{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:42:11Z","timestamp":1774942931050,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243812","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"2028-2041","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":153,"title":["BEAT"],"prefix":"10.1145","author":[{"given":"Sisi","family":"Duan","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"Univeristy of North Carolina, Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Haibin","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095817"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"e_1_3_2_2_3_1","unstructured":"Amazon Web Services (AWS). https:\/\/aws.amazon.com\/  Amazon Web Services (AWS). https:\/\/aws.amazon.com\/"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.70"},{"key":"e_1_3_2_2_5_1","unstructured":"Hyperledger Whitepaper: An introduction to Hyperledger. https:\/\/www.hyperledger.org\/wp-content\/uploads\/2018\/08\/HL_Whitepaper_IntroductiontoHyperledger.pdf  Hyperledger Whitepaper: An introduction to Hyperledger. https:\/\/www.hyperledger.org\/wp-content\/uploads\/2018\/08\/HL_Whitepaper_IntroductiontoHyperledger.pdf"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14472-6_6"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658994"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.53"},{"key":"e_1_3_2_2_10_1","first-page":"1491","volume-title":"GLOBECOM '03","author":"Baek J.","year":"2003","unstructured":"J. Baek and Y. Zheng . Simple and efficient threshold cryptosystem from the gap Diffie-Hellman group . GLOBECOM '03 , pp. 1491 -- 1495 , 2003 . J. Baek and Y. Zheng. Simple and efficient threshold cryptosystem from the gap Diffie-Hellman group. GLOBECOM '03, pp. 1491--1495, 2003."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2010.118"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706031"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/197917.198088"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352610"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/648120.747061"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_15"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_2_20_1","volume-title":"OSDI","author":"Burrows M.","year":"2006","unstructured":"M. Burrows . The Chubby lock service for loosely-coupled distributed systems . OSDI , 2006 . M. Burrows. The Chubby lock service for loosely-coupled distributed systems. OSDI, 2006."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704283"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0318-0"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738262"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.9"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.56"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_2_28_1","volume-title":"NSDI","author":"Clement A.","year":"2009","unstructured":"A. Clement , E. Wong , L. Alvisi , M. Dahlin , and M. Marchetti . Making Byzantine fault tolerant systems tolerate Byzantine faults . NSDI 2009 . A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti. Making Byzantine fault tolerant systems tolerate Byzantine faults. NSDI 2009."},{"key":"e_1_3_2_2_29_1","volume-title":"OSDI","author":"Corbett J.","year":"2012","unstructured":"J. Corbett : Google's globally-distributed database . OSDI , 2012 . J. Corbett et al. Spanner: Google's globally-distributed database. OSDI, 2012."},{"key":"e_1_3_2_2_30_1","unstructured":"Corda. https:\/\/github.com\/corda\/corda  Corda. https:\/\/github.com\/corda\/corda"},{"key":"e_1_3_2_2_31_1","volume-title":"OSDI","author":"Cowling J.","year":"2006","unstructured":"J. Cowling HQ replication : A hybrid quorum protocol for Byzantine fault tolerance . OSDI 2006 . J. Cowling et al. HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. OSDI 2006."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516750"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14472-6_7"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2312331"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.64"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2016.031"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1989.37934"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009729"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496983"},{"key":"e_1_3_2_2_43_1","volume-title":"USENIX FAST","author":"Hafner J. L.","year":"2005","unstructured":"J. L. Hafner . Weaver codes : Highly fault tolerant erasure codes for storage systems . USENIX FAST , 2005 . J. L. Hafner. Weaver codes: Highly fault tolerant erasure codes for storage systems. USENIX FAST, 2005."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.40"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281122"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294269"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/114005.102808"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/850929.851942"},{"key":"e_1_3_2_2_50_1","volume-title":"USENIX FAST","author":"Hu Y.","year":"2012","unstructured":"Y. Hu , H. Chen , P. Lee , and Y. Tang . NCCloud: Applying network coding for the storage repair in a Cloud-of-Clouds . USENIX FAST , 2012 . Y. Hu, H. Chen, P. Lee, and Y. Tang. NCCloud: Applying network coding for the storage repair in a Cloud-of-Clouds. USENIX FAST, 2012."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435204.2435207"},{"key":"e_1_3_2_2_52_1","volume-title":"USENIX ATC'12","author":"Huang C.","year":"2012","unstructured":"C. Huang , H. Simitci , Y. Xu , A. Ogus , B. Calder , P. Gopalan , J. Li , and S. Yekhanin . Erasure coding in Windows Azure Storage . USENIX ATC'12 , 2012 . C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. Li, and S. Yekhanin. Erasure coding in Windows Azure Storage. USENIX ATC'12, 2012."},{"key":"e_1_3_2_2_53_1","volume-title":"USENIX ATC","author":"Hunt P.","year":"2010","unstructured":"P. Hunt , M. Konar , F. P. Junqueira , and B. Reed . ZooKeeper: Wait-free coordination for Internet-scale systems . USENIX ATC 2010 . P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. ZooKeeper: Wait-free coordination for Internet-scale systems. USENIX ATC 2010."},{"key":"e_1_3_2_2_54_1","unstructured":"IBM Watson Health Announces Collaboration to Study the Use of Blockchain Technology for Secure Exchange of Healthcare Data. https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/51394.wss  IBM Watson Health Announces Collaboration to Study the Use of Blockchain Technology for Secure Exchange of Healthcare Data. https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/51394.wss"},{"key":"e_1_3_2_2_55_1","unstructured":"IBM Announces Major Blockchain Solution to Speed Global Payments. https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/53290.wss  IBM Announces Major Blockchain Solution to Speed Global Payments. https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/53290.wss"},{"key":"e_1_3_2_2_56_1","unstructured":"Iroha. https:\/\/github.com\/hyperledger\/iroha  Iroha. https:\/\/github.com\/hyperledger\/iroha"},{"key":"e_1_3_2_2_57_1","volume-title":"Distributed key generation in the wild. IACR Cryptology ePrint Archive 2012: 377","author":"Kate A.","year":"2012","unstructured":"A. Kate , Y. Huang , and I. Goldberg . Distributed key generation in the wild. IACR Cryptology ePrint Archive 2012: 377 ( 2012 ). A. Kate, Y. Huang, and I. Goldberg. Distributed key generation in the wild. IACR Cryptology ePrint Archive 2012: 377 (2012)."},{"key":"e_1_3_2_2_58_1","volume-title":"USENIX FAST","author":"Khan O.","year":"2012","unstructured":"O. Khan , R. Burns , J. Plank , W. Pierce , and C. Huang . Rethinking erasure codes for cloud file systems: Minimizing I\/O for recovery and degraded reads . USENIX FAST , 2012 . O. Khan, R. Burns, J. Plank, W. Pierce, and C. Huang. Rethinking erasure codes for cloud file systems: Minimizing I\/O for recovery and degraded reads. USENIX FAST, 2012."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/164051.164075"},{"key":"e_1_3_2_2_61_1","unstructured":"Liberasurecode. https:\/\/github.com\/openstack\/liberasurecode  Liberasurecode. https:\/\/github.com\/openstack\/liberasurecode"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/359863.359878"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993.2994"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01786227"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01786227"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.56"},{"key":"e_1_3_2_2_69_1","volume-title":"The Theory of Error Correcting Codes","author":"MacWilliams F. J.","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane . The Theory of Error Correcting Codes . Amsterdam , North-Holland , 1977 . F. J. MacWilliams and N. J. A. Sloane. The Theory of Error Correcting Codes. Amsterdam, North-Holland, 1977."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.6028\/jres.120.002"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611468"},{"key":"e_1_3_2_2_73_1","unstructured":"J. Plank and K. Greenan. Jerasure 2.0. http:\/\/jerasure.org\/jerasure-2.0\/  J. Plank and K. Greenan. Jerasure 2.0. http:\/\/jerasure.org\/jerasure-2.0\/"},{"key":"e_1_3_2_2_74_1","volume-title":"FAST 2013","author":"Plank J.","year":"2013","unstructured":"J. Plank , K. Greenan , and E. Miller . Screaming fast Galois field arithmetic using Intel SIMD instructions . FAST 2013 , 2013 . Latest version: http:\/\/lab.jerasure.org\/jerasure\/gf-complete J. Plank, K. Greenan, and E. Miller. Screaming fast Galois field arithmetic using Intel SIMD instructions. FAST 2013, 2013. Latest version: http:\/\/lab.jerasure.org\/jerasure\/gf-complete"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.43"},{"key":"e_1_3_2_2_76_1","unstructured":"PyECLib. https:\/\/pypi.python.org\/pypi\/PyECLib  PyECLib. https:\/\/pypi.python.org\/pypi\/PyECLib"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/177492.177745"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488339"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706150"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756190"},{"key":"e_1_3_2_2_84_1","unstructured":"V. Shoup. NTL: A library for doing number theory. http:\/\/shoup.net\/ntl  V. Shoup. NTL: A library for doing number theory. http:\/\/shoup.net\/ntl"},{"key":"e_1_3_2_2_85_1","volume-title":"EUROCRYPT '98","author":"Shoup V.","unstructured":"V. Shoup and R. Gennaro . Securing threshold cryptosystems against chosen ciphertext attack . EUROCRYPT '98 . V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. EUROCRYPT '98."},{"key":"e_1_3_2_2_86_1","unstructured":"SingularityNET. https:\/\/singularitynet.io\/  SingularityNET. https:\/\/singularitynet.io\/"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00018"},{"key":"e_1_3_2_2_88_1","unstructured":"Tendermint core. https:\/\/github.com\/tendermint\/tendermint  Tendermint core. https:\/\/github.com\/tendermint\/tendermint"},{"key":"e_1_3_2_2_89_1","unstructured":"H. Turki F. Salgado J. M. Camacho. HoneyLedgerBFT: Enabling Byzantine fault tolerance for the Hyperledger platform. Available: https:\/\/www.semanticscholar.org\/  H. Turki F. Salgado J. M. Camacho. HoneyLedgerBFT: Enabling Byzantine fault tolerance for the Hyperledger platform. Available: https:\/\/www.semanticscholar.org\/"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35476-2_24"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.36"},{"key":"e_1_3_2_2_92_1","unstructured":"Walmart JD.com IBM and Tsinghua University Launch a Blockchain Food Safety Alliance in China. https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/53487.wss  Walmart JD.com IBM and Tsinghua University Launch a Blockchain Food Safety Alliance in China. https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/53487.wss"},{"key":"e_1_3_2_2_93_1","unstructured":"Z. Wilcox-O'Hearn. Zfec 1.5.2. https:\/\/pypi.python.org\/pypi\/zfec  Z. Wilcox-O'Hearn. Zfec 1.5.2. https:\/\/pypi.python.org\/pypi\/zfec"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085127"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:19Z","timestamp":1750212499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243812"}},"subtitle":["Asynchronous BFT Made Practical"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":94,"alternative-id":["10.1145\/3243734.3243812","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243812","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}