{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:57:22Z","timestamp":1776275842413,"version":"3.50.1"},"reference-count":97,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tnsm.2024.3372604","type":"journal-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T19:15:04Z","timestamp":1709579704000},"page":"3194-3208","source":"Crossref","is-referenced-by-count":20,"title":["SoK: Applications of Sketches and Rollups in Blockchain Networks"],"prefix":"10.1109","volume":"21","author":[{"given":"Arad","family":"Kotzer","sequence":"first","affiliation":[{"name":"Taub Department of Computer Science, Technion - Israel Institute of Technology, Haifa, Israel"}]},{"given":"Daniel","family":"Gandelman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Florida State University, Tallahassee, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-1238","authenticated-orcid":false,"given":"Ori","family":"Rottenstreich","sequence":"additional","affiliation":[{"name":"Viterbi Department of Electrical and Computer Engineering and the Taub Department of Computer Science, Technion - Israel Institute of Technology, Haifa, Israel"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902501"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936094"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.12.019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00031"},{"key":"ref6","volume-title":"Ethereum: A secure decentralised generalised transaction ledger","year":"2014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3080008"},{"key":"ref9","article-title":"Building scalable decentralized payment systems","author":"Adler","year":"2019","journal-title":"arXiv:1904.06441"},{"key":"ref10","volume-title":"An incomplete guide to rollups","author":"Buterin","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2889329"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380200607"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30494-4_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737454"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120248"},{"key":"ref19","article-title":"Secrecy, authentication, and public key systems","author":"Merkle","year":"1979"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.215"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358065"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"ref23","volume-title":"Adaptive enhanced bloom filters for identifying transactions of interest in a blockchain","author":"Rush","year":"2017"},{"key":"ref24","volume-title":"BIP37: Connection bloom filtering","author":"Hearn","year":"2012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/2067137"},{"key":"ref26","first-page":"1","article-title":"ABACUS: Address-partitioned bloom filter on address checking for uniqueness in IoT blockchain","volume-title":"Proc. IEEE\/ACM Int. Conf. Comput. Aided Design (ICCAD)","author":"Wang"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342082"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751349"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3298253"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441910"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.011.2000699"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2922710"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-022-1685-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9921209"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834538"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60248-2_5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_55"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.46298\/dmtcs.3545"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452456"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"ref43","volume-title":"The KECCAK SHA-3 submission","author":"Bertoni","year":"2011"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292537"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2306060"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2019.00012"},{"key":"ref48","volume-title":"The tangle","author":"Popov","year":"2016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_8"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21969-6_23"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3050428"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3195976"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174977"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969695"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3078181"},{"key":"ref56","volume-title":"BIP152: Compact block relay","author":"Corallo","year":"2016"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3052038"},{"key":"ref59","first-page":"1","article-title":"FairLedger: A fair blockchain protocol for financial institutions","volume-title":"Proc. Int. Conf. Princ. Distrib. Syst. (OPODIS)","author":"Lev-Ari"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352820"},{"key":"ref62","article-title":"Anomaly detection in Bitcoin network using unsupervised learning methods","author":"Pham","year":"2016","journal-title":"arXiv:1611.03941"},{"key":"ref63","article-title":"Anomaly detection in the Bitcoin system\u2014A network perspective","author":"Pham","year":"2016","journal-title":"arXiv:1611.03942"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2016.7802939"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34223-4_2"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766765"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.3390\/s20010147"},{"key":"ref68","article-title":"Detecting bot activity in the Ethereum blockchain network","author":"Zwang","year":"2018","journal-title":"arXiv:1810.01591"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_330"},{"key":"ref70","article-title":"The distributed bloom filter","author":"Ramabaja","year":"2019","journal-title":"arXiv:1910.07782"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_15"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1003839"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.14"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2020070103"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_29"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103560"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24632-9_20"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3059075"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3068604"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3626792"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196909"},{"key":"ref85","first-page":"1","article-title":"A model for learned bloom filters and optimizing by sandwiching","volume-title":"Proc. NeurIPS","author":"Mitzenmacher"},{"key":"ref86","volume-title":"The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments","author":"Poon","year":"2016"},{"key":"ref87","volume-title":"Raiden network","year":"2017"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102471"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3200051"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref91","article-title":"Scalable, transparent, and post-quantum secure computational integrity","author":"Ben-Sasson","year":"2018"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/s22176493"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"ref94","volume-title":"zk-SNARKs: A gentle introduction","author":"Nitulescu","year":"2020"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169400"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3471140"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10599562\/10458880.pdf?arnumber=10458880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T04:50:22Z","timestamp":1721364622000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10458880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":97,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3372604","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}