{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T02:12:46Z","timestamp":1773713566863,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022ZD0115302"],"award-info":[{"award-number":["2022ZD0115302"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202479"],"award-info":[{"award-number":["62202479"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772030"],"award-info":[{"award-number":["61772030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Program of Xiangjiang Laboratory","award":["22XJ01004"],"award-info":[{"award-number":["22XJ01004"]}]},{"name":"Major Project of Technology Innovation of Hunan Province","award":["2021SK1060-1"],"award-info":[{"award-number":["2021SK1060-1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1109\/tdsc.2025.3621228","type":"journal-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T17:42:48Z","timestamp":1760463768000},"page":"1879-1893","source":"Crossref","is-referenced-by-count":0,"title":["Let the Blocks Fly (Flying Blocks): A Highly Efficient and Practical Consensus Protocol for Authoritative Blockchains"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9690-2302","authenticated-orcid":false,"given":"Xiang","family":"Fu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology and State Key Laboratory of Complex &#x0026; Critical Software Environment, National University of Defense Technology, Changsha, China"}]},{"given":"Liaoliao","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology and State Key Laboratory of Complex &#x0026; Critical Software Environment, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3245-1901","authenticated-orcid":false,"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology and State Key Laboratory of Complex &#x0026; Critical Software Environment, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1236-8318","authenticated-orcid":false,"given":"Bo","family":"Ding","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology and State Key Laboratory of Complex &#x0026; Critical Software Environment, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3166-1682","authenticated-orcid":false,"given":"Jun","family":"Fu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology and State Key Laboratory of Complex &#x0026; Critical Software Environment, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/ijwgs.2018.095647"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.22201\/icat.24486736e.2021.19.4.1046"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2979856"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2790-1"},{"key":"ref6","article-title":"Delegated proof of stake consensus: A robust and flexible decision making protocol","author":"Larimer","year":"2025","journal-title":"Bitshares.org"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2913007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103686"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796859"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3227198"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228892"},{"key":"ref13","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume-title":"Proc. Symp. Operating Syst. Des. Implementation","author":"Castro"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3583668.3594572"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/JGOSS-08-2021-0063"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038519"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3209281.3209317"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref21","first-page":"5341","article-title":"WaterBear: Practical asynchronous BFT matching security guarantees of partially synchronous BFT","volume-title":"Proc. 32nd USENIX Secur. Symp., USENIX Secur. 2023","author":"Zhang"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"ref23","first-page":"305","article-title":"In search of an understandable consensus algorithm","volume-title":"Proc. {USENIX} Annu. Tech. Conf. ({USENIX}{ATC})","author":"Ongaro","year":"2014"},{"key":"ref24","first-page":"273","volume-title":"Proc. Int. Conf. Dependable Syst. Netw.","author":"Baldoni"},{"key":"ref25","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3183935"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3308848"},{"key":"ref32","article-title":"Diembft V4: State machine replication in the diem blockchain","year":"2021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488725"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3211829"},{"key":"ref36","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhaa113"},{"key":"ref39","article-title":"Hybrid consensus: Efficient consensus in the permissionless model","author":"Pass","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref40","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","volume-title":"Proc. 25th Usenix Secur. Symp.","author":"Kogias"},{"issue":"2327","key":"ref41","article-title":"Polkadot: Vision for a heterogeneous multi-chain framework","volume":"21","author":"Wood","year":"2016","journal-title":"White Paper"},{"key":"ref42","article-title":"Casper the friendly finality gadget","author":"Buterin","year":"2017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00189"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3038641"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806743"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11434575\/11202733.pdf?arnumber=11202733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T01:15:14Z","timestamp":1773710114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11202733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":47,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3621228","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]}}}