{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:42:11Z","timestamp":1740148931201,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s12243-021-00857-9","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T07:02:55Z","timestamp":1623135775000},"page":"61-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Scalable blockchain execution via parallel block validation"],"prefix":"10.1007","volume":"77","author":[{"given":"Maya","family":"Leshkowitz","sequence":"first","affiliation":[]},{"given":"Olivia","family":"Benattasse","sequence":"additional","affiliation":[]},{"given":"Oded","family":"Wertheim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-1238","authenticated-orcid":false,"given":"Ori","family":"Rottenstreich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"857_CR1","unstructured":"Polkadot (2016 )Vision for a heterogeneous multi-chain framework"},{"key":"857_CR2","volume-title":"Byzantine fault tolerance in the age of blockchains","author":"E Buchman Tendermint","year":"2016","unstructured":"Buchman Tendermint E (2016) Byzantine fault tolerance in the age of blockchains. Master\u2019s Thesis at University of Guelph, Ontario"},{"key":"857_CR3","unstructured":"Abraham I, Gueta G, Malkhi D (2018) Hot-stuff the linear, optimal-resilience one-message BFT devil. arXiv:1803.05069"},{"key":"857_CR4","doi-asserted-by":"crossref","unstructured":"Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"857_CR5","doi-asserted-by":"crossref","unstructured":"Allombert V, Bourgoin M, Tesson J (2019) Introduction to the Tezos Blockchain. International Conference on High Performance Computing & Simulation (HPCS)","DOI":"10.1109\/HPCS48598.2019.9188227"},{"key":"857_CR6","doi-asserted-by":"crossref","unstructured":"Luu L, Teutsch J, Kulkarni R, Saxena P (2015) Demystifying incentives in the consensus computer conference on computer and communications security (CCS)","DOI":"10.1145\/2810103.2813659"},{"key":"857_CR7","unstructured":"Plasma (2017) Scalable autonomous smart contracts"},{"key":"857_CR8","unstructured":"Sprites and State Channels (2017) Payment networks that go faster than lightning"},{"key":"857_CR9","doi-asserted-by":"crossref","unstructured":"Androulaki E, et al. (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Eurosys","DOI":"10.1145\/3190508.3190538"},{"key":"857_CR10","doi-asserted-by":"crossref","unstructured":"Bleumer G (2011) Threshold signature. In: Encyclopedia of cryptography and security, 2nd edn., pp 1294\u20131296","DOI":"10.1007\/978-1-4419-5906-5_233"},{"key":"857_CR11","doi-asserted-by":"crossref","unstructured":"Desmedt Y (2011) Threshold cryptography. Encyclopedia of Cryptography and Security, pp 1288\u20131293","DOI":"10.1007\/978-1-4419-5906-5_330"},{"key":"857_CR12","doi-asserted-by":"crossref","unstructured":"Dickerson TD, Gazzillo P, Herlihy M, Koskinen E (2018) Adding concurrency to smart contracts. Bullet EATCS:124","DOI":"10.1145\/3087801.3087835"},{"key":"857_CR13","unstructured":"Durov N (2017) Telegram open network"},{"key":"857_CR14","unstructured":"Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. In: Springer CRYPTO"},{"key":"857_CR15","doi-asserted-by":"crossref","unstructured":"Gilad Y, Hemo R, Micali S, Vlachos G, Zeldovich N (2017) Algorand: Scaling byzantine agreements for cryptocurrencies In: ACM Symposium on operating systems principles (SOSP)","DOI":"10.1145\/3132747.3132757"},{"issue":"2","key":"857_CR16","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/173682.165164","volume":"21","author":"M Herlihy","year":"1993","unstructured":"Herlihy M, Moss JEB (1993) Transactional memory: architectural support for lock-free data structures. SIGARCH Comput. Archit. 21(2):289\u2013300","journal-title":"SIGARCH Comput. Archit."},{"key":"857_CR17","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Syta E, Ford B (2018) : A secure, scale-out, decentralized ledger via sharding. 2018 IEEE Symposium on Security and Privacy (SP)","DOI":"10.1109\/SP.2018.000-5"},{"key":"857_CR18","doi-asserted-by":"crossref","unstructured":"Merkle RC (1987) A digital signature based on a conventional encryption function. In: CRYPTO","DOI":"10.1007\/3-540-48184-2_32"},{"key":"857_CR19","doi-asserted-by":"crossref","unstructured":"Pease MC, Shostak RE, Lamport L (1980) Reaching agreement in the presence of faults. J ACM 27(2):228\u2013234","DOI":"10.1145\/322186.322188"},{"key":"857_CR20","doi-asserted-by":"crossref","unstructured":"Mizrahi A, Rottenstreich O (2020) State sharding with space-aware representations. In: IEEE ICBC","DOI":"10.1109\/ICBC48266.2020.9169402"},{"key":"857_CR21","doi-asserted-by":"crossref","unstructured":"Pagh R, Rodler FF (2001) Cuckoo hashing. In: European symposium on algorithms (ESA)","DOI":"10.7146\/brics.v8i32.21692"},{"key":"857_CR22","doi-asserted-by":"crossref","unstructured":"Luo L, Guo D, Rottenstreich O, Ma RTB, Luo X, Ren B (2019) The consistent cuckoo filter. In: IEEE Infocom","DOI":"10.1109\/INFOCOM.2019.8737454"},{"key":"857_CR23","doi-asserted-by":"crossref","unstructured":"Shoup V (2000) Practical threshold signatures. In: EUROCRYPT","DOI":"10.1007\/3-540-45539-6_15"},{"key":"857_CR24","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger"},{"key":"857_CR25","doi-asserted-by":"crossref","unstructured":"Neha\u00ef Z, Bobot F (2019) Deductive proof of industrial smart contracts using Why3. In: Formal Methods Workshops","DOI":"10.1007\/978-3-030-54994-7_22"},{"key":"857_CR26","doi-asserted-by":"crossref","unstructured":"Zamani M, Movahedi M, Raykova M (2018) Rapidchain: scaling blockchain via full sharding. In: ACM Conference on computer and communications security (SIGSAC)","DOI":"10.1145\/3243734.3243853"},{"key":"857_CR27","unstructured":"Aggarwal A, Guo Y (2018) A simple reduction from state machine replication to binary agreement in partially synchronous or Asynchronous Networks. IACR Cryptol. ePrint Arch."}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00857-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-021-00857-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00857-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T14:32:58Z","timestamp":1645194778000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-021-00857-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":27,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["857"],"URL":"https:\/\/doi.org\/10.1007\/s12243-021-00857-9","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2021,6,8]]},"assertion":[{"value":"24 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}