{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:46:00Z","timestamp":1755999960831,"version":"3.28.0"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.1109\/brains52497.2021.9569807","type":"proceedings-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T19:51:25Z","timestamp":1635191485000},"page":"157-164","source":"Crossref","is-referenced-by-count":1,"title":["DisCO: Peer-to-Peer Random Number Generator in Partial Synchronous Systems"],"prefix":"10.1109","author":[{"given":"Mikhail","family":"Krasnoselskii","sequence":"first","affiliation":[]},{"given":"Grigorii","family":"Melnikov","sequence":"additional","affiliation":[]},{"given":"Yury","family":"Yanovich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2658994"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"journal-title":"Verifiable delay functions and attacks","year":"2018","author":"buterin","key":"ref33"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1007\/978-3-319-96884-1_25","article-title":"Verifiable Delay Functions","author":"boneh","year":"2018","journal-title":"Advances in Cryptology - CRYPTO 2018"},{"journal-title":"Misbehaving The making of behavioral economics","year":"2015","author":"thaler","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751326"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.45"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-TW.2016.7520905"},{"journal-title":"Github Ethereum 2 0 Specifications","year":"2020","key":"ref34"},{"key":"ref28","first-page":"1","author":"hashgraph","year":"2018","journal-title":"Hedera hashgraph platform"},{"key":"ref27","first-page":"537","author":"cascudo","year":"2017","journal-title":"SCRAPE Scalable Randomness Attested by Public Entities"},{"key":"ref29","first-page":"1","author":"yanovich","year":"2018","journal-title":"Exonum Byzantine fault tolerant protocol for blockchains"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_30"},{"journal-title":"Random org True Random Number Service","year":"1998","author":"haar","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"journal-title":"Distributed Algorithms","year":"1996","author":"lynch","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162907"},{"key":"ref23","first-page":"944","author":"dollimore","year":"2005","journal-title":"Distributed Systems Concepts and Design"},{"key":"ref26","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"fiat","year":"1986","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"},{"key":"ref25","first-page":"1320","article-title":"Homomorphic encryption random beacon","volume":"2019","author":"cherniaeva","year":"2019","journal-title":"IACR Cryptol ePrint Arch"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref50"},{"journal-title":"BFT RNG HASHGRAPH","year":"2021","author":"melnikov","key":"ref51"},{"key":"ref10","first-page":"1","author":"popov","year":"2018","journal-title":"Local modifiers in the Tangle"},{"journal-title":"Hedera A Public Hashgraph Network &amp Governing Council (v2 1)","year":"2020","author":"baird","key":"ref11"},{"key":"ref40","first-page":"1","article-title":"Efficient Asynchronous Atomic Broadcast","author":"miller","year":"2016","journal-title":"IBM Research"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/fi8010007"},{"key":"ref13","first-page":"421","article-title":"Betting on Blockchain","volume":"17","author":"white","year":"2018","journal-title":"Colorado Technology Law J"},{"key":"ref14","article-title":"BlockLot: Blockchain based Verifiable Lottery","author":"jo","year":"2019","journal-title":"ArXiv"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-0018-0","volume":"95","author":"shiryayev","year":"1984","journal-title":"ser Graduate Texts in Mathematics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90005-0"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref18"},{"key":"ref19","article-title":"An Introduction to Bayesian Analysis","author":"ghosh","year":"2006","journal-title":"Ser Springer Texts in Statistics"},{"journal-title":"Random Number Generation and Monte Carlo Methods","year":"2013","author":"gentle","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2008.227"},{"key":"ref6","first-page":"1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.10.003"},{"key":"ref8","first-page":"357","article-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol","volume":"10401 lncs","author":"kiayias","year":"2017","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref7","first-page":"1","article-title":"The Tangle","author":"popov","year":"2018","journal-title":"IOTA"},{"key":"ref49","first-page":"239","article-title":"Efficient identification and signatures for smart cards","author":"schnorr","year":"1989","journal-title":"Conference on the Theory and Application of Cryptology"},{"key":"ref9","first-page":"66","author":"david","year":"2018","journal-title":"et al Ouroboros PRAOS An Adaptively-Secure Semi-synchronous Proof-of-Stake Blockchain"},{"key":"ref46","article-title":"Standards for Efficient Cryptography","author":"brown","year":"2010","journal-title":"Certicom Research"},{"journal-title":"Public-key Cryptography","year":"2013","author":"salomaa","key":"ref45"},{"key":"ref48","article-title":"On the secure hash algorithm family","author":"penard","year":"2008","journal-title":"Cryptography in Context"},{"key":"ref47","first-page":"89","article-title":"Wallet databases with observers","author":"chaum","year":"1992","journal-title":"Annual International Cryptology Conference"},{"journal-title":"Introduction to Mathematical Statistics","year":"2018","author":"hogg","key":"ref42"},{"key":"ref41","first-page":"643","article-title":"Analysis of the Blockchain Protocol in Asynchronous Networks","volume":"10211 lncs","author":"pass","year":"2017","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3446983.3446986"},{"key":"ref43","first-page":"311","author":"cascudo","year":"2020","journal-title":"ALBATROSS Publicly AttestabLe BATched Randomness Based On Secret Sharing"}],"event":{"name":"2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","start":{"date-parts":[[2021,9,27]]},"location":"Paris, France","end":{"date-parts":[[2021,9,30]]}},"container-title":["2021 3rd Conference on Blockchain Research &amp; Applications for Innovative Networks and Services (BRAINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9568781\/9569777\/09569807.pdf?arnumber=9569807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:32Z","timestamp":1652197652000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9569807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/brains52497.2021.9569807","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]}}}