{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T23:27:05Z","timestamp":1777418825632,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":97,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/N028104\/1"],"award-info":[{"award-number":["EP\/N028104\/1"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["732546"],"award-info":[{"award-number":["732546"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M013286\/1"],"award-info":[{"award-number":["EP\/M013286\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012338","name":"Alan Turing Institute","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355458","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"183-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":168,"title":["SoK"],"prefix":"10.1145","author":[{"given":"Shehar","family":"Bano","sequence":"first","affiliation":[{"name":"University College London"}]},{"given":"Alberto","family":"Sonnino","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Mustafa","family":"Al-Bassam","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Sarah","family":"Azouvi","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Patrick","family":"McCorry","sequence":"additional","affiliation":[{"name":"PISA Research"}]},{"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[{"name":"University College London"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. CoinMarketCap: Global Charts. https:\/\/coinmarketcap.com\/charts\/.  2018. CoinMarketCap: Global Charts. https:\/\/coinmarketcap.com\/charts\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus.","author":"Abraham Ittai","year":"2016","unstructured":"Ittai Abraham , Dahlia Malkhi , Kartik Nayak , Ling Ren , and Alexander Spiegelman . 2016 . Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus. Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. 2016. Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095816"},{"key":"e_1_3_2_1_4_1","volume-title":"Chainspace: A Sharded Smart Contracts Platform. In The Network and Distributed System Security Symposium.","author":"Al-Bassam Mustafa","year":"2018","unstructured":"Mustafa Al-Bassam , Alberto Sonnino , Shehar Bano , Dave Hrycyszyn , and George Danezis . 2018 . Chainspace: A Sharded Smart Contracts Platform. In The Network and Distributed System Security Symposium. Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, and George Danezis. 2018. Chainspace: A Sharded Smart Contracts Platform. In The Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_5_1","volume-title":"Shehar Bano and George Danezis","author":"Al-Bassam Alberto Mustafa","year":"2019","unstructured":"Mustafa Al-Bassam Alberto Sonnino , Shehar Bano and George Danezis . 2019 . Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers . https:\/\/arxiv.org\/abs\/1901.11218. Mustafa Al-Bassam Alberto Sonnino, Shehar Bano and George Danezis. 2019. Replay Attacks and Defenses Against Cross-shard Consensus in Sharded Distributed Ledgers. https:\/\/arxiv.org\/abs\/1901.11218."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.33"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.70"},{"key":"e_1_3_2_1_8_1","volume-title":"Robust Random Number Generation for Peer-to-peer Systems. In International Conference on Principles of Distributed Systems. 275--289","author":"Awerbuch Baruch","year":"2006","unstructured":"Baruch Awerbuch and Christian Scheideler . 2006 . Robust Random Number Generation for Peer-to-peer Systems. In International Conference on Principles of Distributed Systems. 275--289 . Baruch Awerbuch and Christian Scheideler. 2006. Robust Random Number Generation for Peer-to-peer Systems. In International Conference on Principles of Distributed Systems. 275--289."},{"key":"e_1_3_2_1_9_1","volume-title":"Betting on Blockchain Consensus with Fantomette. CoRR abs\/1805.06786","author":"Azouvi Sarah","year":"2018","unstructured":"Sarah Azouvi , Patrick McCorry , and Sarah Meiklejohn . 2018. Betting on Blockchain Consensus with Fantomette. CoRR abs\/1805.06786 ( 2018 ). Sarah Azouvi, Patrick McCorry, and Sarah Meiklejohn. 2018. Betting on Blockchain Consensus with Fantomette. CoRR abs\/1805.06786 (2018)."},{"key":"e_1_3_2_1_10_1","volume-title":"On Bitcoin and Red Balloons. In ACM Conference on Electronic Commerce. 56--73","author":"Babaioff Moshe","year":"2012","unstructured":"Moshe Babaioff , Shahar Dobzinski , Sigal Oren , and Aviv Zohar . 2012 . On Bitcoin and Red Balloons. In ACM Conference on Electronic Commerce. 56--73 . Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On Bitcoin and Red Balloons. In ACM Conference on Electronic Commerce. 56--73."},{"key":"e_1_3_2_1_11_1","unstructured":"Adam Back. 1997. A Partial Hash Collision Based Postage Scheme. http:\/\/www.hashcash.org\/papers\/announce.txt.  Adam Back. 1997. A Partial Hash Collision Based Postage Scheme. http:\/\/www.hashcash.org\/papers\/announce.txt."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Christian Badertscher Juan A. Garay Ueli Maurer Daniel Tschudi and Vassilis Zikas. 2018. But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. In Advances in Cryptology - EUROCRYPT 2018 - Conference on the Theory and Applications of Cryptographic Techniques. 34--65.  Christian Badertscher Juan A. Garay Ueli Maurer Daniel Tschudi and Vassilis Zikas. 2018. But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. In Advances in Cryptology - EUROCRYPT 2018 - Conference on the Theory and Applications of Cryptographic Techniques. 34--65.","DOI":"10.1007\/978-3-319-78375-8_2"},{"key":"e_1_3_2_1_13_1","unstructured":"Iddo Bentov Pavel Hub\u00e1\u010dek Tal Moran and Asaf Nadler. 2017. Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible Scalable Cryptocurrencies. http:\/\/eprint.iacr.org\/2017\/300.  Iddo Bentov Pavel Hub\u00e1\u010dek Tal Moran and Asaf Nadler. 2017. Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible Scalable Cryptocurrencies. http:\/\/eprint.iacr.org\/2017\/300."},{"key":"e_1_3_2_1_14_1","unstructured":"Ethereum Blog. 2015. Introducing Casper \"the Friendly Ghost\". https:\/\/blog.ethereum.org\/2015\/08\/01\/introducing-casper-friendly-ghost\/.  Ethereum Blog. 2015. Introducing Casper \"the Friendly Ghost\". https:\/\/blog.ethereum.org\/2015\/08\/01\/introducing-casper-friendly-ghost\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Financial Cryptography Workshops (Lecture Notes in Computer Science)","volume":"9604","author":"Bonneau Joseph","year":"2016","unstructured":"Joseph Bonneau . 2016 . Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus . In Financial Cryptography Workshops (Lecture Notes in Computer Science) , Vol. 9604 . 19--26. Joseph Bonneau. 2016. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus. In Financial Cryptography Workshops (Lecture Notes in Computer Science), Vol. 9604. 19--26."},{"key":"e_1_3_2_1_16_1","volume-title":"SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In IEEE Symposium on Security and Privacy.","author":"Bonneau Joseph","year":"2015","unstructured":"Joseph Bonneau , Andrew Miller , Jeremy Clark , Arvind Narayanan , Joshua A Kroll , and Edward W Felten . 2015 . SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In IEEE Symposium on Security and Privacy. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_17_1","volume-title":"Reward Sharing Schemes for Stake Pools. arXiv preprint arXiv:1807.11218","author":"Br\u00fcnjes Lars","year":"2018","unstructured":"Lars Br\u00fcnjes , Aggelos Kiayias , Elias Koutsoupias , and Aikaterini-Panagiota Stouka . 2018. Reward Sharing Schemes for Stake Pools. arXiv preprint arXiv:1807.11218 ( 2018 ). Lars Br\u00fcnjes, Aggelos Kiayias, Elias Koutsoupias, and Aikaterini-Panagiota Stouka. 2018. Reward Sharing Schemes for Stake Pools. arXiv preprint arXiv:1807.11218 (2018)."},{"key":"e_1_3_2_1_18_1","unstructured":"Vitalik Buterin. 2017. The Meaning of Decentralization. https:\/\/medium.com\/@VitalikButerin\/the-meaning-of-decentralization-a0c92b76a274.  Vitalik Buterin. 2017. The Meaning of Decentralization. https:\/\/medium.com\/@VitalikButerin\/the-meaning-of-decentralization-a0c92b76a274."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2006.12.013"},{"key":"e_1_3_2_1_20_1","volume-title":"Architecture of the Hyperledger Blockchain Fabric. In Workshop on Distributed Cryptocurrencies and Consensus Ledgers.","author":"Cachin Christian","year":"2016","unstructured":"Christian Cachin . 2016 . Architecture of the Hyperledger Blockchain Fabric. In Workshop on Distributed Cryptocurrencies and Consensus Ledgers. Christian Cachin. 2016. Architecture of the Hyperledger Blockchain Fabric. In Workshop on Distributed Cryptocurrencies and Consensus Ledgers."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343531"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Christian Cachin and Marko Vukoli\u0107. 2017. Blockchain Consensus Protocols in the Wild. preprint arXiv:1707.01873 [cs.DC].  Christian Cachin and Marko Vukoli\u0107. 2017. Blockchain Consensus Protocols in the Wild. preprint arXiv:1707.01873 [cs.DC].","DOI":"10.1109\/EDCC.2017.36"},{"key":"e_1_3_2_1_23_1","volume-title":"Symposium on Operating Systems Design and Implementation","volume":"99","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro , Barbara Liskov , 1999 . Practical Byzantine fault tolerance . In Symposium on Operating Systems Design and Implementation , Vol. 99 . 173--186. Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In Symposium on Operating Systems Design and Implementation, Vol. 99. 173--186."},{"key":"e_1_3_2_1_24_1","volume-title":"CoRR abs\/1601.00275","author":"Chepurnoy Alexander","year":"2016","unstructured":"Alexander Chepurnoy . 2016. Interactive Proof-of-stake. CoRR abs\/1601.00275 ( 2016 ). Alexander Chepurnoy. 2016. Interactive Proof-of-stake. CoRR abs\/1601.00275 (2016)."},{"key":"e_1_3_2_1_25_1","volume-title":"Workshop on Economics of Peer-to-Peer systems","volume":"6","author":"Cohen Bram","year":"2003","unstructured":"Bram Cohen . 2003 . Incentives build robustness in BitTorrent . In Workshop on Economics of Peer-to-Peer systems , Vol. 6 . 68--72. Bram Cohen. 2003. Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer systems, Vol. 6. 68--72."},{"key":"e_1_3_2_1_26_1","volume-title":"Antbleed: Bitcoins Newest New Controversy Explained. https:\/\/www.coindesk.com\/antbleed-bitcoins-newest-new-controversy-explained\/.","year":"2015","unstructured":"CoinDesk. 2015 . Antbleed: Bitcoins Newest New Controversy Explained. https:\/\/www.coindesk.com\/antbleed-bitcoins-newest-new-controversy-explained\/. CoinDesk. 2015. Antbleed: Bitcoins Newest New Controversy Explained. https:\/\/www.coindesk.com\/antbleed-bitcoins-newest-new-controversy-explained\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2518037.2491245"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1060"},{"key":"e_1_3_2_1_29_1","volume-title":"On Scaling Decentralized Blockchains. In Workshop on Bitcoin and Blockchain Research, Financial Cryptography.","author":"Croman Kyle","year":"2016","unstructured":"Kyle Croman , Christian Decker , Ittay Eyal , Adem Efe Gencer , Ari Juels , Ahmed Kosba , Andrew Miller , Prateek Saxena , Elaine Shi , and Emin G\u00fcn . 2016 . On Scaling Decentralized Blockchains. In Workshop on Bitcoin and Blockchain Research, Financial Cryptography. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, and Emin G\u00fcn. 2016. On Scaling Decentralized Blockchains. In Workshop on Bitcoin and Blockchain Research, Financial Cryptography."},{"key":"e_1_3_2_1_30_1","volume-title":"Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919","author":"Daian Phil","year":"2016","unstructured":"Phil Daian , Rafael Pass , and Elaine Shi . 2016 . Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919 . http:\/\/eprint.iacr.org\/2016\/919. Phil Daian, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably Secure Proofs of Stake. Cryptology ePrint Archive, Report 2016\/919. http:\/\/eprint.iacr.org\/2016\/919."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"George Danezis and Sarah Meiklejohn. 2016. Centrally Banked Cryptocurrencies. In Network and Distributed System Security.  George Danezis and Sarah Meiklejohn. 2016. Centrally Banked Cryptocurrencies. In Network and Distributed System Security.","DOI":"10.14722\/ndss.2016.23187"},{"key":"e_1_3_2_1_32_1","volume-title":"Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT (2) (Lecture Notes in Computer Science)","author":"David Bernardo","year":"2018","unstructured":"Bernardo David , Peter Gazi , Aggelos Kiayias , and Alexander Russell . 2018 . Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT (2) (Lecture Notes in Computer Science) , Vol. 10821 . Springer , 66--98. Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2018. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT (2) (Lecture Notes in Computer Science), Vol. 10821. Springer, 66--98."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_34_1","volume-title":"The Sybil Attack. In Springer International Workshop on Peer-to-Peer Systems. 251--260","author":"Douceur John R","year":"2002","unstructured":"John R Douceur . 2002 . The Sybil Attack. In Springer International Workshop on Peer-to-Peer Systems. 251--260 . John R Douceur. 2002. The Sybil Attack. In Springer International Workshop on Peer-to-Peer Systems. 251--260."},{"key":"e_1_3_2_1_35_1","volume-title":"BEAT: Asynchronous BFT Made Practical. In ACM SIGSAC Conference on Computer and Communications Security. 2028--2041","author":"Duan Sisi","year":"2018","unstructured":"Sisi Duan , Michael K. Reiter , and Haibin Zhang . 2018 . BEAT: Asynchronous BFT Made Practical. In ACM SIGSAC Conference on Computer and Communications Security. 2028--2041 . Sisi Duan, Michael K. Reiter, and Haibin Zhang. 2018. BEAT: Asynchronous BFT Made Practical. In ACM SIGSAC Conference on Computer and Communications Security. 2028--2041."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_37_1","unstructured":"Cynthia Dwork and Moni Naor. 1992. Pricing via Processing or Combatting Junk Mail. In CRYPTO.  Cynthia Dwork and Moni Naor. 1992. Pricing via Processing or Combatting Junk Mail. In CRYPTO."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_1_39_1","volume-title":"Bitcoin-NG: A Scalable Blockchain Protocol. In USENIX Conference on Networked Systems Design and Implementation. 45--59","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol. In USENIX Conference on Networked Systems Design and Implementation. 45--59 . Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In USENIX Conference on Networked Systems Design and Implementation. 45--59."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Ittay Eyal and Emin Gun Sirer. 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. In Financial Cryptography.  Ittay Eyal and Emin Gun Sirer. 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. In Financial Cryptography.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_41_1","volume-title":"Compounding of Wealth in Proof-of-Stake Cryptocurrencies. arXiv preprint arXiv:1809.07468","author":"Fanti Giulia","year":"2018","unstructured":"Giulia Fanti , Leonid Kogan , Sewoong Oh , Kathleen Ruan , Pramod Viswanath , and Gerui Wang . 2018. Compounding of Wealth in Proof-of-Stake Cryptocurrencies. arXiv preprint arXiv:1809.07468 ( 2018 ). Giulia Fanti, Leonid Kogan, Sewoong Oh, Kathleen Ruan, Pramod Viswanath, and Gerui Wang. 2018. Compounding of Wealth in Proof-of-Stake Cryptocurrencies. arXiv preprint arXiv:1809.07468 (2018)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_45_1","first-page":"754","article-title":"SoK: A Consensus Taxonomy in the Blockchain Era","volume":"2018","author":"Garay Juan A.","year":"2018","unstructured":"Juan A. Garay and Aggelos Kiayias . 2018 . SoK: A Consensus Taxonomy in the Blockchain Era . IACR Cryptology ePrint Archive 2018 (2018), 754 . Juan A. Garay and Aggelos Kiayias. 2018. SoK: A Consensus Taxonomy in the Blockchain Era. IACR Cryptology ePrint Archive 2018 (2018), 754.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_46_1","unstructured":"Alexis Gauba Aparna Krishnan Zubin Koticha Maaz Uddin and Mahnush Movahedi. 2018. A MetaAnalysis of Proposed Alternative Consensus Protocols for Blockchains. https:\/\/github.com\/Mechanism-Labs\/MetaAnalysis-of-Alternative-Consensus-Protocols.  Alexis Gauba Aparna Krishnan Zubin Koticha Maaz Uddin and Mahnush Movahedi. 2018. A MetaAnalysis of Proposed Alternative Consensus Protocols for Blockchains. https:\/\/github.com\/Mechanism-Labs\/MetaAnalysis-of-Alternative-Consensus-Protocols."},{"key":"e_1_3_2_1_47_1","volume-title":"On the Security and Performance of Proof of Work Blockchains. In ACM SIGSAC Conference on Computer and Communications Security. 3--16","author":"Gervais Arthur","year":"2016","unstructured":"Arthur Gervais , Ghassan O. Karame , Karl W\u00fcst , Vasileios Glykantzis , Hubert Ritzdorf , and Srdjan Capkun . 2016 . On the Security and Performance of Proof of Work Blockchains. In ACM SIGSAC Conference on Computer and Communications Security. 3--16 . Arthur Gervais, Ghassan O. Karame, Karl W\u00fcst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. In ACM SIGSAC Conference on Computer and Communications Security. 3--16."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_49_1","volume-title":"Scalable Consistency in Scatter. In ACM Symposium on Operating Systems Principles. 15--28","author":"Glendenning Lisa","year":"2011","unstructured":"Lisa Glendenning , Ivan Beschastnikh , Arvind Krishnamurthy , and Thomas Anderson . 2011 . Scalable Consistency in Scatter. In ACM Symposium on Operating Systems Principles. 15--28 . Lisa Glendenning, Ivan Beschastnikh, Arvind Krishnamurthy, and Thomas Anderson. 2011. Scalable Consistency in Scatter. In ACM Symposium on Operating Systems Principles. 15--28."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132863.1132867"},{"key":"e_1_3_2_1_51_1","volume-title":"Notes on Database Operating Systems","author":"Gray James N","unstructured":"James N Gray . 1978. Notes on Database Operating Systems . In Springer Operating Systems . 393--481. James N Gray. 1978. Notes on Database Operating Systems. In Springer Operating Systems. 393--481."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"key":"e_1_3_2_1_53_1","volume-title":"SpaceMint: A Cryptocurrency Based on Proofs of Space. IACR Cryptology ePrint Archive","author":"H\u00f8nsi Trond","year":"2017","unstructured":"Trond H\u00f8nsi . 2017. SpaceMint: A Cryptocurrency Based on Proofs of Space. IACR Cryptology ePrint Archive ( 2017 ). Trond H\u00f8nsi. 2017. SpaceMint: A Cryptocurrency Based on Proofs of Space. IACR Cryptology ePrint Archive (2017)."},{"key":"e_1_3_2_1_54_1","unstructured":"Hyperledger. [n.d.]. Sawtooth. https:\/\/intelledger.github.io\/introduction.html.  Hyperledger. [n.d.]. Sawtooth. https:\/\/intelledger.github.io\/introduction.html."},{"key":"e_1_3_2_1_55_1","volume-title":"Zab: High-performance Broadcast for Primary-backup Systems","author":"Junqueira Flavio Paiva","year":"2011","unstructured":"Flavio Paiva Junqueira , Benjamin C. Reed , and Marco Serafini . 2011 . Zab: High-performance Broadcast for Primary-backup Systems . In IEEE Dependable Systems and Networks . 245--256. Flavio Paiva Junqueira, Benjamin C. Reed, and Marco Serafini. 2011. Zab: High-performance Broadcast for Primary-backup Systems. In IEEE Dependable Systems and Networks. 245--256."},{"key":"e_1_3_2_1_56_1","volume-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In CRYPTO (1) (Lecture Notes in Computer Science)","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias , Alexander Russell , Bernardo David , and Roman Oliynykov . 2017 . Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In CRYPTO (1) (Lecture Notes in Computer Science) , Vol. 10401 . Springer , 357--388. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In CRYPTO (1) (Lecture Notes in Computer Science), Vol. 10401. Springer, 357--388."},{"key":"e_1_3_2_1_57_1","volume-title":"USENIX Security Symposium. 279--296","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing . In USENIX Security Symposium. 279--296 . Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In USENIX Security Symposium. 279--296."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_59_1","volume-title":"SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. In Workshop on Trusted Smart Contracts, Financial Cryptography.","author":"Kothapalli Abhiram","year":"2017","unstructured":"Abhiram Kothapalli , Andrew Miller , and Nikita Borisov . 2017 . SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. In Workshop on Trusted Smart Contracts, Financial Cryptography. Abhiram Kothapalli, Andrew Miller, and Nikita Borisov. 2017. SmartCast: An Incentive Compatible Consensus Protocol Using Smart Contracts. In Workshop on Trusted Smart Contracts, Financial Cryptography."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658357.1658358"},{"key":"e_1_3_2_1_61_1","volume-title":"High Throughput Byzantine Fault Tolerance. In Conference on Dependable Systems and Networks.","author":"Kotla Ramakrishna","year":"2004","unstructured":"Ramakrishna Kotla and Mike Dahlin . 2004 . High Throughput Byzantine Fault Tolerance. In Conference on Dependable Systems and Networks. Ramakrishna Kotla and Mike Dahlin. 2004. High Throughput Byzantine Fault Tolerance. In Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_1_62_1","volume-title":"Tendermint: Consensus without Mining. https:\/\/tendermint.com\/static\/docs\/tendermint.pdf.","author":"Kwon Jae","year":"2014","unstructured":"Jae Kwon . 2014 . Tendermint: Consensus without Mining. https:\/\/tendermint.com\/static\/docs\/tendermint.pdf. Jae Kwon. 2014. Tendermint: Consensus without Mining. https:\/\/tendermint.com\/static\/docs\/tendermint.pdf."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_65_1","volume-title":"Dynamic Scalable State Machine Replication. In ACM Symposium on Operating Systems Principles.","author":"Le L. H.","unstructured":"L. H. Le , C. E. Bezerra , and F. Pedone . 2016 . Dynamic Scalable State Machine Replication. In ACM Symposium on Operating Systems Principles. L. H. Le, C. E. Bezerra, and F. Pedone. 2016. Dynamic Scalable State Machine Replication. In ACM Symposium on Operating Systems Principles."},{"key":"e_1_3_2_1_66_1","unstructured":"Sergio Demian Lerner. [n.d.]. DECOR+ HOP: A Scalable Blockchain Protocol. https:\/\/scalingbitcoin.org\/papers\/DECOR-HOP.pdf. ([n. d.]).  Sergio Demian Lerner. [n.d.]. DECOR+ HOP: A Scalable Blockchain Protocol. https:\/\/scalingbitcoin.org\/papers\/DECOR-HOP.pdf. ([n. d.])."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_2_1_68_1","volume-title":"Demystifying Incentives in the Consensus Computer. In ACM SIGSAC Conference on Computer and Communications Security. 706--719","author":"Luu Loi","year":"2015","unstructured":"Loi Luu , Jason Teutsch , Raghav Kulkarni , and Prateek Saxena . 2015 . Demystifying Incentives in the Consensus Computer. In ACM SIGSAC Conference on Computer and Communications Security. 706--719 . Loi Luu, Jason Teutsch, Raghav Kulkarni, and Prateek Saxena. 2015. Demystifying Incentives in the Consensus Computer. In ACM SIGSAC Conference on Computer and Communications Security. 706--719."},{"key":"e_1_3_2_1_69_1","volume-title":"SmartPool: Practical Decentralized Pooled Mining. In USENIX Security Symposium. 1409--1426","author":"Luu Loi","year":"2017","unstructured":"Loi Luu , Yaron Velner , Jason Teutsch , and Prateek Saxena . 2017 . SmartPool: Practical Decentralized Pooled Mining. In USENIX Security Symposium. 1409--1426 . Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. SmartPool: Practical Decentralized Pooled Mining. In USENIX Security Symposium. 1409--1426."},{"key":"e_1_3_2_1_70_1","volume-title":"A Game-theoretic Analysis of Shard-based Permissionless Blockchains. arXiv preprint arXiv:1809.07307","author":"Manshaei Mohammad Hossein","year":"2018","unstructured":"Mohammad Hossein Manshaei , Murtuza Jadliwala , Anindya Maiti , and Mahdi Fooladgar . 2018. A Game-theoretic Analysis of Shard-based Permissionless Blockchains. arXiv preprint arXiv:1809.07307 ( 2018 ). Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, and Mahdi Fooladgar. 2018. A Game-theoretic Analysis of Shard-based Permissionless Blockchains. arXiv preprint arXiv:1809.07307 (2018)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"e_1_3_2_1_72_1","volume-title":"The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus","author":"Mazieres David","year":"2015","unstructured":"David Mazieres . 2015. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus . Stellar Development Foundation ( 2015 ). David Mazieres. 2015. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. Stellar Development Foundation (2015)."},{"key":"e_1_3_2_1_73_1","volume-title":"Permacoin: Repurposing Bitcoin Work for Data Preservation. In IEEE Symposium on Security and Privacy. 475--490","author":"Miller Andrew","year":"2014","unstructured":"Andrew Miller , Ari Juels , Elaine Shi , Bryan Parno , and Jonathan Katz . 2014 . Permacoin: Repurposing Bitcoin Work for Data Preservation. In IEEE Symposium on Security and Privacy. 475--490 . Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing Bitcoin Work for Data Preservation. In IEEE Symposium on Security and Privacy. 475--490."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813621"},{"key":"e_1_3_2_1_75_1","volume-title":"The Honey Badger of BFT Protocols. In ACM SIGSAC Conference on Computer and Communications Security. 31--42","author":"Miller Andrew","year":"2016","unstructured":"Andrew Miller , Yu Xia , Kyle Croman , Elaine Shi , and Dawn Song . 2016 . The Honey Badger of BFT Protocols. In ACM SIGSAC Conference on Computer and Communications Security. 31--42 . Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The Honey Badger of BFT Protocols. In ACM SIGSAC Conference on Computer and Communications Security. 31--42."},{"key":"e_1_3_2_1_76_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_77_1","volume-title":"Article 20 (Aug.","author":"Narayanan Arvind","year":"2017","unstructured":"Arvind Narayanan and Jeremy Clark . 2017. Bitcoin's Academic Pedigree. ACM Queue 15, 4 , Article 20 (Aug. 2017 ), 30 pages. Arvind Narayanan and Jeremy Clark. 2017. Bitcoin's Academic Pedigree. ACM Queue 15, 4, Article 20 (Aug. 2017), 30 pages."},{"key":"e_1_3_2_1_78_1","volume-title":"ACM Symposium on Principles of Distributed Computing. 8--17","author":"Oki Brian M","year":"1988","unstructured":"Brian M Oki and Barbara H Liskov . 1988 . Viewstamped Replication: A New Primary Copy Method to Support Highly-available Distributed Systems . In ACM Symposium on Principles of Distributed Computing. 8--17 . Brian M Oki and Barbara H Liskov. 1988. Viewstamped Replication: A New Primary Copy Method to Support Highly-available Distributed Systems. In ACM Symposium on Principles of Distributed Computing. 8--17."},{"key":"e_1_3_2_1_79_1","volume-title":"USENIX Annual Technical Conference. 305--319","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John K Ousterhout . 2014 . In Search of an Understandable Consensus Algorithm .. In USENIX Annual Technical Conference. 305--319 . Diego Ongaro and John K Ousterhout. 2014. In Search of an Understandable Consensus Algorithm.. In USENIX Annual Technical Conference. 305--319."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_3_2_1_82_1","volume-title":"Intel develops Sawtooth Lakedistributed ledger technology for the Hyperledger project. Bitcoin Magazine","author":"Prisco Giulio","year":"2016","unstructured":"Giulio Prisco . 2016. Intel develops Sawtooth Lakedistributed ledger technology for the Hyperledger project. Bitcoin Magazine ( 2016 ). Giulio Prisco. 2016. Intel develops Sawtooth Lakedistributed ledger technology for the Hyperledger project. Bitcoin Magazine (2016)."},{"key":"e_1_3_2_1_83_1","unstructured":"Team Rocket. 2018. Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies. https:\/\/ipfs.io\/ipfs\/QmUy4jh5mGNZvLkjies1RWM4YuvJh5o2FYopNPVYwrRVGV.  Team Rocket. 2018. Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies. https:\/\/ipfs.io\/ipfs\/QmUy4jh5mGNZvLkjies1RWM4YuvJh5o2FYopNPVYwrRVGV."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_85_1","volume-title":"BFT Protocols Under Fire. In USENIX Symposium on Networked Systems Design and Implementation.","author":"Singh Atul","year":"2008","unstructured":"Atul Singh , Tathagata Das , Petros Maniatis , Peter Druschel , and Timothy Roscoe . 2008 . BFT Protocols Under Fire. In USENIX Symposium on Networked Systems Design and Implementation. Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, and Timothy Roscoe. 2008. BFT Protocols Under Fire. In USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_1_86_1","volume-title":"Nonblocking Commit Protocols. In ACM SIGMOD International Conference on Management of Data. 133--142","author":"Skeen Dale","year":"1981","unstructured":"Dale Skeen . 1981 . Nonblocking Commit Protocols. In ACM SIGMOD International Conference on Management of Data. 133--142 . Dale Skeen. 1981. Nonblocking Commit Protocols. In ACM SIGMOD International Conference on Management of Data. 133--142."},{"key":"e_1_3_2_1_87_1","volume-title":"SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky , Yoad Lewenberg , and Aviv Zohar . 2016 . SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive (2016), 1159. Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive (2016), 1159."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"crossref","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2015. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). 507--527.  Yonatan Sompolinsky and Aviv Zohar. 2015. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). 507--527.","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_1_89_1","first-page":"400","article-title":"Agreement with Satoshi - On the Formalization of Nakamoto Consensus","volume":"2018","author":"Stifter Nicholas","year":"2018","unstructured":"Nicholas Stifter , Aljosha Judmayer , Philipp Schindler , Alexei Zamyatin , and Edgar R. Weippl . 2018 . Agreement with Satoshi - On the Formalization of Nakamoto Consensus . IACR Cryptology ePrint Archive 2018 (2018), 400 . Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, and Edgar R. Weippl. 2018. Agreement with Satoshi - On the Formalization of Nakamoto Consensus. IACR Cryptology ePrint Archive 2018 (2018), 400.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_90_1","volume-title":"Scalable Bias-resistant Distributed Randomness. In IEEE Symposium on Security and Privacy. 444--460","author":"Syta Ewa","year":"2017","unstructured":"Ewa Syta , Philipp Jovanovic , Eleftherios Kokoris Kogias , Nicolas Gailly , Linus Gasser , Ismail Khoffi , Michael J Fischer , and Bryan Ford . 2017 . Scalable Bias-resistant Distributed Randomness. In IEEE Symposium on Security and Privacy. 444--460 . Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J Fischer, and Bryan Ford. 2017. Scalable Bias-resistant Distributed Randomness. In IEEE Symposium on Security and Privacy. 444--460."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0056"},{"key":"e_1_3_2_1_93_1","volume-title":"BFT Replication. In International Workshop on Open Problems in Network Security. 112--125","author":"Vukoli\u0107 Marko","year":"2015","unstructured":"Marko Vukoli\u0107 . 2015 . The Quest for Scalable Blockchain Fabric: Proof-of-Work vs . BFT Replication. In International Workshop on Open Problems in Network Security. 112--125 . Marko Vukoli\u0107. 2015. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In International Workshop on Open Problems in Network Security. 112--125."},{"key":"e_1_3_2_1_94_1","volume-title":"Rethinking Permissioned Blockchains. In ACM Workshop on Blockchain, Cryptocurrencies and Contracts. 3--7.","author":"Vukoli\u0107 Marko","year":"2017","unstructured":"Marko Vukoli\u0107 . 2017 . Rethinking Permissioned Blockchains. In ACM Workshop on Blockchain, Cryptocurrencies and Contracts. 3--7. Marko Vukoli\u0107. 2017. Rethinking Permissioned Blockchains. In ACM Workshop on Blockchain, Cryptocurrencies and Contracts. 3--7."},{"key":"e_1_3_2_1_95_1","volume-title":"Tolerating Latency in Replicated State Machines Through Client Speculation. In USENIX Symposium on Networked Systems Design and Implementation. 245--260","author":"Wester Benjamin","year":"2009","unstructured":"Benjamin Wester , James A. Cowling , Edmund B. Nightingale , Peter M. Chen , Jason Flinn , and Barbara Liskov . 2009 . Tolerating Latency in Replicated State Machines Through Client Speculation. In USENIX Symposium on Networked Systems Design and Implementation. 245--260 . Benjamin Wester, James A. Cowling, Edmund B. Nightingale, Peter M. Chen, Jason Flinn, and Barbara Liskov. 2009. Tolerating Latency in Replicated State Machines Through Client Speculation. In USENIX Symposium on Networked Systems Design and Implementation. 245--260."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_2_1_98_1","volume-title":"REM: Resource-Efficient Mining for Blockchains. In USENIX Security Symposium. 1427--1444","author":"Zhang Fan","year":"2017","unstructured":"Fan Zhang , Ittay Eyal , Robert Escriva , Ari Juels , and Robbert Van Renesse . 2017 . REM: Resource-Efficient Mining for Blockchains. In USENIX Security Symposium. 1427--1444 . Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, and Robbert Van Renesse. 2017. REM: Resource-Efficient Mining for Blockchains. In USENIX Security Symposium. 1427--1444."},{"key":"e_1_3_2_1_99_1","volume-title":"Securing and Scaling Cryptocurrencies. In Joint Conference on Artificial Intelligence.","author":"Zohar Aviv","unstructured":"Aviv Zohar . [n.d.]. Securing and Scaling Cryptocurrencies. In Joint Conference on Artificial Intelligence. Aviv Zohar. [n.d.]. Securing and Scaling Cryptocurrencies. In Joint Conference on Artificial Intelligence."}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:33Z","timestamp":1750268973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355458"}},"subtitle":["Consensus in the Age of Blockchains"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":97,"alternative-id":["10.1145\/3318041.3355458","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355458","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}