{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:33:28Z","timestamp":1775745208502,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFA1000600"],"award-info":[{"award-number":["2021YFA1000600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20307"],"award-info":[{"award-number":["U23A20307"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325209"],"award-info":[{"award-number":["62325209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272118"],"award-info":[{"award-number":["62272118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3382602","type":"journal-article","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T18:46:37Z","timestamp":1711651597000},"page":"4534-4546","source":"Crossref","is-referenced-by-count":2,"title":["Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9777-6790","authenticated-orcid":false,"given":"Guoyu","family":"Yang","sequence":"first","affiliation":[{"name":"Institute of Artificial Intelligence and Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4165-3545","authenticated-orcid":false,"given":"Chang","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7386-8706","authenticated-orcid":false,"given":"Qi","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China"}]},{"given":"Jianan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0385-8793","authenticated-orcid":false,"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Guangdong Provincial Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167109"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/197917.198088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22963-3_23"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243812"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00058"},{"key":"ref7","first-page":"5341","article-title":"WaterBear: Practical asynchronous BFT matching security guarantees of partially synchronous BFT","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhang"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611490"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56880-1_25"},{"key":"ref10","article-title":"Studies in secure multiparty computation and applications","author":"Canetti","year":"1996"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90453-1_2"},{"key":"ref12","first-page":"786","article-title":"Perfectly-secure asynchronous MPC for general adversaries","volume-title":"Progress in Cryptology\u2014INDOCRYPT","author":"Choudhury","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2684464.2684470"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354238"},{"key":"ref15","first-page":"1","article-title":"Practical asynchronous proactive secret sharing and key refresh","volume":"1586","author":"G\u00fcnther","year":"2022","journal-title":"Cryptol. ePrint Arch."},{"key":"ref16","first-page":"5413","article-title":"Long live the honey badger: Robust asynchronous DPSS and its applications","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Yurek"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423364"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"ref19","first-page":"5359","article-title":"Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Das"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611468"},{"key":"ref22","first-page":"493","article-title":"DispersedLedger: High-throughput Byzantine consensus on variable bandwidth networks","volume-title":"Proc. 19th USENIX Symp. Networked Syst. Design Implement.","author":"Yang"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_31"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028897"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24385"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559379"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64375-1_13"},{"key":"ref31","article-title":"Not a COINcidence: Sub-quadratic asynchronous Byzantine agreement WHP","author":"Cohen","year":"2020","journal-title":"arXiv:2002.06545"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616633"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/800221.806707"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1983.48"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1993.627344"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"ref37","first-page":"123","article-title":"Random oracles in constantinople: Practical asynchronous Byzantine agreement using cryptography","volume-title":"Proc. 19th Annu. ACM Symp. Princ. Distrib. Comput.","author":"Cachin"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167105"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.13"},{"key":"ref40","article-title":"Cobalt: BFT governance in open networks","author":"MacBrough","year":"2018","journal-title":"arXiv:1802.07240"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87779-0_30"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BF01667080"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806744"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDC.2006.37"},{"key":"ref45","article-title":"Two more algorithms for randomized signature-free asynchronous binary Byzantine consensus with t<n\/3 and O(n\u00b2) messages and O(1) round expected termination","author":"Crain","year":"2020","journal-title":"arXiv:2002.08765"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_15"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611468"},{"key":"ref48","volume-title":"Bug in ABA Protocol\u2019s Use of Common Coin","year":"2024"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10480712.pdf?arnumber=10480712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:40:15Z","timestamp":1725338415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10480712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3382602","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}