{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:58:56Z","timestamp":1740131936207,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172385"],"award-info":[{"award-number":["62172385"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Program for Quantum Science and Technology","award":["2021ZD0302900"],"award-info":[{"award-number":["2021ZD0302900"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tc.2023.3309472","type":"journal-article","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T17:34:13Z","timestamp":1693503253000},"page":"3576-3589","source":"Crossref","is-referenced-by-count":0,"title":["Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6259-5834","authenticated-orcid":false,"given":"Weilin","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Heifei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0332-2649","authenticated-orcid":false,"given":"Wei","family":"Yang","sequence":"additional","affiliation":[{"name":"Hefei National Laboratory, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6278-7094","authenticated-orcid":false,"given":"Lide","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Heifei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8297-5108","authenticated-orcid":false,"given":"Bingren","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Heifei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4365-9713","authenticated-orcid":false,"given":"Youwen","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8417-3256","authenticated-orcid":false,"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Heifei, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume-title":"Decentralized business review","author":"Nakamoto","year":"2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"ref4","first-page":"129","article-title":"Eclipse attacks on bitcoins peer-to-peer network","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Heilman","year":"2015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"issue":"2014","key":"ref9","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume-title":"Ethereum Project Yellow Paper","volume":"151","author":"Wood","year":"2014"},{"key":"ref10","first-page":"173","article-title":"Practical byzantine fault tolerance","volume-title":"Proc. 3rd USENIX Symp. Operating Syst. Des. Implementation (OSDI),","author":"Castro","year":"1999"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2860009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"issue":"6","key":"ref14","first-page":"375","article-title":"Secrecy, authentication, and public key systems","volume":"4","author":"Merkle","year":"1979","journal-title":"Comput. Sci."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"article-title":"The bitcoin lightning network: Scalable off-chain instant payments","year":"2023","author":"Poon","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.36"},{"key":"ref19","article-title":"PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain","volume":"2058","author":"Angelis","year":"2018","journal-title":"CEUR Workshop Proc."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"article-title":"Principles of microeconomics","year":"2001","author":"Mankiw","key":"ref21"},{"issue":"8","key":"ref22","first-page":"5723","article-title":"Enhancing Bitcoin security and performance with strong consistency via collective signing","volume":"37","author":"Kokoriskogias","year":"2016","journal-title":"Appl. Math. Modell."},{"key":"ref23","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","volume-title":"Proc. USENIX Conf. Networked Syst. Des. Implementation","author":"Eyal","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.75"},{"article-title":"Enabling blockchain innovations with pegged sidechains","year":"2014","author":"Back","key":"ref25"},{"article-title":"Slasher: A punitive proof-of-stake algorithm","year":"2015","author":"Buterin","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/1467-937X.00076"},{"article-title":"Mir-BFT: High-throughput robust BFT for decentralized networks","year":"2019","author":"Stathakopoulou","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00087"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04061-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3153701"},{"key":"ref33","article-title":"Delegated proof-of-stake (DPoS)","volume-title":"BitShare Whitepaper","author":"Larimer","year":"2014"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2900648"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_28"},{"key":"ref36","first-page":"801","article-title":"FastKitten: Practical smart contracts on Bitcoin","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Security)","author":"Das","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3148379"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00006"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134033"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164433"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/10311055\/10236902.pdf?arnumber=10236902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T05:48:12Z","timestamp":1716443292000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10236902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":42,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tc.2023.3309472","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"type":"print","value":"0018-9340"},{"type":"electronic","value":"1557-9956"},{"type":"electronic","value":"2326-3814"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}