{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:57:22Z","timestamp":1773377842506,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62301190"],"award-info":[{"award-number":["62301190"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12141108"],"award-info":[{"award-number":["12141108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Colleges and Universities Stable Support Program","award":["GXWD20231129135251001"],"award-info":[{"award-number":["GXWD20231129135251001"]}]},{"name":"National Key Research and Development Program of China","award":["2023YFB3106504"],"award-info":[{"award-number":["2023YFB3106504"]}]},{"name":"Major Key Project of PCL","award":["PCL2023A09"],"award-info":[{"award-number":["PCL2023A09"]}]},{"DOI":"10.13039\/501100001809","name":"Shenzhen Science and Technology Program","doi-asserted-by":"publisher","award":["ZDSYS20210623091809029"],"award-info":[{"award-number":["ZDSYS20210623091809029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Shenzhen Science and Technology Program","doi-asserted-by":"publisher","award":["RCBS20221008093131089"],"award-info":[{"award-number":["RCBS20221008093131089"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3544034","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T15:08:54Z","timestamp":1740064134000},"page":"2664-2676","source":"Crossref","is-referenced-by-count":3,"title":["Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7058-2091","authenticated-orcid":false,"given":"Ximing","family":"Fu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7564-4834","authenticated-orcid":false,"given":"Mo","family":"Li","sequence":"additional","affiliation":[{"name":"School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, Shenzhen, China"}]},{"given":"Qingming","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"}]},{"given":"Tianyang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1987-5643","authenticated-orcid":false,"given":"Shenghao","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, Shenzhen, China"}]},{"given":"Yonghui","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0891-2544","authenticated-orcid":false,"given":"Chuanyi","family":"Liu","sequence":"additional","affiliation":[{"name":"Shenzhen Growth Ring Technology Company Ltd., Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref2","article-title":"Generalized communication and security models in Byzantine agreement","author":"Fitzi","year":"2002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"ref4","article-title":"DFINITY technology overview series, consensus system","author":"Hanke","year":"2018","journal-title":"arXiv:1805.04548"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00044"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref10","volume-title":"Intel(R) Intelligent Storage Acceleration Library","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055481"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00063"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3519270.3538475"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484808"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11561927_42"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref17","first-page":"171","article-title":"Practical and improved Byzantine reliable broadcast and asynchronous verifiable information dispersal from hash functions","author":"Alhaddad","year":"2022","journal-title":"Cryptol. ePrint Archive"},{"key":"ref18","first-page":"493","article-title":"DispersedLedger: High-throughput Byzantine consensus on variable bandwidth networks","volume-title":"Proc. 19th USENIX Symp. Netw. Syst. Design Implement.","author":"Yang"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3519270.3538476"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3563494"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467954"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311884"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_1"},{"key":"ref25","first-page":"485","article-title":"XFT: Practical fault tolerance beyond crashes","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Design Implement. (OSDI 16)","author":"Liu"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417284"},{"key":"ref27","first-page":"27:1","article-title":"Optimal good-case latency for rotating leader synchronous bft","author":"Abraham","year":"2021","journal-title":"Proc. OPODIS"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10896734.pdf?arnumber=10896734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:35:20Z","timestamp":1773347720000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10896734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3544034","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}