{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T02:59:02Z","timestamp":1778727542263,"version":"3.51.4"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["19YJCZH214"],"award-info":[{"award-number":["19YJCZH214"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2935149","type":"journal-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T16:01:17Z","timestamp":1565798477000},"page":"118541-118555","source":"Crossref","is-referenced-by-count":277,"title":["Delegated Proof of Stake With Downgrade: A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1697-7903","authenticated-orcid":false,"given":"Fan","family":"Yang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"QingQing","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-2525","authenticated-orcid":false,"given":"Rui","family":"Long","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meiqi","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","author":"ren","year":"2014","journal-title":"Proof of Stake Velocity Building the Social Currency of the Digital Age"},{"key":"ref38","author":"duong","year":"2017","journal-title":"2-Hop Blockchain Combining Proof-of-Work and Proof-of-Stake Securely"},{"key":"ref33","author":"schwartz","year":"2018","journal-title":"The Ripple protocol consensus algorithm"},{"key":"ref32","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"nguyen","year":"2018","journal-title":"J Inf Process Syst"},{"key":"ref31","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2015","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref34","author":"kwon","year":"2014","journal-title":"Tendermint Consensus without Mining"},{"key":"ref10","first-page":"180","article-title":"Decentralizing privacy: Using blockchain to protect personal data","author":"zyskind","year":"2015","journal-title":"Proc IEEE Secur Privacy Workshops"},{"key":"ref40","author":"ball","year":"2017","journal-title":"Proofs of useful work"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2709784"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10258"},{"key":"ref13","author":"vasin","year":"2014","journal-title":"BlackCoin&#x2019;s proof-of-stake protocol v2"},{"key":"ref14","first-page":"1","article-title":"Comparison of blockchain consensus algorithm","volume":"25","author":"song","year":"2018","journal-title":"Applied Soft Computing"},{"key":"ref15","first-page":"173","article-title":"Practical Byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proceedings of Operating System Design and Implementation"},{"key":"ref16","year":"2014","journal-title":"Slimcoin a peer-to-peer crypto-currency with proof-of-burn mining without powerful hardware"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"ref19","author":"mazires","year":"2015","journal-title":"The Stellar Consensus Protocol A Federated Model for Internet-level Consensus"},{"key":"ref28","author":"schuh","year":"2018","journal-title":"The Bitshares Blockchain"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2601610"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905689"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"ref8","author":"rashid","year":"2019","journal-title":"TEduChain A Platform for Crowdsourcing Tertiary Education Fund Using Blockchain Technology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2789929"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref9","first-page":"237","article-title":"Blockchain technology and its applications","volume":"3","author":"huang","year":"2017","journal-title":"Journal of Inf Sec Research"},{"key":"ref1","first-page":"11","article-title":"Survey of block chain","volume":"2","author":"shen","year":"2016","journal-title":"Chin J Netw Inf Secur"},{"key":"ref20","year":"2016","journal-title":"DPOS Consensus Algorithm - The Missing Whitepaper"},{"key":"ref45","year":"2017","journal-title":"Explain Delegated Proof of Stake Like I&#x2019;m 5"},{"key":"ref22","author":"walport","year":"2016","journal-title":"Distributed Ledger Technology Beyond Block Chain"},{"key":"ref21","first-page":"481","article-title":"Blockchain: The state of the art and future trends","volume":"42","author":"yuan","year":"2016","journal-title":"Acta Autom Sinica"},{"key":"ref42","author":"zhang","year":"2018","journal-title":"A Byzantine Fault tolerant algorithm in blockchain"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183546"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2883678"},{"key":"ref43","article-title":"Research on performance improvement of blockchain based on dynamic authorization of byzantine fault tolerance consensus algorithm","author":"liu","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08798621.pdf?arnumber=8798621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:31:06Z","timestamp":1641987066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8798621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2935149","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}