{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T09:37:02Z","timestamp":1776505022688,"version":"3.51.2"},"reference-count":95,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:00:00Z","timestamp":1562112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472414, 61772514, 61602061"],"award-info":[{"award-number":["61472414, 61772514, 61602061"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1564097, 1547102"],"award-info":[{"award-number":["1564097, 1547102"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2017YFB1400700"],"award-info":[{"award-number":["2017YFB1400700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing trust in an open environment. Many consider blockchain as a technology breakthrough for cryptography and cybersecurity, with use cases ranging from globally deployed cryptocurrency systems like Bitcoin, to smart contracts, smart grids over the Internet of Things, and so forth. Although blockchain has received growing interests in both academia and industry in the recent years, the security and privacy of blockchains continue to be at the center of the debate when deploying blockchain in different applications. This article presents a comprehensive overview of the security and privacy of blockchain. To facilitate the discussion, we first introduce the notion of blockchains and its utility in the context of Bitcoin-like online transactions. Then, we describe the basic security properties that are supported as the essential requirements and building blocks for Bitcoin-like cryptocurrency systems, followed by presenting the additional security and privacy properties that are desired in many blockchain applications. Finally, we review the security and privacy techniques for achieving these security properties in blockchain-based systems, including representative consensus algorithms, hash chained storage, mixing protocols, anonymous signatures, non-interactive zero-knowledge proof, and so forth. We conjecture that this survey can help readers to gain an in-depth understanding of the security and privacy of blockchain with respect to concept, attributes, techniques, and systems.<\/jats:p>","DOI":"10.1145\/3316481","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T13:47:53Z","timestamp":1562161673000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":694,"title":["Security and Privacy on Blockchain"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0002-5593","authenticated-orcid":false,"given":"Rui","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, Haidian Dist, Beijing, China"}]},{"given":"Rui","family":"Xue","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, Haidian Dist, Beijing, China"}]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Georgia Institute of Technology, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"{n.d.}. Bitcoin\u2014Open source P2P money. Retrieved from https:\/\/bitcoin.org\/en.  {n.d.}. Bitcoin\u2014Open source P2P money. Retrieved from https:\/\/bitcoin.org\/en."},{"key":"e_1_2_1_2_1","unstructured":"{n.d.}. Ethereum Project. Retrieved from https:\/\/www.ethereum.org.  {n.d.}. Ethereum Project. Retrieved from https:\/\/www.ethereum.org."},{"key":"e_1_2_1_3_1","unstructured":"{n.d.}. IBM Blockchain based on Hyperledger Fabric from the Linux Foundation. Retrieved from https:\/\/www.ibm.com\/blockchain\/hyperledger.html.  {n.d.}. IBM Blockchain based on Hyperledger Fabric from the Linux Foundation. Retrieved from https:\/\/www.ibm.com\/blockchain\/hyperledger.html."},{"key":"e_1_2_1_4_1","unstructured":"{n.d.}. PlatON. Retrieved from https:\/\/www.platon.network\/#\/.  {n.d.}. PlatON. Retrieved from https:\/\/www.platon.network\/#\/."},{"key":"e_1_2_1_5_1","unstructured":"{n.d.}. Monero. Retrieved from http:\/\/www.getmonero.org.  {n.d.}. Monero. Retrieved from http:\/\/www.getmonero.org."},{"key":"e_1_2_1_6_1","unstructured":"{n.d.}. What is BitShares. Retrieved from http:\/\/docs.bitshares.org\/bitshares\/whatis.html.  {n.d.}. What is BitShares. Retrieved from http:\/\/docs.bitshares.org\/bitshares\/whatis.html."},{"key":"e_1_2_1_7_1","unstructured":"2017. Steem: An incentivized blockchain-based public content platform.  2017. Steem: An incentivized blockchain-based public content platform."},{"key":"e_1_2_1_8_1","unstructured":"2017. ZooKeeper: A Distributed Coordination Service for Distributed Applications.  2017. ZooKeeper: A Distributed Coordination Service for Distributed Applications."},{"key":"e_1_2_1_9_1","unstructured":"Aigents. 2017. Proof of Reputation as Liquid Democracy for Blockchain.  Aigents. 2017. Proof of Reputation as Liquid Democracy for Blockchain."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_2_1_11_1","unstructured":"Kristov Atlas. {n.d.}. CoinJoin Sudoku: Weaknesses in SharedCoin.  Kristov Atlas. {n.d.}. CoinJoin Sudoku: Weaknesses in SharedCoin."},{"key":"e_1_2_1_12_1","unstructured":"Kristov Atlas. 2014. Weak Privacy Guarantees for SharedCoin Mixing Service.  Kristov Atlas. 2014. Weak Privacy Guarantees for SharedCoin Mixing Service."},{"key":"e_1_2_1_13_1","volume-title":"USENIX Technical Conference.","author":"Back Adam","year":"2002","unstructured":"Adam Back . 2002 . Hashcash\u2014A denial of service counter-measure . In USENIX Technical Conference. Adam Back. 2002. Hashcash\u2014A denial of service counter-measure. In USENIX Technical Conference."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Dave Bayer Stuart Haber and W. Scott Stornetta. 1993. Improving the Efficiency and Reliability of Digital Time-Stamping. 329--334.  Dave Bayer Stuart Haber and W. Scott Stornetta. 1993. Improving the Efficiency and Reliability of Digital Time-Stamping. 329--334.","DOI":"10.1007\/978-1-4613-9323-8_24"},{"key":"e_1_2_1_15_1","unstructured":"Juan Benet. 2015. IPFS\u2014Content Addressed Versioned P2P File System (DRAFT 3).  Juan Benet. 2015. IPFS\u2014Content Addressed Versioned P2P File System (DRAFT 3)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_18"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"e_1_2_1_19_1","volume-title":"FC 2009. 325--343","author":"Bogetoft Peter","unstructured":"Peter Bogetoft , Dan Lund Christensen , Ivan Damg\u00e5rd , Martin Geisler , Thomas P. Jakobsen , Mikkel Kr\u00f8igaard , Janus Dam Nielsen , Jesper Buus Nielsen , Kurt Nielsen , Jakob Pagter , Michael I. Schwartzbach , and Tomas Toft . {n.d.}. Secure multiparty computation goes live . In FC 2009. 325--343 . Peter Bogetoft, Dan Lund Christensen, Ivan Damg\u00e5rd, Martin Geisler, Thomas P. Jakobsen, Mikkel Kr\u00f8igaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, and Tomas Toft. {n.d.}. Secure multiparty computation goes live. In FC 2009. 325--343."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Joseph Bonneau Arvind Narayanan Andrew Miller Jeremy Clark Joshua A. Kroll and Edward W. Felten. {n.d.}. Mixcoin: Anonymity for Bitcoin with Accountable Mixes. 486--504.  Joseph Bonneau Arvind Narayanan Andrew Miller Jeremy Clark Joshua A. Kroll and Edward W. Felten. {n.d.}. Mixcoin: Anonymity for Bitcoin with Accountable Mixes. 486--504.","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"e_1_2_1_23_1","unstructured":"Vitalik Buterin. {n.d.}. Ethereum\u2019s White Paper: A Next-Generation Smart Contract and Decentralized Application Platform.  Vitalik Buterin. {n.d.}. Ethereum\u2019s White Paper: A Next-Generation Smart Contract and Decentralized Application Platform."},{"key":"e_1_2_1_24_1","unstructured":"Rebecca Campbell. 2017. Delaware Passes Groundbreaking Blockchain Regulation Bill.  Rebecca Campbell. 2017. Delaware Passes Groundbreaking Blockchain Regulation Bill."},{"key":"e_1_2_1_25_1","volume-title":"OSDI","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov . {n.d.}. Practical byzantine fault tolerance . In OSDI 1999 . 173--186. Miguel Castro and Barbara Liskov. {n.d.}. Practical byzantine fault tolerance. In OSDI 1999. 173--186."},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Melissa Chase. {n.d.}. Multi-authority Attribute Based Encryption. 515--534.   Melissa Chase. {n.d.}. Multi-authority Attribute Based Encryption. 515--534.","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"David Chaum and Eug\u00e8ne van Heyst. {n.d.}. Group Signatures. 257--265.   David Chaum and Eug\u00e8ne van Heyst. {n.d.}. Group Signatures. 257--265.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Lin Chen Lei Xu Nolan Shah Zhimin Gao Yang Lu and Weidong Shi. 2017. On security analysis of proof-of-elapsed-time (PoET). In Stabilization Safety and Security of Distributed Systems. 282--297.  Lin Chen Lei Xu Nolan Shah Zhimin Gao Yang Lu and Weidong Shi. 2017. On security analysis of proof-of-elapsed-time (PoET). In Stabilization Safety and Security of Distributed Systems. 282--297.","DOI":"10.1007\/978-3-319-69084-1_19"},{"key":"e_1_2_1_29_1","volume-title":"Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contract execution. CoRR abs\/1804.05141","author":"Cheng Raymond","year":"2018","unstructured":"Raymond Cheng , Fan Zhang , Jernej Kos , Warren He , Nicholas Hynes , Noah M. Johnson , Ari Juels , Andrew Miller , and Dawn Song . 2018 . Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contract execution. CoRR abs\/1804.05141 (2018). Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2018. Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contract execution. CoRR abs\/1804.05141 (2018)."},{"key":"e_1_2_1_30_1","volume-title":"State of Blockchian - Q4","year":"2017","unstructured":"Coindesk. 2017. State of Blockchian - Q4 2017 . Coindesk. 2017. State of Blockchian - Q4 2017."},{"key":"e_1_2_1_31_1","unstructured":"Nxt community. 2014. Nxt Whitepaper.  Nxt community. 2014. Nxt Whitepaper."},{"key":"e_1_2_1_32_1","volume-title":"A survey on security and privacy issues of Bitcoin. CoRR abs\/1706.00916","author":"Conti Mauro","year":"2017","unstructured":"Mauro Conti , Sandeep Kumar E., Chhagan Lal , and Sushmita Ruj . 2017. A survey on security and privacy issues of Bitcoin. CoRR abs\/1706.00916 ( 2017 ). Mauro Conti, Sandeep Kumar E., Chhagan Lal, and Sushmita Ruj. 2017. A survey on security and privacy issues of Bitcoin. CoRR abs\/1706.00916 (2017)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_2_1_34_1","volume-title":"Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919.","author":"Daian Phil","year":"2016","unstructured":"Phil Daian , Rafael Pass , and Elaine Shi . 2016 . Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919. Phil Daian, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699128"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276853"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Taher ElGamal. {n.d.}. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. 10--18.  Taher ElGamal. {n.d.}. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. 10--18.","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Fangyu Gai Baosheng Wang Wenping Deng and Wei Peng. 2018. Proof of reputation: A reputation-based consensus protocol for peer-to-peer network. In Database Systems for Advanced Applications. 666--681.  Fangyu Gai Baosheng Wang Wenping Deng and Wei Peng. 2018. Proof of reputation: A reputation-based consensus protocol for peer-to-peer network. In Database Systems for Advanced Applications. 666--681.","DOI":"10.1007\/978-3-319-91458-9_41"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Sanjam Garg Craig Gentry Shai Halevi Amit Sahai and Brent Waters. {n.d.}. Attribute-Based Encryption for Circuits from Multilinear Maps. 479--499.  Sanjam Garg Craig Gentry Shai Halevi Amit Sahai and Brent Waters. {n.d.}. Attribute-Based Encryption for Circuits from Multilinear Maps. 479--499.","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_2_1_44_1","unstructured":"GoChain. 2018. Proof of Reputation.  GoChain. 2018. Proof of Reputation."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488677"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Jens Groth. {n.d.}. Short Pairing-Based Non-interactive Zero-Knowledge Arguments. 321--340.  Jens Groth. {n.d.}. Short Pairing-Based Non-interactive Zero-Knowledge Arguments. 321--340.","DOI":"10.1007\/978-3-642-17373-8_19"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"e_1_2_1_50_1","unstructured":"Intel. 2017. Sawtooth Lake. Retrieved from https:\/\/intelledger.github.io\/.  Intel. 2017. Sawtooth Lake. Retrieved from https:\/\/intelledger.github.io\/."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567070"},{"key":"e_1_2_1_53_1","volume-title":"USENIX Security","author":"Kalodner Harry","year":"2018","unstructured":"Harry Kalodner , Steven Goldfeder , Xiaoqi Chen , S. Matthew Weinberg , and Edward W. Felten . {n.d.}. Arbitrum: Scalable, private smart contracts . In USENIX Security 2018 . 1353--1370. Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. {n.d.}. Arbitrum: Scalable, private smart contracts. In USENIX Security 2018. 1353--1370."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2976756"},{"key":"e_1_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Aggelos Kiayias Alexander Russell Bernardo David and Roman Oliynykov. {n.d.}. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. 357--388.  Aggelos Kiayias Alexander Russell Bernardo David and Roman Oliynykov. {n.d.}. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. 357--388.","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_2_1_56_1","unstructured":"Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. (2012).  Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. (2012)."},{"key":"e_1_2_1_57_1","volume-title":"Filecoin: A Decentralized Storage Network.","author":"Labs Protocol","year":"2017","unstructured":"Protocol Labs . 2017 . Filecoin: A Decentralized Storage Network. Protocol Labs. 2017. Filecoin: A Decentralized Storage Network."},{"key":"e_1_2_1_58_1","article-title":"Paxos made simple","volume":"32","author":"Lamport Leslie","year":"2016","unstructured":"Leslie Lamport . 2016 . Paxos made simple . ACM Sigact News 32 , 4 (2016). Leslie Lamport. 2016. Paxos made simple. ACM Sigact News 32, 4 (2016).","journal-title":"ACM Sigact News"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008727"},{"key":"e_1_2_1_61_1","volume-title":"A survey on the security of blockchain systems. Future Generation Computer Systems","author":"Li Xiaoqi","year":"2017","unstructured":"Xiaoqi Li , Peng Jiang , Ting Chen , Xiapu Luo , and Qiaoyan Wen . 2017. A survey on the security of blockchain systems. Future Generation Computer Systems ( 2017 ). Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, and Qiaoyan Wen. 2017. A survey on the security of blockchain systems. Future Generation Computer Systems (2017)."},{"key":"e_1_2_1_62_1","unstructured":"Gregory Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. Retrieved from bitcointalk.org.  Gregory Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. Retrieved from bitcointalk.org."},{"key":"e_1_2_1_63_1","unstructured":"Mindi McDowell. 2013. Understanding Denial-of-Service Attacks.  Mindi McDowell. 2013. Understanding Denial-of-Service Attacks."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2006.19"},{"key":"e_1_2_1_67_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Retrieved from www.bitcoin.org, 9. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Retrieved from www.bitcoin.org, 9. (2008)."},{"key":"e_1_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Arvind Narayanan Joseph Bonneau Edward Felten Andrew Miller and Steven Goldfeder. 2016. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction.   Arvind Narayanan Joseph Bonneau Edward Felten Andrew Miller and Steven Goldfeder. 2016. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction.","DOI":"10.1016\/S1353-4858(16)30074-5"},{"key":"e_1_2_1_69_1","unstructured":"SAFE Network. 2018. A SAFE Network Primer\u2014An Introductory guide to the world\u2019s first fully autonomous data network.  SAFE Network. 2018. A SAFE Network Primer\u2014An Introductory guide to the world\u2019s first fully autonomous data network."},{"key":"e_1_2_1_70_1","volume-title":"USENIX ATC","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout . {n.d.}. In search of an understandable consensus algorithm . In USENIX ATC 2014 . 305--320. Diego Ongaro and John Ousterhout. {n.d.}. In search of an understandable consensus algorithm. In USENIX ATC 2014. 305--320."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Rafael Pass Lior Seeman and Abhi Shelat. {n.d.}. Analysis of the Blockchain Protocol in Asynchronous Networks. 643--673.  Rafael Pass Lior Seeman and Abhi Shelat. {n.d.}. Analysis of the Blockchain Protocol in Asynchronous Networks. 643--673.","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Andrea Pinna and Wiebe Ruttenberg. 2016. Distributed ledger technologies in securities post-trading.  Andrea Pinna and Wiebe Ruttenberg. 2016. Distributed ledger technologies in securities post-trading.","DOI":"10.2139\/ssrn.2770340"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Ronald L. Rivest Adi Shamir and Yael Tauman. {n.d.}. How to Leak a Secret. 552--565.   Ronald L. Rivest Adi Shamir and Yael Tauman. {n.d.}. How to Leak a Secret. 552--565.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"e_1_2_1_80_1","unstructured":"Nicolas van Saberhagen Johannes Meier Antonio M. Juarez and Max Jameson. 2012. CryptoNote Signatures.  Nicolas van Saberhagen Johannes Meier Antonio M. Juarez and Max Jameson. 2012. CryptoNote Signatures."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_2_1_83_1","unstructured":"Emin G\u00fcn Sirer. {n.d.}. Hacking Distributed.  Emin G\u00fcn Sirer. {n.d.}. Hacking Distributed."},{"key":"e_1_2_1_84_1","unstructured":"Emin G\u00fcn Sirer. 2016. Bitcoin Guarantees Strong Not Eventual Consistency.  Emin G\u00fcn Sirer. 2016. Bitcoin Guarantees Strong Not Eventual Consistency."},{"key":"e_1_2_1_85_1","unstructured":"China Blockchain Technology and Industry Development Forum. 2016. China Blockchain Technology and Application Development White Paper.  China Blockchain Technology and Industry Development Forum. 2016. China Blockchain Technology and Application Development White Paper."},{"key":"e_1_2_1_86_1","unstructured":"Jason Teutsch and Christian Reitwie\u00dfner. 2017. TrueBit: A scalable verification solution for blockchains.  Jason Teutsch and Christian Reitwie\u00dfner. 2017. TrueBit: A scalable verification solution for blockchains."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_2_1_88_1","unstructured":"Pavel Vasin. 2018. BlackCoin\u2019s Proof-of-Stake Protocol v2.  Pavel Vasin. 2018. BlackCoin\u2019s Proof-of-Stake Protocol v2."},{"key":"e_1_2_1_89_1","doi-asserted-by":"crossref","unstructured":"Werner Vogels. {n.d.}. Eventually consistent. Commun. ACM 52 1 ({n.\u00a0d.}) 40--44.  Werner Vogels. {n.d.}. Eventually consistent. Commun. ACM 52 1 ({n.\u00a0d.}) 40--44.","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_2_1_90_1","unstructured":"Mark Walport. 2016. Distributed ledger technology: Beyond block chain.  Mark Walport. 2016. Distributed ledger technology: Beyond block chain."},{"key":"e_1_2_1_91_1","volume-title":"The Science of the Blockchain","author":"Wattenhofer Roger","unstructured":"Roger Wattenhofer . 2016. The Science of the Blockchain ( 1 st ed.). CreateSpace Independent Publishing Platform . Roger Wattenhofer. 2016. The Science of the Blockchain (1st ed.). CreateSpace Independent Publishing Platform.","edition":"1"},{"key":"e_1_2_1_92_1","unstructured":"Wikipedia. {n.d.}. Proof-of-authority. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Proof-of-authority.  Wikipedia. {n.d.}. Proof-of-authority. Retrieved from https:\/\/en.wikipedia.org\/wiki\/Proof-of-authority."},{"key":"e_1_2_1_93_1","unstructured":"Shawn Wilkinson Tome Boshevski Josh Brandof James Prestwich Gordon Hall Patrick Gerbes Philip Hutchins and Chris Pollard. {n.d.}. Storj: A Peer-to-Peer Cloud Storage Network.  Shawn Wilkinson Tome Boshevski Josh Brandof James Prestwich Gordon Hall Patrick Gerbes Philip Hutchins and Chris Pollard. {n.d.}. Storj: A Peer-to-Peer Cloud Storage Network."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_2_1_96_1","volume-title":"Enigma: Decentralized computation platform with guaranteed privacy. Comput. Sci.","author":"Zyskind Guy","year":"2015","unstructured":"Guy Zyskind , Oz Nathan , and Alex Pentland . 2015 . Enigma: Decentralized computation platform with guaranteed privacy. Comput. Sci. (2015). Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. Comput. Sci. (2015)."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833321"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316481","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316481","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:16Z","timestamp":1750204396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,3]]},"references-count":95,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5,31]]}},"alternative-id":["10.1145\/3316481"],"URL":"https:\/\/doi.org\/10.1145\/3316481","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,3]]},"assertion":[{"value":"2018-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}