{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:31:32Z","timestamp":1776443492060,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":140,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355457","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"41-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":244,"title":["SoK"],"prefix":"10.1145","author":[{"given":"Gang","family":"Wang","sequence":"first","affiliation":[{"name":"University of Connecticut"}]},{"given":"Zhijie Jerry","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Connecticut"}]},{"given":"Mark","family":"Nixon","sequence":"additional","affiliation":[{"name":"Emerson Automation Solutions"}]},{"given":"Song","family":"Han","sequence":"additional","affiliation":[{"name":"University of Connecticut"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Efficient synchronous byzantine consensus. arXiv preprint arXiv:1704.02397","author":"Abraham I.","year":"2017","unstructured":"Abraham , I. , Devadas , S. , Dolev , D. , Nayak , K. , and Ren , L . Efficient synchronous byzantine consensus. arXiv preprint arXiv:1704.02397 ( 2017 ). Abraham, I., Devadas, S., Dolev, D., Nayak, K., and Ren, L. Efficient synchronous byzantine consensus. arXiv preprint arXiv:1704.02397 (2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"Chainspace: A sharded smart contracts platform. arXiv preprint arXiv:1708.03778","author":"Al-Bassam M.","year":"2017","unstructured":"Al-Bassam , M. , Sonnino , A. , Bano , S. , Hrycyszyn , D. , and Danezis , G . Chainspace: A sharded smart contracts platform. arXiv preprint arXiv:1708.03778 ( 2017 ). Al-Bassam, M., Sonnino, A., Bano, S., Hrycyszyn, D., and Danezis, G. Chainspace: A sharded smart contracts platform. arXiv preprint arXiv:1708.03778 (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_6"},{"key":"e_1_3_2_1_5_1","unstructured":"Asayag A. Cohen G. Grayevsky I. Leshkowitz M. Rottenstreich O. Tamari R. and Yakira D. Helix: A scalable and fair consensus algorithm resistant to ordering manipulation.  Asayag A. Cohen G. Grayevsky I. Leshkowitz M. Rottenstreich O. Tamari R. and Yakira D. Helix: A scalable and fair consensus algorithm resistant to ordering manipulation."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0081-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11945529_20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.10.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-008-9099-9"},{"key":"e_1_3_2_1_10_1","volume-title":"Winning the caucus race: Continuous leader election via public randomness. arXiv preprint arXiv:1801.07965","author":"Azouvi S.","year":"2018","unstructured":"Azouvi , S. , McCorry , P. , and Meiklejohn , S . Winning the caucus race: Continuous leader election via public randomness. arXiv preprint arXiv:1801.07965 ( 2018 ). Azouvi, S., McCorry, P., and Meiklejohn, S. Winning the caucus race: Continuous leader election via public randomness. arXiv preprint arXiv:1801.07965 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/895300"},{"key":"e_1_3_2_1_12_1","volume-title":"Enabling blockchain innovations with pegged sidechains. URL: http:\/\/www.open-sciencereview.com\/papers\/123\/enablingblockchain-innovations-with-pegged-sidechains","author":"Back A.","year":"2014","unstructured":"Back , A. , Corallo , M. , Dashjr , L. , Friedenbach , M. , Maxwell , G. , Miller , A. , Poelstra , A. , Tim\u00f3n , J. , and Wuille , P . Enabling blockchain innovations with pegged sidechains. URL: http:\/\/www.open-sciencereview.com\/papers\/123\/enablingblockchain-innovations-with-pegged-sidechains ( 2014 ). Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., Poelstra, A., Tim\u00f3n, J., and Wuille, P. Enabling blockchain innovations with pegged sidechains. URL: http:\/\/www.open-sciencereview.com\/papers\/123\/enablingblockchain-innovations-with-pegged-sidechains (2014)."},{"key":"e_1_3_2_1_13_1","volume-title":"Consensus in the age of blockchains. arXiv preprint arXiv:1711.03936","author":"Bano S.","year":"2017","unstructured":"Bano , S. , Sonnino , A. , Al-Bassam , M. , Azouvi , S. , McCorry , P. , Meiklejohn , S. , and Danezis , G . Consensus in the age of blockchains. arXiv preprint arXiv:1711.03936 ( 2017 ). Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., and Danezis, G. Consensus in the age of blockchains. arXiv preprint arXiv:1711.03936 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/648115.746425"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064213"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/197917.198088"},{"key":"e_1_3_2_1_17_1","volume-title":"Snow white: Provably secure proofs of stake. IACR Cryptology ePrint Archive 2016","author":"Bentov I.","year":"2016","unstructured":"Bentov , I. , Pass , R. , and Shi , E . Snow white: Provably secure proofs of stake. IACR Cryptology ePrint Archive 2016 ( 2016 ), 919. Bentov, I., Pass, R., and Shi, E. Snow white: Provably secure proofs of stake. IACR Cryptology ePrint Archive 2016 (2016), 919."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352610"},{"key":"e_1_3_2_1_19_1","unstructured":"Bessani A. N. Santos M. Felix J. Neves N. F. and Correia M. On the efficiency of durable state machine replication.  Bessani A. N. Santos M. Felix J. Neves N. F. and Correia M. On the efficiency of durable state machine replication."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/648120.747061"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"e_1_3_2_1_22_1","volume-title":"A survey of two verifiable delay functions. IACR Cryptology ePrint Archive 2018","author":"Boneh D.","year":"2018","unstructured":"Boneh , D. , B\u00fcnz , B. , and Fisch , B . A survey of two verifiable delay functions. IACR Cryptology ePrint Archive 2018 ( 2018 ), 712. Boneh, D., B\u00fcnz, B., and Fisch, B. A survey of two verifiable delay functions. IACR Cryptology ePrint Archive 2018 (2018), 712."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.46"},{"key":"e_1_3_2_1_25_1","volume-title":"An o (log n) expected rounds randomized byzantine generals protocol. Journal of the ACM (JACM) 34, 4","author":"Bracha G.","year":"1987","unstructured":"Bracha , G. An o (log n) expected rounds randomized byzantine generals protocol. Journal of the ACM (JACM) 34, 4 ( 1987 ), 910--920. Bracha, G. An o (log n) expected rounds randomized byzantine generals protocol. Journal of the ACM (JACM) 34, 4 (1987), 910--920."},{"key":"e_1_3_2_1_27_1","volume-title":"Proofs-of-delay and randomness beacons in ethereum","author":"B\u00fcnz B.","year":"2017","unstructured":"B\u00fcnz , B. , Goldfeder , S. , and Bonneau , J . Proofs-of-delay and randomness beacons in ethereum . IEEE SECURITY and PRIVACY ON THE BLOCKCHAIN (IEEE S &B) ( 2017 ). B\u00fcnz, B., Goldfeder, S., and Bonneau, J. Proofs-of-delay and randomness beacons in ethereum. IEEE SECURITY and PRIVACY ON THE BLOCKCHAIN (IEEE S&B) (2017)."},{"key":"e_1_3_2_1_28_1","unstructured":"Buterin V. Ethereum 2.0 spec--casper and sharding 2018. Available [online].[Accessed: 30-10-2018].  Buterin V. Ethereum 2.0 spec--casper and sharding 2018. Available [online].[Accessed: 30-10-2018]."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_31"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0318-0"},{"key":"e_1_3_2_1_32_1","volume-title":"Secure intrusion-tolerant replication on the internet. In null","author":"Cachin C.","year":"2002","unstructured":"Cachin , C. , and Poritz , J. A . Secure intrusion-tolerant replication on the internet. In null ( 2002 ), IEEE , p. 167. Cachin, C., and Poritz, J. A. Secure intrusion-tolerant replication on the internet. In null (2002), IEEE, p. 167."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.9"},{"key":"e_1_3_2_1_34_1","volume-title":"Blockchains consensus protocols in the wild. arXiv preprint arXiv:1707.01873","author":"Cachin C.","year":"2017","unstructured":"Cachin , C. , and Vukoli\u0107 , M . Blockchains consensus protocols in the wild. arXiv preprint arXiv:1707.01873 ( 2017 ). Cachin, C., and Vukoli\u0107, M. Blockchains consensus protocols in the wild. arXiv preprint arXiv:1707.01873 (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_27"},{"key":"e_1_3_2_1_36_1","volume-title":"Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS) 20, 4","author":"Castro M.","year":"2002","unstructured":"Castro , M. , and Liskov , B . Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS) 20, 4 ( 2002 ), 398--461. Castro, M., and Liskov, B. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS) 20, 4 (2002), 398--461."},{"key":"e_1_3_2_1_37_1","first-page":"173","volume-title":"OSDI","volume":"99","author":"Castro M.","year":"1999","unstructured":"Castro , M. , Liskov , B. , Practical byzantine fault tolerance . In OSDI ( 1999 ), vol. 99 , pp. 173 -- 186 . Castro, M., Liskov, B., et al. Practical byzantine fault tolerance. In OSDI (1999), vol. 99, pp. 173--186."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502012"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281103"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/214451.214456"},{"key":"e_1_3_2_1_41_1","first-page":"89","volume-title":"Annual International Cryptology Conference","author":"Chaum D.","year":"1992","unstructured":"Chaum , D. , and Pedersen , T. P . Wallet databases with observers . In Annual International Cryptology Conference ( 1992 ), Springer , pp. 89 -- 105 . Chaum, D., and Pedersen, T. P. Wallet databases with observers. In Annual International Cryptology Conference (1992), Springer, pp. 89--105."},{"key":"e_1_3_2_1_42_1","volume-title":"Sschain: A full sharding protocol for public blockchain without data migration overhead. Pervasive and Mobile Computing","author":"Chen H.","year":"2019","unstructured":"Chen , H. , and Wang , Y . Sschain: A full sharding protocol for public blockchain without data migration overhead. Pervasive and Mobile Computing ( 2019 ), 101055. Chen, H., and Wang, Y. Sschain: A full sharding protocol for public blockchain without data migration overhead. Pervasive and Mobile Computing (2019), 101055."},{"key":"e_1_3_2_1_43_1","volume-title":"Rollerchain, a blockchain with safely pruneable full blocks. arXiv preprint arXiv:1603.07926","author":"Chepurnoy A.","year":"2016","unstructured":"Chepurnoy , A. , Larangeira , M. , and Ojiganov , A . Rollerchain, a blockchain with safely pruneable full blocks. arXiv preprint arXiv:1603.07926 ( 2016 ). Chepurnoy, A., Larangeira, M., and Ojiganov, A. Rollerchain, a blockchain with safely pruneable full blocks. arXiv preprint arXiv:1603.07926 (2016)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_45_1","volume-title":"Byteball: A decentralized system for storage and transfer of value. URL https:\/\/byteball.org\/Byteball.pdf","author":"Churyumov A.","year":"2016","unstructured":"Churyumov , A. Byteball: A decentralized system for storage and transfer of value. URL https:\/\/byteball.org\/Byteball.pdf ( 2016 ). Churyumov, A. Byteball: A decentralized system for storage and transfer of value. URL https:\/\/byteball.org\/Byteball.pdf (2016)."},{"key":"e_1_3_2_1_46_1","first-page":"153","volume-title":"NSDI","volume":"9","author":"Clement A.","year":"2009","unstructured":"Clement , A. , Wong , E. L. , Alvisi , L. , Dahlin , M. , and Marchetti , M . Making byzantine fault tolerant systems tolerate byzantine faults . In NSDI ( 2009 ), vol. 9 , pp. 153 -- 168 . Clement, A., Wong, E. L., Alvisi, L., Dahlin, M., and Marchetti, M. Making byzantine fault tolerant systems tolerate byzantine faults. In NSDI (2009), vol. 9, pp. 153--168."},{"key":"e_1_3_2_1_47_1","volume-title":"Google\u00e2\u0102&Zacute;s globally distributed database. ACM Transactions on Computer Systems (TOCS) 31, 3","author":"Corbett J. C.","year":"2013","unstructured":"Corbett , J. C. , Dean , J. , Epstein , M. , Fikes , A. , Frost , C. , Furman , J. J. , Ghemawat , S. , Gubarev , A. , Heiser , C. , Hochschild , P. , Spanner : Google\u00e2\u0102&Zacute;s globally distributed database. ACM Transactions on Computer Systems (TOCS) 31, 3 ( 2013 ), 8. Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., Ghemawat, S., Gubarev, A., Heiser, C., Hochschild, P., et al. Spanner: Google\u00e2\u0102&Zacute;s globally distributed database. ACM Transactions on Computer Systems (TOCS) 31, 3 (2013), 8."},{"key":"e_1_3_2_1_48_1","first-page":"6","article-title":"Bft-to: Intrusion tolerance with less replicas","volume":"56","author":"Correia M.","year":"2012","unstructured":"Correia , M. , Neves , N. F. , and Verissimo , P . Bft-to: Intrusion tolerance with less replicas . The Computer Journal 56 , 6 ( 2012 ), 693--715. Correia, M., Neves, N. F., and Verissimo, P. Bft-to: Intrusion tolerance with less replicas. The Computer Journal 56, 6 (2012), 693--715.","journal-title":"The Computer Journal"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516680"},{"key":"e_1_3_2_1_50_1","volume-title":"Intel sgx explained. IACR Cryptology ePrint Archive","author":"Costan V.","year":"2016","unstructured":"Costan , V. , and Devadas , S . Intel sgx explained. IACR Cryptology ePrint Archive 2016 , 086 (2016), 1--118. Costan, V., and Devadas, S. Intel sgx explained. IACR Cryptology ePrint Archive 2016, 086 (2016), 1--118."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548057"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1060"},{"key":"e_1_3_2_1_53_1","first-page":"317","volume-title":"USENIX Security Symposium","author":"Crosby S. A.","year":"2009","unstructured":"Crosby , S. A. , and Wallach , D. S . Efficient data structures for tamper-evident logging . In USENIX Security Symposium ( 2009 ), pp. 317 -- 334 . Crosby, S. A., and Wallach, D. S. Efficient data structures for tamper-evident logging. In USENIX Security Symposium (2009), pp. 317--334."},{"key":"e_1_3_2_1_55_1","volume-title":"Centrally banked cryptocurrencies. arXiv preprint arXiv:1505.06895","author":"Danezis G.","year":"2015","unstructured":"Danezis , G. , and Meiklejohn , S . Centrally banked cryptocurrencies. arXiv preprint arXiv:1505.06895 ( 2015 ). Danezis, G., and Meiklejohn, S. Centrally banked cryptocurrencies. arXiv preprint arXiv:1505.06895 (2015)."},{"key":"e_1_3_2_1_56_1","volume-title":"Chain of trust: Can trusted hardware help scaling blockchains? arXiv preprint arXiv:1804.00399","author":"Dang H.","year":"2018","unstructured":"Dang , H. , Dinh , A. , Chang , E.-C. , and Ooi , B. C . Chain of trust: Can trusted hardware help scaling blockchains? arXiv preprint arXiv:1804.00399 ( 2018 ). Dang, H., Dinh, A., Chang, E.-C., and Ooi, B. C. Chain of trust: Can trusted hardware help scaling blockchains? arXiv preprint arXiv:1804.00399 (2018)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_3"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1137\/0212045"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243812"},{"key":"e_1_3_2_1_62_1","first-page":"139","volume-title":"Annual International Cryptology Conference","author":"Dwork C.","year":"1992","unstructured":"Dwork , C. , and Naor , M . Pricing via processing or combatting junk mail . In Annual International Cryptology Conference ( 1992 ), Springer , pp. 139 -- 147 . Dwork, C., and Naor, M. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference (1992), Springer, pp. 139--147."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67262-5_1"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.38"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_66_1","first-page":"337","volume-title":"OSDI","volume":"10","author":"Feldman A. J.","year":"2010","unstructured":"Feldman , A. J. , Zeller , W. P. , Freedman , M. J. , and Felten , E. W . Sporc: Group collaboration using untrusted cloud resources . In OSDI ( 2010 ), vol. 10 , pp. 337 -- 350 . Feldman, A. J., Zeller, W. P., Freedman, M. J., and Felten, E. W. Sporc: Group collaboration using untrusted cloud resources. In OSDI (2010), vol. 10, pp. 337--350."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_1_68_1","volume-title":"YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE","author":"Fischer M. J.","year":"1982","unstructured":"Fischer , M. J. , Lynch , N. A. , and Paterson , M. S . Impossibility of distributed consensus with one fault process. Tech. rep ., YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE , 1982 . Fischer, M. J., Lynch, N. A., and Paterson, M. S. Impossibility of distributed consensus with one fault process. Tech. rep., YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, 1982."},{"key":"e_1_3_2_1_69_1","volume-title":"Blockclique: scaling blockchains through transaction sharding in a multithreaded block graph. arXiv preprint arXiv:1803.09029","author":"Forestier S.","year":"2018","unstructured":"Forestier , S. , and Vodenicarevic , D . Blockclique: scaling blockchains through transaction sharding in a multithreaded block graph. arXiv preprint arXiv:1803.09029 ( 2018 ). Forestier, S., and Vodenicarevic, D. Blockclique: scaling blockchains through transaction sharding in a multithreaded block graph. arXiv preprint arXiv:1803.09029 (2018)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176982"},{"key":"e_1_3_2_1_71_1","volume-title":"Service-oriented sharding with aspen. arXiv preprint arXiv:1611.06816","author":"Gencer A. E.","year":"2016","unstructured":"Gencer , A. E. , van Renesse , R. , and Sirer , E. G . Service-oriented sharding with aspen. arXiv preprint arXiv:1611.06816 ( 2016 ). Gencer, A. E., van Renesse, R., and Sirer, E. G. Service-oriented sharding with aspen. arXiv preprint arXiv:1611.06816 (2016)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043559"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-08755-9_9"},{"key":"e_1_3_2_1_75_1","unstructured":"Grigg I. Eos - an introduction. https:\/\/eos.io\/documents\/EOS_An_Introduction.pdf.  Grigg I. Eos - an introduction. https:\/\/eos.io\/documents\/EOS_An_Introduction.pdf."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"key":"e_1_3_2_1_77_1","volume-title":"Proceedings of the 21st international conference on extending database technology, Open Proceedings, EDBT","author":"Gupta S.","year":"2018","unstructured":"Gupta , S. , and Sadoghi , M . Easycommit: A non-blocking two-phase commit protocol . In Proceedings of the 21st international conference on extending database technology, Open Proceedings, EDBT ( 2018 ). Gupta, S., and Sadoghi, M. Easycommit: A non-blocking two-phase commit protocol. In Proceedings of the 21st international conference on extending database technology, Open Proceedings, EDBT (2018)."},{"key":"e_1_3_2_1_78_1","volume-title":"Principles of transaction-oriented database recovery. ACM Computing Surveys (CSUR) 15, 4","author":"Haerder T.","year":"1983","unstructured":"Haerder , T. , and Reuter , A . Principles of transaction-oriented database recovery. ACM Computing Surveys (CSUR) 15, 4 ( 1983 ), 287--317. Haerder, T., and Reuter, A. Principles of transaction-oriented database recovery. ACM Computing Surveys (CSUR) 15, 4 (1983), 287--317."},{"key":"e_1_3_2_1_79_1","volume-title":"Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548","author":"Hanke T.","year":"2018","unstructured":"Hanke , T. , Movahedi , M. , and Williams , D . Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 ( 2018 ). Hanke, T., Movahedi, M., and Williams, D. Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 (2018)."},{"key":"e_1_3_2_1_80_1","volume-title":"Corda: A distributed ledger. Corda Technical White Paper","author":"Hearn M.","year":"2016","unstructured":"Hearn , M. Corda: A distributed ledger. Corda Technical White Paper ( 2016 ). Hearn, M. Corda: A distributed ledger. Corda Technical White Paper (2016)."},{"key":"e_1_3_2_1_81_1","first-page":"281","volume-title":"Proceedings of the 25th International Conference Companion on World Wide Web (2016), International World Wide Web Conferences Steering Committee","author":"Hope-Bailie A.","unstructured":"Hope-Bailie , A. , and Thomas , S . Interledger: Creating a standard for payments . In Proceedings of the 25th International Conference Companion on World Wide Web (2016), International World Wide Web Conferences Steering Committee , pp. 281 -- 282 . Hope-Bailie, A., and Thomas, S. Interledger: Creating a standard for payments. In Proceedings of the 25th International Conference Companion on World Wide Web (2016), International World Wide Web Conferences Steering Committee, pp. 281--282."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168866"},{"key":"e_1_3_2_1_83_1","volume-title":"Distributed key generation in the wild. IACR Cryptology ePrint Archive 2012","author":"Kate A.","year":"2012","unstructured":"Kate , A. , Huang , Y. , and Goldberg , I . Distributed key generation in the wild. IACR Cryptology ePrint Archive 2012 ( 2012 ), 377. Kate, A., Huang, Y., and Goldberg, I. Distributed key generation in the wild. IACR Cryptology ePrint Archive 2012 (2012), 377."},{"key":"e_1_3_2_1_84_1","volume-title":"Ouroboros-bft: A simple byzantine fault tolerant consensus protocol. IACR Cryptology ePrint Archive 2018","author":"Kiayias A.","year":"2018","unstructured":"Kiayias , A. , and Russell , A . Ouroboros-bft: A simple byzantine fault tolerant consensus protocol. IACR Cryptology ePrint Archive 2018 ( 2018 ), 1049. Kiayias, A., and Russell, A. Ouroboros-bft: A simple byzantine fault tolerant consensus protocol. IACR Cryptology ePrint Archive 2018 (2018), 1049."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_86_1","unstructured":"King S. and Nadal S. Peercoin--secure & sustainable cryptocoin. Aug-2012 [Online]. Available: https:\/\/peercoin.net\/whitepaper ().  King S. and Nadal S. Peercoin--secure & sustainable cryptocoin. Aug-2012 [Online]. Available: https:\/\/peercoin.net\/whitepaper ()."},{"key":"e_1_3_2_1_87_1","volume-title":"August 19","author":"King S.","year":"2012","unstructured":"King , S. , and Nadal , S . Ppcoin: Peer-to-peer cryptocurrency with proof-of-stake. self-published paper , August 19 ( 2012 ). King, S., and Nadal, S. Ppcoin: Peer-to-peer cryptocurrency with proof-of-stake. self-published paper, August 19 (2012)."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989727.1989732"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/1109557.1109667"},{"key":"e_1_3_2_1_90_1","first-page":"279","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias E. K.","year":"2016","unstructured":"Kogias , E. K. , Jovanovic , P. , Gailly , N. , Khoffi , I. , Gasser , L. , and Ford , B . Enhancing bitcoin security and performance with strong consistency via collective signing . In 25th USENIX Security Symposium (USENIX Security 16) ( 2016 ), pp. 279 -- 296 . Kogias, E. K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., and Ford, B. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16) (2016), pp. 279--296."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_92_1","volume-title":"Sidecoin: a snapshot mechanism for bootstrapping a blockchain. arXiv preprint arXiv:1501.01039","author":"Krug J.","year":"2015","unstructured":"Krug , J. , and Peterson , J . Sidecoin: a snapshot mechanism for bootstrapping a blockchain. arXiv preprint arXiv:1501.01039 ( 2015 ). Krug, J., and Peterson, J. Sidecoin: a snapshot mechanism for bootstrapping a blockchain. arXiv preprint arXiv:1501.01039 (2015)."},{"key":"e_1_3_2_1_93_1","first-page":"6","article-title":"Consensus without mining","volume":"0","author":"Kwon J.","year":"2014","unstructured":"Kwon , J. Tendermint : Consensus without mining . Draft v. 0 . 6 , fall ( 2014 ). Kwon, J. Tendermint: Consensus without mining. Draft v. 0.6, fall (2014).","journal-title":"Draft"},{"key":"e_1_3_2_1_94_1","volume-title":"A random zoo: sloth, unicorn, and trx. IACR Cryptology ePrint Archive 2015","author":"Lenstra A. K.","year":"2015","unstructured":"Lenstra , A. K. , and Wesolowski , B . A random zoo: sloth, unicorn, and trx. IACR Cryptology ePrint Archive 2015 ( 2015 ), 366. Lenstra, A. K., and Wesolowski, B. A random zoo: sloth, unicorn, and trx. IACR Cryptology ePrint Archive 2015 (2015), 366."},{"key":"e_1_3_2_1_95_1","first-page":"9","volume-title":"OSDI","volume":"4","author":"Li J.","year":"2004","unstructured":"Li , J. , Krohn , M. N. , Mazi\u00e8res , D. , and Shasha , D. E . Secure untrusted data repository (sundr) . In OSDI ( 2004 ), vol. 4 , pp. 9 -- 9 . Li, J., Krohn, M. N., Mazi\u00e8res, D., and Shasha, D. E. Secure untrusted data repository (sundr). In OSDI (2004), vol. 4, pp. 9--9."},{"key":"e_1_3_2_1_96_1","volume-title":"Polyshard: Coded sharding achieves linearly scaling efficiency and security simultaneously. arXiv preprint arXiv:1809.10361","author":"Li S.","year":"2018","unstructured":"Li , S. , Yu , M. , Avestimehr , S. , Kannan , S. , and Viswanath , P . Polyshard: Coded sharding achieves linearly scaling efficiency and security simultaneously. arXiv preprint arXiv:1809.10361 ( 2018 ). Li, S., Yu, M., Avestimehr, S., Kannan, S., and Viswanath, P. Polyshard: Coded sharding achieves linearly scaling efficiency and security simultaneously. arXiv preprint arXiv:1809.10361 (2018)."},{"key":"e_1_3_2_1_97_1","first-page":"1","article-title":"Scalable byzantine consensus via hardware-assisted secret sharing","volume":"68","author":"Liu J.","year":"2018","unstructured":"Liu , J. , Li , W. , Karame , G. O. , and Asokan , N . Scalable byzantine consensus via hardware-assisted secret sharing . IEEE Transactions on Computers 68 , 1 ( 2018 ), 139--151. Liu, J., Li, W., Karame, G. O., and Asokan, N. Scalable byzantine consensus via hardware-assisted secret sharing. IEEE Transactions on Computers 68, 1 (2018), 139--151.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_2_1_98_1","first-page":"485","volume-title":"12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16)","author":"Liu S.","year":"2016","unstructured":"Liu , S. , Viotti , P. , Cachin , C. , Qu\u00e9ma , V. , and Vukoli\u0107 , M . {XFT}: Practical fault tolerance beyond crashes . In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16) ( 2016 ), pp. 485 -- 500 . Liu, S., Viotti, P., Cachin, C., Qu\u00e9ma, V., and Vukoli\u0107, M. {XFT}: Practical fault tolerance beyond crashes. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16) (2016), pp. 485--500."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.6295203"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258650"},{"key":"e_1_3_2_1_102_1","volume-title":"Byzantine quorum systems. Distributed computing 11, 4","author":"Malkhi D.","year":"1998","unstructured":"Malkhi , D. , and Reiter , M . Byzantine quorum systems. Distributed computing 11, 4 ( 1998 ), 203--213. Malkhi, D., and Reiter, M. Byzantine quorum systems. Distributed computing 11, 4 (1998), 203--213."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.38"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_107_1","unstructured":"Nakamoto S. Bitcoin: A peer-to-peer electronic cash system.  Nakamoto S. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/62546.62549"},{"key":"e_1_3_2_1_110_1","volume-title":"31st International Symposium on Distributed Computing (DISC 2017)","author":"Pass R.","year":"2017","unstructured":"Pass , R. , and Shi , E . Hybrid consensus: Efficient consensus in the permissionless model . In 31st International Symposium on Distributed Computing (DISC 2017) ( 2017 ), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Pass, R., and Shi, E. Hybrid consensus: Efficient consensus in the permissionless model. In 31st International Symposium on Distributed Computing (DISC 2017) (2017), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_111_1","volume-title":"Alternatives for proof-of-work, part 2: Proof of activity, proof of burn, proof of capacity, and byzantines generals, bytecoin","author":"Patterson R.","year":"2015","unstructured":"Patterson , R. Alternatives for proof-of-work, part 2: Proof of activity, proof of burn, proof of capacity, and byzantines generals, bytecoin , 2015 . Patterson, R. Alternatives for proof-of-work, part 2: Proof of activity, proof of burn, proof of capacity, and byzantines generals, bytecoin, 2015."},{"key":"e_1_3_2_1_112_1","volume-title":"Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27, 2","author":"Pease M.","year":"1980","unstructured":"Pease , M. , Shostak , R. , and Lamport , L . Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27, 2 ( 1980 ), 228--234. Pease, M., Shostak, R., and Lamport, L. Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27, 2 (1980), 228--234."},{"key":"e_1_3_2_1_113_1","volume-title":"10th Innovations in Theoretical Computer Science Conference","volume":"124","author":"Pietrzak K. Z.","year":"2019","unstructured":"Pietrzak , K. Z. Simple verifiable delay functions . In 10th Innovations in Theoretical Computer Science Conference ( 2019 ), vol. 124 . Pietrzak, K. Z. Simple verifiable delay functions. In 10th Innovations in Theoretical Computer Science Conference (2019), vol. 124."},{"key":"e_1_3_2_1_114_1","volume-title":"The bitcoin lightning network: Scalable off-chain instant payments","author":"Poon J.","year":"2016","unstructured":"Poon , J. , and Dryja , T . The bitcoin lightning network: Scalable off-chain instant payments , 2016 . Poon, J., and Dryja, T. The bitcoin lightning network: Scalable off-chain instant payments, 2016."},{"key":"e_1_3_2_1_115_1","volume-title":"The tangle. cit. on","author":"Popov S.","year":"2016","unstructured":"Popov , S. The tangle. cit. on ( 2016 ), 131. Popov, S. The tangle. cit. on (2016), 131."},{"key":"e_1_3_2_1_116_1","volume-title":"Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009","author":"Rosenfeld M.","year":"2014","unstructured":"Rosenfeld , M. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009 ( 2014 ). Rosenfeld, M. Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009 (2014)."},{"key":"e_1_3_2_1_117_1","volume-title":"Hydrand: Practical continuous distributed randomness. IACR Cryptology ePrint Archive 2018","author":"Schindler P.","year":"2018","unstructured":"Schindler , P. , Judmayer , A. , Stifter , N. , and Weippl , E. R . Hydrand: Practical continuous distributed randomness. IACR Cryptology ePrint Archive 2018 ( 2018 ), 319. Schindler, P., Judmayer, A., Stifter, N., and Weippl, E. R. Hydrand: Practical continuous distributed randomness. IACR Cryptology ePrint Archive 2018 (2018), 319."},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_10"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/2146382.2146389"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/582318.582339"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236608"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2012.32"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_17"},{"key":"e_1_3_2_1_125_1","volume-title":"Threshold signatures for blockchain systems","author":"Stathakopoulous C.","year":"2017","unstructured":"Stathakopoulous , C. , and Cachin , C . Threshold signatures for blockchain systems . Swiss Federal Institute of Technology ( 2017 ). Stathakopoulous, C., and Cachin, C. Threshold signatures for blockchain systems. Swiss Federal Institute of Technology (2017)."},{"key":"e_1_3_2_1_126_1","volume-title":"Apr","author":"Swanson T.","year":"2015","unstructured":"Swanson , T. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems. Report, available online , Apr ( 2015 ). Swanson, T. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems. Report, available online, Apr (2015)."},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.45"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"e_1_3_2_1_129_1","unstructured":"Technology S. https:\/\/symbiont.io\/technology\/.  Technology S. https:\/\/symbiont.io\/technology\/."},{"key":"e_1_3_2_1_130_1","volume-title":"A protocol for interledger payments. URL https:\/\/interledger.org\/interledger.pdf","author":"Thomas S.","year":"2015","unstructured":"Thomas , S. , and Schwartz , E . A protocol for interledger payments. URL https:\/\/interledger.org\/interledger.pdf ( 2015 ). Thomas, S., and Schwartz, E. A protocol for interledger payments. URL https:\/\/interledger.org\/interledger.pdf (2015)."},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355848"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2010.19"},{"key":"e_1_3_2_1_133_1","first-page":"1","article-title":"Efficient byzantine fault-tolerance","volume":"62","author":"Veronese G. S.","year":"2011","unstructured":"Veronese , G. S. , Correia , M. , Bessani , A. N. , Lung , L. C. , and Verissimo , P . Efficient byzantine fault-tolerance . IEEE Transactions on Computers 62 , 1 ( 2011 ), 16--30. Veronese, G. S., Correia, M., Bessani, A. N., Lung, L. C., and Verissimo, P. Efficient byzantine fault-tolerance. IEEE Transactions on Computers 62, 1 (2011), 16--30.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00030"},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310086"},{"key":"e_1_3_2_1_137_1","first-page":"95","volume-title":"16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19)","author":"Wang J.","year":"2019","unstructured":"Wang , J. , and Wang , H . Monoxide: Scale out blockchains with asynchronous consensus zones . In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19) ( 2019 ), pp. 95 -- 112 . Wang, J., and Wang, H. Monoxide: Scale out blockchains with asynchronous consensus zones. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19) (2019), pp. 95--112."},{"key":"e_1_3_2_1_138_1","volume-title":"Survey on blockchain for internet of things. Computer Communications","author":"Wang X.","year":"2019","unstructured":"Wang , X. , Zha , X. , Ni , W. , Liu , R. P. , Guo , Y. J. , Niu , X. , and Zheng , K . Survey on blockchain for internet of things. Computer Communications ( 2019 ). Wang, X., Zha, X., Ni, W., Liu, R. P., Guo, Y. J., Niu, X., and Zheng, K. Survey on blockchain for internet of things. Computer Communications (2019)."},{"key":"e_1_3_2_1_139_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Wood G.","year":"2014","unstructured":"Wood , G. , Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 ( 2014 ), 1--32. Wood, G., et al. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1--32."},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133603"},{"key":"e_1_3_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085127"}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:33Z","timestamp":1750268973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355457"}},"subtitle":["Sharding on Blockchain"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":140,"alternative-id":["10.1145\/3318041.3355457","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355457","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}