machine learning approach for malicious nodes\u2019 detection in internet of things. Peer-to-Peer Networking and Applications, pp 1\u201322","DOI":"10.1007\/s12083-023-01554-1"},{"issue":"12","key":"1831_CR4","doi-asserted-by":"publisher","first-page":"13242","DOI":"10.1109\/TVT.2022.3198004","volume":"71","author":"Y Liu","year":"2022","unstructured":"Liu Y, Xiong Z, Hu Q et al (2022) Vrepchain: a decentralized and privacy-preserving reputation system for social internet of vehicles based on blockchain. IEEE Trans Veh Technol 71(12):13242\u201313253. https:\/\/doi.org\/10.1109\/TVT.2022.3198004","journal-title":"IEEE Trans Veh Technol"},{"key":"1831_CR5","first-page":"100288","volume":"26","author":"J Gao","year":"2021","unstructured":"Gao J, Adjei-Arthur B, Sifah EB et al (2021) Supply chain equilibrium on a game theory-incentivized blockchain network. J Ind Inf Integr 26:100288","journal-title":"J Ind Inf Integr"},{"key":"1831_CR6","doi-asserted-by":"publisher","first-page":"62018","DOI":"10.1109\/ACCESS.2018.2875782","volume":"6","author":"G Perboli","year":"2018","unstructured":"Perboli G, Musso S, Rosano M (2018) Blockchain in logistics and supply chain: a lean approach for designing real-world use cases. IEEE Access 6:62018\u201362028","journal-title":"IEEE Access"},{"key":"1831_CR7","doi-asserted-by":"crossref","unstructured":"Raghav, Andola N, Venkatesan S, et al (2023) Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain. Peer-to-Peer Networking and Applications, pp 1\u201323","DOI":"10.1007\/s12083-023-01521-w"},{"key":"1831_CR8","volume":"25","author":"J Qu","year":"2021","unstructured":"Qu J (2021) Blockchain in medical informatics. J Ind Inf Integr 25:100258","journal-title":"J Ind Inf Integr"},{"key":"1831_CR9","doi-asserted-by":"crossref","unstructured":"Liang W, Wang Y, Ding Y, et al (2023) An efficient blockchain-based anonymous authentication and supervision system. Peer-to-Peer Networking and Applications, pp 1\u201320","DOI":"10.21203\/rs.3.rs-1977769\/v1"},{"key":"1831_CR10","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.future.2022.05.015","volume":"135","author":"CH Liao","year":"2022","unstructured":"Liao CH, Guan X, Cheng JH et al (2022) Blockchain-based identity management and access control framework for open banking ecosystem. Future Gener Comput Syst 135:450\u2013466","journal-title":"Future Gener Comput Syst"},{"key":"1831_CR11","doi-asserted-by":"crossref","unstructured":"Li Y, Wang J, Zhang H (2023) A survey of state-of-the-art sharding blockchains: models, components, and attack surfaces. Journal of Network and Computer Applications, pp 103686","DOI":"10.1016\/j.jnca.2023.103686"},{"key":"1831_CR12","doi-asserted-by":"crossref","unstructured":"Luu L, Narayanan V, Zheng C, et al (2016) A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 17\u201330","DOI":"10.1145\/2976749.2978389"},{"key":"1831_CR13","doi-asserted-by":"crossref","unstructured":"Zamani M, Movahedi M, Raykova M (2018) Rapidchain: scaling blockchain via full sharding. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 931\u2013948","DOI":"10.1145\/3243734.3243853"},{"key":"1831_CR14","unstructured":"Corwin S (2023) Validium. https:\/\/ethereum.org\/en\/developers\/docs\/scaling\/validium"},{"key":"1831_CR15","doi-asserted-by":"crossref","unstructured":"Singh A, Click K, Parizi RM, et al (2020) Sidechain technologies in blockchain networks: an examination and state-of-the-art review. J Netw Comput Appl 149","DOI":"10.1016\/j.jnca.2019.102471"},{"key":"1831_CR16","first-page":"388","volume":"2022","author":"ZL Ge","year":"2022","unstructured":"Ge ZL, Zhang Y, Long Y et al (2022) Shaduf++: non-cycle and privacy-preserving payment channel rebalancing. IACR Cryptol ePrint Arch 2022:388","journal-title":"IACR Cryptol ePrint Arch"},{"key":"1831_CR17","unstructured":"Alex G (2021) Zkrollup vs. validium.https:\/\/blog.matter-labs.io\/zkrollup-vs-validium-starkex-5614e38bc263"},{"key":"1831_CR18","unstructured":"Justin D (2021) Starkex validium ransom attack. https:\/\/notes.ethereum.org\/@JustinDrake\/ByJICE82L"},{"key":"1831_CR19","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias E, Jovanovic P, Gasser L, et al (2018) Omniledger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE symposium on security and privacy (SP). IEEE, pp 583\u2013598","DOI":"10.1109\/SP.2018.000-5"},{"key":"1831_CR20","doi-asserted-by":"crossref","unstructured":"Hong Z, Guo S, Li P, et al (2021) Pyramid: a layered sharding blockchain system. In: IEEE INFOCOM 2021-IEEE conference on computer communications, IEEE, pp 1\u201310","DOI":"10.1109\/INFOCOM42981.2021.9488747"},{"key":"1831_CR21","unstructured":"Ozdayi MS, Guo Y, Zamani M (2022) Instachain: breaking the sharding limits via adjustable quorums. Cryptology ePrint Archive"},{"key":"1831_CR22","doi-asserted-by":"crossref","unstructured":"Shenwei C, Zhen HL, Yu L, et al (2022) Dechain: a blockchain framework enhancing decentralization via sharding. In: Australasian conference on information security and privacy","DOI":"10.1007\/978-3-031-22301-3_23"},{"key":"1831_CR23","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.14778\/3476249.3476283","volume":"14","author":"C Xu","year":"2021","unstructured":"Xu C, Zhang C, Xu J et al (2021) Slimchain: scaling blockchain transactions through off-chain storage and parallel processing. Proc VLDB Endow 14:2314\u20132326","journal-title":"Proc VLDB Endow"},{"key":"1831_CR24","doi-asserted-by":"crossref","unstructured":"Yue C, Xie Z, Zhang M, et al (2020) Analysis of indexing structures for immutable data. Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data","DOI":"10.1145\/3318464.3389773"},{"key":"1831_CR25","unstructured":"Joseph C (2023) Statelessness, state expiry and history expiry. https:\/\/ethereum.org\/en\/roadmap\/statelessness\/"},{"key":"1831_CR26","unstructured":"Al-Bassam M, Sonnino A, Buterin V (2018) Fraud proofs: Maximising light client security and scaling blockchains with dishonest majorities 160. arXiv:1809.09044"},{"key":"1831_CR27","unstructured":"Corwin S (2023) Data availability. https:\/\/ethereum.org\/en\/developers\/docs\/data-availability"},{"key":"1831_CR28","doi-asserted-by":"crossref","unstructured":"Micali S, Rabin M, Vadhan S (1999) Verifiable random functions. In: 40th annual symposium on foundations of computer science (cat. No. 99CB37039). IEEE, pp 120\u2013130","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"1831_CR29","unstructured":"Matt C (2016) Compact block relay. https:\/\/github.com\/bitcoin\/bips\/wiki\/Comments:BIP-0152"},{"key":"1831_CR30","unstructured":"Michael Z (2018) Sharding: How many shards are safe? https:\/\/medium.com\/logos-network\/sharding-how-many-shards-are-safe-bc361c487083"},{"key":"1831_CR31","doi-asserted-by":"crossref","unstructured":"Canetti R (2001) Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE symposium on foundations of computer science. IEEE, pp 136\u2013145","DOI":"10.1109\/SFCS.2001.959888"},{"key":"1831_CR32","unstructured":"Williams S, Diordiiev V, Berman L, et al (2019) Arweave: a protocol for economically sustainable information permanence. arweave org, Tech Rep"},{"key":"1831_CR33","doi-asserted-by":"crossref","unstructured":"Xi J, Xu G, Zou S, et al (2023) A blockchain dynamic sharding scheme based on hidden markov model in collaborative iot. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2023.3294234"},{"issue":"6","key":"1831_CR34","doi-asserted-by":"publisher","first-page":"5205","DOI":"10.1109\/JIOT.2022.3222382","volume":"10","author":"VS Naresh","year":"2022","unstructured":"Naresh VS, Allavarpu VD, Reddi S (2022) Blockchain iota sharding-based scalable secure group communication in large vanets. IEEE Internet of Things Journal 10(6):5205\u20135213","journal-title":"IEEE Internet of Things Journal"},{"key":"1831_CR35","doi-asserted-by":"crossref","unstructured":"Liu G, Wu Z, Zhou Y, et al (2023) Communitychain: towards a scalable blockchain in smart home. IEEE Transactions on Network and Service Management","DOI":"10.1109\/TNSM.2023.3241136"},{"issue":"3","key":"1831_CR36","first-page":"641","volume":"72","author":"T Nguyen","year":"2022","unstructured":"Nguyen T, Thai MT (2022) Denial-of-service vulnerability of hash-based transaction sharding: attack and countermeasure. IEEE Trans Comput 72(3):641\u2013652","journal-title":"IEEE Trans Comput"},{"key":"1831_CR37","doi-asserted-by":"crossref","unstructured":"Liu Z, Xiang Y, Shi J, et al (2019) Hyperservice: interoperability and programmability across heterogeneous blockchains. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, pp 549\u2013566","DOI":"10.1145\/3319535.3355503"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01831-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01831-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01831-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:56Z","timestamp":1747474376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01831-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1831"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01831-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"22 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing of interest"}},{"value":"All authors declare that they have no conflicts of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This publication has been consented to by all authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"19"}}