{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:02:29Z","timestamp":1773378149188,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834538","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"2583-2588","source":"Crossref","is-referenced-by-count":9,"title":["Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems"],"prefix":"10.1109","author":[{"given":"Debarnab","family":"Mitra","sequence":"first","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Los Angeles,USA"}]},{"given":"Lev","family":"Tauz","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Los Angeles,USA"}]},{"given":"Lara","family":"Dolecek","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Los Angeles,USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2014.05.012"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IREPGELC.1954.6499441"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.896864"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.839541"},{"key":"ref30","year":"0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.012313.110692"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2015.7406996"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.061611.110862"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592698"},{"key":"ref10","article-title":"Information dispersal with provable retrievability for rollups","author":"nazirkhanova","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITW46852.2021.9457630"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834538"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.36227\/techrxiv.16532853.v1","article-title":"Overcoming data availability attacks in blockchain systems: LDPC code design for coded merkle tree","author":"mitra","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00271"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2814624"},{"key":"ref16","article-title":"Downsampling and transparent coding for blockchain","author":"huang","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9048887"},{"key":"ref18","article-title":"SeF: A secure fountain architecture for slashing storage costs in blockchains","author":"kadhe","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352825"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2943331"},{"key":"ref28","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511791338"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2017.8250199"},{"key":"ref5","article-title":"Global supply chains are about to get better, thanks to blockchain","author":"casey","year":"2017","journal-title":"Harvard Business Review"},{"key":"ref29","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"ref2","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_8"},{"key":"ref1","article-title":"Bitcoin: A peer to peer electronic cash system","author":"nakamato","year":"2008"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00036"},{"key":"ref22","article-title":"PolyShard: Coded sharding achieves linearly scaling efficiency and security simultaneously","volume":"16","author":"li","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849573"},{"key":"ref24","article-title":"ACeD: Scalable data availability oracle","author":"sheng","year":"2020"},{"key":"ref23","article-title":"Low latency cross-shard transactions in coded blockchain","author":"wang","year":"2020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops53468.2022.9814692"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ITW48936.2021.9611473"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834538.pdf?arnumber=9834538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:36:32Z","timestamp":1773347792000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834538","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}