{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:13Z","timestamp":1750221133941,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3317550.3321448","type":"proceedings-article","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T19:01:58Z","timestamp":1557514918000},"page":"105-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Rethinking General-Purpose Decentralized Computing"],"prefix":"10.1145","author":[{"given":"Enis Ceyhun","family":"Alp","sequence":"first","affiliation":[{"name":"EPFL"}]},{"given":"Eleftherios","family":"Kokoris-Kogias","sequence":"additional","affiliation":[{"name":"EPFL"}]},{"given":"Georgia","family":"Fragkouli","sequence":"additional","affiliation":[{"name":"EPFL"}]},{"given":"Bryan","family":"Ford","sequence":"additional","affiliation":[{"name":"EPFL"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"eosio | Blockchain software architecture.  eosio | Blockchain software architecture."},{"key":"e_1_3_2_1_2_1","unstructured":"POA Network.  POA Network."},{"key":"e_1_3_2_1_3_1","unstructured":"Provable - Oraclize 2.0 - blockchain oracle service enabling data-rich smart contracts.  Provable - Oraclize 2.0 - blockchain oracle service enabling data-rich smart contracts."},{"key":"e_1_3_2_1_4_1","unstructured":"WebAssembly.  WebAssembly."},{"key":"e_1_3_2_1_5_1","unstructured":"Augur: A Decentralized Oracle & Prediction Market Protocol.  Augur: A Decentralized Oracle & Prediction Market Protocol."},{"key":"e_1_3_2_1_6_1","unstructured":"Ethereum's Sharding Specification. 2018.  Ethereum's Sharding Specification. 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Chainspace: A Sharded Smart Contracts Platform. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Al-Bassam M.","year":"2018","unstructured":"M. Al-Bassam , A. Sonnino , S. Bano , D. Hrycyszyn , and G. Danezis . Chainspace: A Sharded Smart Contracts Platform. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA , February 18-21, 2018 , 2018. M. Al-Bassam, A. Sonnino, S. Bano, D. Hrycyszyn, and G. Danezis. Chainspace: A Sharded Smart Contracts Platform. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, 2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_9_1","first-page":"111","volume-title":"Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. In European Symposium on Research in Computer Security","author":"Androulaki E.","year":"2018","unstructured":"E. Androulaki , C. Cachin , A. De Caro , and E. Kokoris-Kogias . Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. In European Symposium on Research in Computer Security , pages 111 -- 131 . Springer , 2018 . E. Androulaki, C. Cachin, A. De Caro, and E. Kokoris-Kogias. Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. In European Symposium on Research in Computer Security, pages 111--131. Springer, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.46"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343531"},{"key":"e_1_3_2_1_13_1","volume-title":"Practical Byzantine Fault Tolerance. In 3rd USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Castro M.","year":"1999","unstructured":"M. Castro and B. Liskov . Practical Byzantine Fault Tolerance. In 3rd USENIX Symposium on Operating Systems Design and Implementation (OSDI) , Feb. 1999 . M. Castro and B. Liskov. Practical Byzantine Fault Tolerance. In 3rd USENIX Symposium on Operating Systems Design and Implementation (OSDI), Feb. 1999."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_15_1","volume-title":"Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. arXiv preprint arXiv:1804.05141","author":"Cheng R.","year":"2018","unstructured":"R. Cheng , F. Zhang , J. Kos , W. He , N. Hynes , N. Johnson , A. Juels , A. Miller , and D. Song . Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. arXiv preprint arXiv:1804.05141 , 2018 . R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. arXiv preprint arXiv:1804.05141, 2018."},{"volume-title":"Feb.","year":"2018","key":"e_1_3_2_1_16_1","unstructured":"CuriosMind. World's Hottest Decentralized Lottery Powered by Blockchain , Feb. 2018 . CuriosMind. World's Hottest Decentralized Lottery Powered by Blockchain, Feb. 2018."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_18_1","volume-title":"Blockchain Governance: Programming Our Future","author":"Ehrsam F.","year":"2017","unstructured":"F. Ehrsam . Blockchain Governance: Programming Our Future . 2017 . F. Ehrsam. Blockchain Governance: Programming Our Future. 2017."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224076"},{"key":"e_1_3_2_1_20_1","first-page":"2017","author":"Gencer A. E.","year":"2017","unstructured":"A. E. Gencer , R. van Renesse , and E. G. Sirer . Short Paper: Service-Oriented Sharding for Blockchains. Financial Cryptography and Data Security 2017 , 2017 . A. E. Gencer, R. van Renesse, and E. G. Sirer. Short Paper: Service-Oriented Sharding for Blockchains. Financial Cryptography and Data Security 2017, 2017.","journal-title":"Short Paper: Service-Oriented Sharding for Blockchains. Financial Cryptography and Data Security"},{"key":"e_1_3_2_1_21_1","first-page":"295","volume-title":"Eurocrypt","author":"Gennaro R.","year":"1999","unstructured":"R. Gennaro , S. Jarecki , H. Krawczyk , and T. Rabin . Secure distributed key generation for discrete-log based cryptosystems . In Eurocrypt , volume 99 , pages 295 -- 310 . Springer , 1999 . R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Eurocrypt, volume 99, pages 295--310. Springer, 1999."},{"key":"e_1_3_2_1_22_1","volume-title":"Microservices on AWS","author":"Jung M.","year":"2017","unstructured":"M. Jung , P. Dalbhanjan , P. Chapman , and C. Kassen . Microservices on AWS , 2017 . M. Jung, P. Dalbhanjan, P. Chapman, and C. Kassen. Microservices on AWS, 2017."},{"key":"e_1_3_2_1_23_1","first-page":"1353","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium","author":"Kalodner H.","year":"2018","unstructured":"H. Kalodner , S. Goldfeder , X. Chen , S. M. Weinberg , and E. W. Felten . Arbitrum: Scalable, private smart contracts . In Proceedings of the 27th USENIX Conference on Security Symposium , pages 1353 -- 1370 . USENIX Association , 2018 . H. Kalodner, S. Goldfeder, X. Chen, S. M. Weinberg, and E. W. Felten. Arbitrum: Scalable, private smart contracts. In Proceedings of the 27th USENIX Conference on Security Symposium, pages 1353--1370. USENIX Association, 2018."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_26_1","volume-title":"9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016)","author":"Kokoris-Kogias E.","year":"2016","unstructured":"E. Kokoris-Kogias , L. Gasser , I. Khoffi , P. Jovanovic , N. Gailly , and B. Ford . Managing Identities Using Blockchains and CoSi. Technical report , 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016) , 2016 . E. Kokoris-Kogias, L. Gasser, I. Khoffi, P. Jovanovic, N. Gailly, and B. Ford. Managing Identities Using Blockchains and CoSi. Technical report, 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016), 2016."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241117"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813659"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.44"},{"key":"e_1_3_2_1_33_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 . S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_1_35_1","first-page":"1271","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Nikitin K.","year":"2017","unstructured":"K. Nikitin , E. Kokoris-Kogias , P. Jovanovic , N. Gailly , L. Gasser , I. Khoffi , J. Cappos , and B. Ford . CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds . In 26th USENIX Security Symposium (USENIX Security 17) , pages 1271 -- 1287 . USENIX Association , 2017 . K. Nikitin, E. Kokoris-Kogias, P. Jovanovic, N. Gailly, L. Gasser, I. Khoffi, J. Cappos, and B. Ford. CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. In 26th USENIX Security Symposium (USENIX Security 17), pages 1271--1287. USENIX Association, 2017."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1296179"},{"key":"e_1_3_2_1_37_1","volume-title":"Mar.","author":"Oberstein T.","year":"2018","unstructured":"T. Oberstein . EIP 665 : Add precompiled contract for Ed25519 signature verification , Mar. 2018 . T. Oberstein. EIP 665: Add precompiled contract for Ed25519 signature verification, Mar. 2018."},{"key":"e_1_3_2_1_38_1","unstructured":"R. Red. What is on-chain cryptocurrency governance? Is it plutocratic? 2018.  R. Red. What is on-chain cryptocurrency governance? Is it plutocratic? 2018."},{"key":"e_1_3_2_1_39_1","volume-title":"Predicting Random Numbers in Ethereum Smart Contracts","author":"Reutov A.","year":"2018","unstructured":"A. Reutov . Predicting Random Numbers in Ethereum Smart Contracts . 2018 . A. Reutov. Predicting Random Numbers in Ethereum Smart Contracts. 2018."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"e_1_3_2_1_41_1","unstructured":"I. A. Seres. Implementing an e-voting protocol with blind signatures on Ethereum. 2018.  I. A. Seres. Implementing an e-voting protocol with blind signatures on Ethereum. 2018."},{"key":"e_1_3_2_1_42_1","first-page":"1","volume-title":"Securing threshold cryptosystems against chosen ciphertext attack. Advances in Cryptology --- EUROCRYPT'98","author":"Shoup V.","year":"1998","unstructured":"V. Shoup and R. Gennaro . Securing threshold cryptosystems against chosen ciphertext attack. Advances in Cryptology --- EUROCRYPT'98 , pages 1 -- 16 , 1998 . V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. Advances in Cryptology --- EUROCRYPT'98, pages 1--16, 1998."},{"key":"e_1_3_2_1_43_1","volume-title":"July","author":"Song J.","year":"2018","unstructured":"J. Song . Attack on Pseudo-random number generator (PRNG) used in 1000 Guess , an Ethereum lottery game (CVE-2018-12454) , July 2018 . J. Song. Attack on Pseudo-random number generator (PRNG) used in 1000 Guess, an Ethereum lottery game (CVE-2018-12454), July 2018."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"e_1_3_2_1_45_1","volume-title":"Scalable Bias-Resistant Distributed Randomness. In 38th IEEE Symposium on Security and Privacy","author":"Syta E.","year":"2017","unstructured":"E. Syta , P. Jovanovic , E. Kokoris-Kogias , N. Gailly , L. Gasser , I. Khoffi , M. J. Fischer , and B. Ford . Scalable Bias-Resistant Distributed Randomness. In 38th IEEE Symposium on Security and Privacy , May 2017 . E. Syta, P. Jovanovic, E. Kokoris-Kogias, N. Gailly, L. Gasser, I. Khoffi, M. J. Fischer, and B. Ford. Scalable Bias-Resistant Distributed Randomness. In 38th IEEE Symposium on Security and Privacy, May 2017."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"e_1_3_2_1_47_1","volume-title":"Ethereum Project Yellow Paper","author":"Wood G.","year":"2014","unstructured":"G. Wood . Ethereum : A Secure Decentralised Generalised Transaction Ledger . Ethereum Project Yellow Paper , 2014 . G. Wood. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper, 2014."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/41457.37507"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"}],"event":{"name":"HotOS '19: Workshop on Hot Topics in Operating Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bertinoro Italy","acronym":"HotOS '19"},"container-title":["Proceedings of the Workshop on Hot Topics in Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317550.3321448","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317550.3321448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:27Z","timestamp":1750208547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317550.3321448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":49,"alternative-id":["10.1145\/3317550.3321448","10.1145\/3317550"],"URL":"https:\/\/doi.org\/10.1145\/3317550.3321448","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}