{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:40Z","timestamp":1775199580966,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["SafeWare W911NF- 15-C-0236, W911NF-16-1-0389"],"award-info":[{"award-number":["SafeWare W911NF- 15-C-0236, W911NF-16-1-0389"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1633282, 1562888, 1565208"],"award-info":[{"award-number":["CNS-1633282, 1562888, 1565208"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243853","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"931-948","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":934,"title":["RapidChain"],"prefix":"10.1145","author":[{"given":"Mahdi","family":"Zamani","sequence":"first","affiliation":[{"name":"Visa Research, Palo Alto, CA, USA"}]},{"given":"Mahnush","family":"Movahedi","sequence":"additional","affiliation":[{"name":"Dfinity, Palo Alto, CA, USA"}]},{"given":"Mariana","family":"Raykova","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS '17)","author":"Abraham Ittai","year":"2017"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646253.683918"},{"key":"e_1_3_2_2_3_1","volume-title":"Addendum to scalable secure storage when half the system is faulty. Information and Computation","author":"Alon Noga","year":"2004"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","volume-title":"PoW-Based Distributed Cryptography with No Trusted Setup","author":"Andrychowicz Marcin","DOI":"10.1007\/978-3-662-48000-7_19"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148109.1148163"},{"key":"e_1_3_2_2_6_1","volume-title":"Consensus in the Age of Blockchains. CoRR","author":"Bano Shehar","year":"2017"},{"key":"e_1_3_2_2_7_1","volume-title":"US Patent 4,633,470. (30","author":"Berlekamp E","year":"1986"},{"key":"e_1_3_2_2_8_1","volume-title":"Theory and practice of error control codes","author":"Blahut Richard E"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806743"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22180"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/800221.806706"},{"key":"e_1_3_2_2_13_1","unstructured":"Vitalik Buterin. Ethereum's white paper. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. (2014).  Vitalik Buterin. Ethereum's white paper. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. (2014)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343531"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167105"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_2_18_1","volume-title":"Spanner: Google's Globally-distributed Database.","author":"Corbett James C.","year":"2012"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23187"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833321"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"C. Decker and R. Wattenhofer. 2013. Information propagation in the Bitcoin network. P2P. IEEE 1--10.  C. Decker and R. Wattenhofer. 2013. Information propagation in the Bitcoin network. P2P. IEEE 1--10.","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_2_23_1","volume-title":"Advances in Cryptology -- CRYPTO' 92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16--20","author":"Dwork Cynthia","year":"1992"},{"key":"e_1_3_2_2_24_1","series-title":"No. 685","volume-title":"Coase-Sandor Working Paper Series in Law and Economics","author":"Evans David S."},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation (NSDI'16)","author":"Eyal Ittay","year":"2016"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_2_29_1","volume-title":"Consensus System. CoRR","author":"Hanke Timo","year":"2018"},{"key":"e_1_3_2_2_30_1","unstructured":"Egor Homakov. Stop. Calling. Bitcoin. Decentralized. https:\/\/medium.com\/@homakov\/stop-calling-bitcoin-decentralized-cb703d69dc27. (2017).  Egor Homakov. Stop. Calling. Bitcoin. Decentralized. https:\/\/medium.com\/@homakov\/stop-calling-bitcoin-decentralized-cb703d69dc27. (2017)."},{"key":"e_1_3_2_2_31_1","unstructured":"Min Huang and Vernon J. Rego. Polynomial Evaluation in Secret Sharing Schemes. (2010). URL: http:\/\/csdata.cs.purdue.edu\/research\/PaCS\/polyeval.pdf.  Min Huang and Vernon J. Rego. Polynomial Evaluation in Secret Sharing Schemes. (2010). URL: http:\/\/csdata.cs.purdue.edu\/research\/PaCS\/polyeval.pdf."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/795666.796561"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_27"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835698.1835798"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1109557.1109667"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.77"},{"key":"e_1_3_2_2_37_1","volume-title":"25th USENIX Security Symposium, USENIX Security '16","author":"Kokoris-Kogias Eleftherios","year":"2016"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/164051.164075"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_2_42_1","volume-title":"The World's Most Powerful Computer Network Is Being Wasted on Bitcoin. (13","author":"Limer Eric","year":"2013"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_2_2_44_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01)","author":"Maymounkov Petar","year":"2002"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/646752.704751"},{"key":"e_1_3_2_2_46_1","volume-title":"ALGORAND: The Efficient and Democratic Ledger. CoRR","author":"Micali Silvio","year":"2016"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796482"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_2_49_1","unstructured":"Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008). Available at https:\/\/bitcoin.org\/bitcoin.pdf.  Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008). Available at https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195141"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_3_2_2_55_1","volume-title":"Polynomial Codes Over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics (SIAM)","author":"Reed Irving","year":"1960"},{"key":"e_1_3_2_2_56_1","volume-title":"Practical Synchronous Byzantine Consensus. CoRR","author":"Ren Ling","year":"2017"},{"key":"e_1_3_2_2_57_1","unstructured":"Alexander Russell and David Zuckerman. 1998. Perfect Information Leader Election in $\u0142og^*N   Alexander Russell and David Zuckerman. 1998. Perfect Information Leader Election in $\u0142og^*N"},{"key":"e_1_3_2_2_58_1","volume-title":"Rounds. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS '98)"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2146382.2146389"},{"key":"e_1_3_2_2_60_1","volume-title":"How Blockchain Is Changing Finance. Harvard Business Review (1","author":"Tapscott Alex","year":"2017"},{"key":"e_1_3_2_2_61_1","volume-title":"The ZILLIQA Technical Whitepaper. https:\/\/docs.zilliqa.com\/whitepaper.pdf. (10","author":"Team The Zilliqa","year":"2017"},{"key":"e_1_3_2_2_62_1","unstructured":"Hsiao-Wei Wang. Ethereum Sharding: Overview and Finality. https:\/\/medium.com\/@icebearhww\/ethereum-sharding-and-finality-65248951f649. (2017).  Hsiao-Wei Wang. Ethereum Sharding: Overview and Finality. https:\/\/medium.com\/@icebearhww\/ethereum-sharding-and-finality-65248951f649. (2017)."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243853","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243853"}},"subtitle":["Scaling Blockchain via Full Sharding"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":60,"alternative-id":["10.1145\/3243734.3243853","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243853","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}