{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:11:59Z","timestamp":1754093519151,"version":"3.41.2"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFF0905300"],"award-info":[{"award-number":["2023YFF0905300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2468205","62372149","U23A20303"],"award-info":[{"award-number":["U2468205","62372149","U23A20303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"China Scholarship Council; and in part by the Key Laboratory of Knowledge Engineering with Big Data (Ministry of Education of China","doi-asserted-by":"publisher","award":["BigKEOpen2025-04"],"award-info":[{"award-number":["BigKEOpen2025-04"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3592566","type":"journal-article","created":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T17:54:21Z","timestamp":1753379661000},"page":"7777-7792","source":"Crossref","is-referenced-by-count":0,"title":["The Deferred Byzantine Generals Problem"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2118-8896","authenticated-orcid":false,"given":"Xuyang","family":"Liu","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6313-4407","authenticated-orcid":false,"given":"Zijian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2597-8932","authenticated-orcid":false,"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Peng","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0962-4464","authenticated-orcid":false,"given":"Yajie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-0813","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"51","article-title":"Paxos made simple","volume":"32","author":"Lamport","year":"2001","journal-title":"ACM SIGACT News (Distributed Comput. Column)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335936"},{"issue":"2","key":"ref3","first-page":"15","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume":"4","author":"Nakamoto","year":"2008","journal-title":"Bitcoin"},{"volume-title":"Timed-Release Crypto","year":"1993","author":"May","key":"ref4"},{"volume-title":"Time-lock Puzzles and Timed-release Crypto","year":"1996","author":"Rivest","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68382-4_13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330336"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0324-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978415"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560704"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467905"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_28"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335934"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_5"},{"key":"ref19","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OsDI"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0020-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77883-5_15"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_19"},{"key":"ref27","first-page":"22","article-title":"Advanced encryption standard","volume":"19","author":"Rijmen","year":"2001","journal-title":"Federal Inf. Process. Standards Publications, Nat. Inst. Standards Technol."},{"key":"ref28","first-page":"305","article-title":"In search of an understandable consensus algorithm","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Ongaro"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.36"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2025.3572553"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483584"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3368280"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958223"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/62546.62549"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"article-title":"Tendermint: Byzantine fault tolerance in the age of blockchains","year":"2016","author":"Buchman","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3399772"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519579"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3262283"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3130583"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_13"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.72"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243788"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560583"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68394-7_12"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_18"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11095797.pdf?arnumber=11095797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T18:13:59Z","timestamp":1754072039000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11095797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3592566","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}