{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:45:26Z","timestamp":1777128326614,"version":"3.51.4"},"reference-count":112,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634358","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"1-18","source":"Crossref","is-referenced-by-count":16,"title":["SoK: DAG-based Consensus Protocols"],"prefix":"10.1109","author":[{"given":"Mayank","family":"Raikwar","sequence":"first","affiliation":[{"name":"University of Oslo,Norway"}]},{"given":"Nikita","family":"Polyanskii","sequence":"additional","affiliation":[{"name":"IOTA Foundation,Berlin,Germany"}]},{"given":"Sebastian","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"Aix Marseille Universit&#x00E9;,CNRS, Centrale Marseille,France"}]}],"member":"263","reference":[{"key":"ref1","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized business review"},{"key":"ref2","article-title":"Speed-security tradeoffs in blockchain protocols","author":"Kiayias","year":"2015","journal-title":"Cryptology ePrint Archive"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24685"},{"key":"ref4","article-title":"The scalability trilemma in blockchain","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2022.100116"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COINS49042.2020.9191430"},{"issue":"3","key":"ref7","first-page":"30","article-title":"The tangle","volume":"1","author":"Popov","year":"2018","journal-title":"White paper"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3576899"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805533"},{"key":"ref10","article-title":"Mind the gap: Trade-offs between distributed ledger technology characteristics","author":"Kannengie\u03b2er","year":"2019","journal-title":"arXiv preprint arXiv:1906.00861"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102720"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331589"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423249"},{"key":"ref14","article-title":"Flash: An asynchronous payment system with good-case linear communication complexity","author":"Lewis-Pye","year":"2023","journal-title":"arXiv preprint arXiv:2305.03567"},{"key":"ref15","article-title":"Spectre: A fast and scalable cryptocurrency protocol","author":"Sompolinsky","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3211422"},{"key":"ref17","article-title":"Scalable and probabilistic leaderless bft consensus through metastability","author":"Rocket","year":"2019","journal-title":"arXiv preprint arXiv:1906.08936"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_37"},{"issue":"2014","key":"ref19","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3616022"},{"key":"ref21","article-title":"The sui smart contracts platform","year":"2022"},{"key":"ref22","article-title":"Mysticeti: Low-latency dag consensus with fast commit path","author":"Babel","year":"2023"},{"key":"ref23","article-title":"Permissionless consensus","author":"Lewis-Pye","year":"2023","journal-title":"arXiv preprint arXiv:2304.14701"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_27"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"ref30","first-page":"11","article-title":"Byteball: A decentralized system for storage and transfer of value","author":"Churyumov","year":"2016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480990"},{"key":"ref32","article-title":"The DAG KNIGHT Protocol: A Parameterless Generalization of Nakamoto Consensus","author":"Sompolinsky","year":"2022","journal-title":"Cryptology ePrint Archive"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"ref34","article-title":"Ghast: Breaking confirmation delay barrier in nakamoto consensus via adaptive weighted blocks","author":"Li"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2748"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355467"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467905"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00008"},{"key":"ref39","article-title":"Parallel chains: Improving throughput and latency of blockchain protocols via parallel composition","author":"Fitzi","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref40","article-title":"Security analysis of filecoin\u2019s expected consensus in the byzantine vs honest model","author":"Wang","year":"2023","journal-title":"arXiv preprint arXiv:2308.06955"},{"key":"ref41","first-page":"17","article-title":"Nano: A feeless distributed cryptocurrency network","volume":"16","author":"LeMahieu","year":"2018","journal-title":"Nano [Online resource]. URL: https:\/\/nano.org\/en\/whitepaper (date of access: 24.03. 2018)"},{"key":"ref42","article-title":"Chainweb: A proof-of-work parallel-chain architecture for massive throughput","volume":"19","author":"Martino","year":"2018","journal-title":"Chainweb whitepaper"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_9"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559361"},{"key":"ref46","article-title":"Cordial miners: A family of simple, efficient and self-contained consensus protocols for every eventuality","author":"Keidar","year":"2022","journal-title":"arXiv preprint arXiv:2205.09174"},{"key":"ref47","article-title":"Consensus on a DAG","year":"2023"},{"key":"ref48","article-title":"BBCA-CHAIN: OneMessage, Low Latency BFT Consensus on a DAG","author":"Malkhi","year":"2023","journal-title":"arXiv preprint arXiv:2310.06335"},{"key":"ref49","article-title":"Vite: A high performance asynchronous decentralized application platform","author":"Liu","year":"2018","journal-title":"White Paper"},{"issue":"10.1145","key":"ref50","first-page":"343477","article-title":"Towards robust distributed systems","volume":"7","author":"Brewer","year":"2000","journal-title":"PODC"},{"key":"ref51","first-page":"1","article-title":"Hedera: A governing council & public hashgraph network","volume":"1","author":"Baird","year":"2018","journal-title":"The trust layer of the internet, whitepaper"},{"key":"ref52","volume-title":"Phantom","author":"Sompolinsky","year":"2018"},{"key":"ref53","first-page":"515","article-title":"A decentralized blockchain with high throughput and fast confirmation","volume-title":"2020 {USENIX} Annual Technical Conference (USENIX ATC 20)","author":"Li"},{"key":"ref54","article-title":"BBCALEDGER: High Throughput Consensus meets Low Latency","author":"Stathakopoulou","year":"2023","journal-title":"arXiv preprint arXiv:2306.14757"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3205230.3205235"},{"key":"ref56","article-title":"Avalanche native token ($avax) dynamics","author":"Buttolph","year":"2020"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_3"},{"issue":"1999","key":"ref58","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OsDI"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335936"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"ref61","first-page":"45","article-title":"{Bitcoin-NG}: A scalable blockchain protocol","volume-title":"13th USENIX symposium on networked systems design and implementation (NSDI 16)","author":"Eyal"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25283-0_18"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/BF00143070"},{"key":"ref64","article-title":"Scaling nakamoto consensus to thousands of transactions per second","author":"Li","year":"2018","journal-title":"arXiv preprint arXiv:1805.03870"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00045"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00875-7"},{"key":"ref67","article-title":"When is spring coming? a security analysis of avalanche consensus","author":"Amores-Sesar","year":"2022"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343531"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/4221.214134"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095817"},{"key":"ref71","article-title":"Threshold logical clocks for asynchronous distributed coordination and consensus","author":"Ford","year":"2019","journal-title":"arXiv preprint arXiv:1907.07010"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"ref74","article-title":"Game theoretical analysis of dag-ledgers backbone","author":"Galimberti","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24370"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174902"},{"key":"ref77","first-page":"230","article-title":"Dos attacks on blockchain ecosystem","volume-title":"European Conference on Parallel Processing","author":"Raikwar"},{"key":"ref78","article-title":"Time-lock puzzles and timed-release crypto","author":"Rivest","year":"1996","journal-title":"Massachusetts Institute of Technology, Laboratory for Computer Science"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0028"},{"key":"ref80","article-title":"Censorship-resilient and confidential collateralized second-layer payments","volume-title":"Cryptology ePrint Archive","author":"Kostiainen"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain60715.2023.00011"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548053"},{"key":"ref83","first-page":"1","article-title":"The coordicide","author":"Popov","year":"2020","journal-title":"Accessed Jan"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3410699.3413792"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294280"},{"key":"ref87","article-title":"An overview of polkadot slashing","author":"Reinhart","year":"2021"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"ref89","article-title":"SoK: MEV countermeasures: Theory and Practice","author":"Yang","year":"2022","journal-title":"arXiv preprint arXiv:2212.05111"},{"key":"ref90","article-title":"Leveraging machine learning for bidding strategies in miner extractable value (mev) auctions","author":"Raun","year":"2023","journal-title":"Cryptology ePrint Archive, Paper 2023\/1281"},{"key":"ref91","article-title":"Maximal extractable value (mev) protection on a dag","author":"Malkhi","year":"2022","journal-title":"arXiv preprint arXiv:2208.00940"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3590140.3629108"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS59668.2023.10316937"},{"key":"ref94","article-title":"Fantom: A scalable framework for asynchronous distributed systems","author":"Choi","year":"2018","journal-title":"arXiv preprint arXiv:1810.10360"},{"key":"ref95","article-title":"Blockmania: from block dags to consensus","author":"Danezis","year":"2018","journal-title":"arXiv preprint arXiv:1809.01620"},{"key":"ref96","article-title":"Shoal: Improving DAG-BFT Latency And Robustness","author":"Spiegelman","year":"2023","journal-title":"arXiv preprint arXiv:2306.03058"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ispa-bdcloud-socialcom-sustaincom59178.2023.00071"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613164"},{"key":"ref99","article-title":"We will dag you","author":"Amores-Sesar","year":"2023","journal-title":"arXiv preprint arXiv:2311.03092"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00037"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756973"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2991994"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93944-1_19"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3308897.3308951"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4253421"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174950"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467930"},{"key":"ref108","volume-title":"The flare consensus protocol: Fair fast federated byzantine agreement consensus","author":"Rowan","year":"2019"},{"key":"ref109","article-title":"Faithful Simulation of Randomized BFT Protocols on Block DAGs","author":"Attiya","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2963906"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN50884.2021.9334000"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS57875.2023.00056"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Dublin, Ireland","start":{"date-parts":[[2024,5,27]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634358.pdf?arnumber=10634358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:42:25Z","timestamp":1725338545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":112,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634358","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}