{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:32:37Z","timestamp":1772166757165,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355467","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"214-228","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["Aleph"],"prefix":"10.1145","author":[{"given":"Adam","family":"G\u0105gol","sequence":"first","affiliation":[{"name":"Aleph Zero Foundation, Jagiellonian University"}]},{"given":"Damian","family":"Le\u015bniak","sequence":"additional","affiliation":[{"name":"Aleph Zero Foundation, Jagiellonian University"}]},{"given":"Damian","family":"Straszak","sequence":"additional","affiliation":[{"name":"Aleph Zero Foundation"}]},{"given":"Micha\u0142","family":"\u015awi\u0119tek","sequence":"additional","affiliation":[{"name":"Aleph Zero Foundation, Jagiellonian University"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005","author":"Abd-El-Malek Michael","year":"2005","unstructured":"Michael Abd-El-Malek , Gregory R. Ganger , Garth R. Goodson , Michael K. Reiter , and Jay J. Wylie . 2005. Fault-scalable Byzantine fault-tolerant services . In Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005 , Brighton, UK , October 23-26, 2005 . 59--74. https:\/\/doi.org\/10.1145\/1095810.1095817 10.1145\/1095810.1095817 Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, and Jay J. Wylie. 2005. Fault-scalable Byzantine fault-tolerant services. In Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005. 59--74. https:\/\/doi.org\/10.1145\/1095810.1095817"},{"key":"e_1_3_2_1_2_1","volume-title":"Revisiting Fast Practical Byzantine Fault Tolerance. CoRR abs\/1712.01367","author":"Abraham Ittai","year":"2017","unstructured":"Ittai Abraham , Guy Gueta , Dahlia Malkhi , Lorenzo Alvisi , Ramakrishna Kotla , and Jean-Philippe Martin . 2017. Revisiting Fast Practical Byzantine Fault Tolerance. CoRR abs\/1712.01367 ( 2017 ). arXiv:1712.01367 http:\/\/arxiv.org\/abs\/1712.01367 Ittai Abraham, Guy Gueta, Dahlia Malkhi, Lorenzo Alvisi, Ramakrishna Kotla, and Jean-Philippe Martin. 2017. Revisiting Fast Practical Byzantine Fault Tolerance. CoRR abs\/1712.01367 (2017). arXiv:1712.01367 http:\/\/arxiv.org\/abs\/1712.01367"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331612"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0083-3"},{"key":"e_1_3_2_1_6_1","volume-title":"USA","author":"Boneh Dan","year":"2018","unstructured":"Dan Boneh , Joseph Bonneau , Benedikt B\u00fcnz , and Ben Fisch . 2018 . Verifiable Delay Functions. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA , USA , August 19-23, 2018, Proceedings, Part I. 757--788. https:\/\/doi.org\/10.1007\/978-3-319-96884-1_25 10.1007\/978-3-319-96884-1_25 Dan Boneh, Joseph Bonneau, Benedikt B\u00fcnz, and Ben Fisch. 2018. Verifiable Delay Functions. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I. 757--788. https:\/\/doi.org\/10.1007\/978-3-319-96884-1_25"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/800221.806706"},{"key":"e_1_3_2_1_10_1","volume-title":"The latest gossip on BFT consensus. CoRR abs\/1807.04938","author":"Buchman Ethan","year":"2018","unstructured":"Ethan Buchman , Jae Kwon , and Zarko Milosevic . 2018. The latest gossip on BFT consensus. CoRR abs\/1807.04938 ( 2018 ). arXiv:1807.04938 http:\/\/arxiv.org\/abs\/1807.04938 Ethan Buchman, Jae Kwon, and Zarko Milosevic. 2018. The latest gossip on BFT consensus. CoRR abs\/1807.04938 (2018). arXiv:1807.04938 http:\/\/arxiv.org\/abs\/1807.04938"},{"key":"e_1_3_2_1_11_1","volume-title":"Casper the Friendly Finality Gadget. CoRR abs\/1710.09437","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith . 2017. Casper the Friendly Finality Gadget. CoRR abs\/1710.09437 ( 2017 ). arXiv:1710.09437 http:\/\/arxiv.org\/abs\/1710.09437 Vitalik Buterin and Virgil Griffith. 2017. Casper the Friendly Finality Gadget. CoRR abs\/1710.09437 (2017). arXiv:1710.09437 http:\/\/arxiv.org\/abs\/1710.09437"},{"key":"e_1_3_2_1_12_1","volume-title":"Rodrigues","author":"Cachin Christian","year":"2011","unstructured":"Christian Cachin , Rachid Guerraoui , and Lu\u00eds E. T . Rodrigues . 2011 . Introduction to Reliable and Secure Distributed Programming (2. ed.). Springer . https:\/\/doi.org\/10.1007\/978-3-642-15260-3 10.1007\/978-3-642-15260-3 Christian Cachin, Rachid Guerraoui, and Lu\u00eds E. T. Rodrigues. 2011. Introduction to Reliable and Secure Distributed Programming (2. ed.). Springer. https:\/\/doi.org\/10.1007\/978-3-642-15260-3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586124"},{"key":"e_1_3_2_1_14_1","volume-title":"21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. 524--541","author":"Cachin Christian","year":"2001","unstructured":"Christian Cachin , Klaus Kursawe , Frank Petzold , and Victor Shoup . 2001 . Secure and Efficient Asynchronous Broadcast Protocols. In Advances in Cryptology -CRYPTO 2001 , 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. 524--541 . https:\/\/doi.org\/10.1007\/3-540-44647-8_31 10.1007\/3-540-44647-8_31 Christian Cachin, Klaus Kursawe, Frank Petzold, and Victor Shoup. 2001. Secure and Efficient Asynchronous Broadcast Protocols. In Advances in Cryptology -CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. 524--541. https:\/\/doi.org\/10.1007\/3-540-44647-8_31"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0318-0"},{"key":"e_1_3_2_1_16_1","volume-title":"Blockchain Consensus Protocols in the Wild. CoRR abs\/1707.01873","author":"Cachin Christian","year":"2017","unstructured":"Christian Cachin and Marko Vukolic . 2017. Blockchain Consensus Protocols in the Wild. CoRR abs\/1707.01873 ( 2017 ). arXiv:1707.01873 http:\/\/arxiv.org\/abs\/1707.01873 Christian Cachin and Marko Vukolic. 2017. Blockchain Consensus Protocols in the Wild. CoRR abs\/1707.01873 (2017). arXiv:1707.01873 http:\/\/arxiv.org\/abs\/1707.01873"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167105"},{"key":"e_1_3_2_1_18_1","volume-title":"ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. 537--556","author":"Cascudo Ignacio","year":"2017","unstructured":"Ignacio Cascudo and Bernardo David . 2017 . SCRAPE: Scalable Randomness Attested by Public Entities. In Applied Cryptography and Network Security -15th International Conference , ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. 537--556 . https:\/\/doi.org\/10.1007\/978-3-319-61204-1_27 10.1007\/978-3-319-61204-1_27 Ignacio Cascudo and Bernardo David. 2017. SCRAPE: Scalable Randomness Attested by Public Entities. In Applied Cryptography and Network Security -15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. 537--556. https:\/\/doi.org\/10.1007\/978-3-319-61204-1_27"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh145"},{"key":"e_1_3_2_1_21_1","volume-title":"Blockmania: from Block DAGs to Consensus. arXiv preprint arXiv:1809.01620","author":"Danezis George","year":"2018","unstructured":"George Danezis and David Hrycyszyn . 2018. Blockmania: from Block DAGs to Consensus. arXiv preprint arXiv:1809.01620 ( 2018 ). George Danezis and David Hrycyszyn. 2018. Blockmania: from Block DAGs to Consensus. arXiv preprint arXiv:1809.01620 (2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_23_1","volume-title":"USA","author":"Gennaro Rosario","year":"2003","unstructured":"Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , and Tal Rabin . 2003 . Secure Applications of Pedersen's Distributed Key Generation Protocol. In Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA , USA , April 13-17, 2003, Proceedings. 373--390. https:\/\/doi.org\/10.1007\/3-540-36563-X_26 10.1007\/3-540-36563-X_26 Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. 2003. Secure Applications of Pedersen's Distributed Key Generation Protocol. In Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings. 373--390. https:\/\/doi.org\/10.1007\/3-540-36563-X_26"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"e_1_3_2_1_26_1","volume-title":"Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548","author":"Hanke Timo","year":"2018","unstructured":"Timo Hanke , Mahnush Movahedi , and Dominic Williams . 2018. Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 ( 2018 ). Timo Hanke, Mahnush Movahedi, and Dominic Williams. 2018. Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 (2018)."},{"key":"e_1_3_2_1_27_1","first-page":"377","article-title":"Distributed Key Generation in the Wild","volume":"2012","author":"Kate Aniket","year":"2012","unstructured":"Aniket Kate , Yizhou Huang , and Ian Goldberg . 2012 . Distributed Key Generation in the Wild . IACR Cryptology ePrint Archive 2012 (2012), 377 . http:\/\/eprint.iacr.org\/2012\/377 Aniket Kate, Yizhou Huang, and Ian Goldberg. 2012. Distributed Key Generation in the Wild. IACR Cryptology ePrint Archive 2012 (2012), 377. http:\/\/eprint.iacr.org\/2012\/377","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_28_1","volume-title":"USA","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias , Alexander Russell , Bernardo David , and Roman Oliynykov . 2017 . Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA , USA , August 20-24, 2017, Proceedings, Part I. 357--388. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12 10.1007\/978-3-319-63688-7_12 Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I. 357--388. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658357.1658358"},{"key":"e_1_3_2_1_30_1","unstructured":"Jae Kwon and Ethan Buchman. [n. d.]. A Network of Distributed Ledgers. ([n. d.]). https:\/\/cosmos.network\/cosmos-whitepaper.pdf  Jae Kwon and Ethan Buchman. [n. d.]. A Network of Distributed Ledgers. ([n. d.]). https:\/\/cosmos.network\/cosmos-whitepaper.pdf"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2017.089354"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2011.36"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2770"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785953"},{"key":"e_1_3_2_1_37_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_38_1","volume-title":"Hybrid Consensus: Efficient Consensus in the Permissionless Model. In 31st International Symposium on Distributed Computing, DISC 2017","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Hybrid Consensus: Efficient Consensus in the Permissionless Model. In 31st International Symposium on Distributed Computing, DISC 2017 , October 16-20, 2017, Vienna, Austria. 39:1--39:16. https:\/\/doi.org\/10.4230\/LIPIcs.DISC. 2017.39 10.4230\/LIPIcs.DISC.2017.39 Rafael Pass and Elaine Shi. 2017. Hybrid Consensus: Efficient Consensus in the Permissionless Model. In 31st International Symposium on Distributed Computing, DISC 2017, October 16-20, 2017, Vienna, Austria. 39:1--39:16. https:\/\/doi.org\/10.4230\/LIPIcs.DISC.2017.39"},{"key":"e_1_3_2_1_39_1","volume-title":"Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. 522--526","author":"Pedersen Torben P.","year":"1991","unstructured":"Torben P. Pedersen . 1991 . A Threshold Cryptosystem without a Trusted Party (Extended Abstract) . In Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. 522--526 . https:\/\/doi.org\/10.1007\/3-540-46416-6_47 10.1007\/3-540-46416-6_47 Torben P. Pedersen. 1991. A Threshold Cryptosystem without a Trusted Party (Extended Abstract). In Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. 522--526. https:\/\/doi.org\/10.1007\/3-540-46416-6_47"},{"key":"e_1_3_2_1_40_1","volume-title":"Simple Verifiable Delay Functions. In 10th Innovations in Theoretical Computer Science Conference, ITCS 2019","author":"Pietrzak Krzysztof","year":"2019","unstructured":"Krzysztof Pietrzak . 2019 . Simple Verifiable Delay Functions. In 10th Innovations in Theoretical Computer Science Conference, ITCS 2019 , January 10-12, 2019, San Diego, California, USA. 60:1--60:15. https:\/\/doi.org\/10.4230\/LIPIcs.ITCS. 2019.60 10.4230\/LIPIcs.ITCS.2019.60 Krzysztof Pietrzak. 2019. Simple Verifiable Delay Functions. In 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, January 10-12, 2019, San Diego, California, USA. 60:1--60:15. https:\/\/doi.org\/10.4230\/LIPIcs.ITCS.2019.60"},{"key":"e_1_3_2_1_41_1","volume-title":"The tangle. cit. on","author":"Popov Serguei","year":"2016","unstructured":"Serguei Popov . 2016. The tangle. cit. on ( 2016 ), 131. Serguei Popov. 2016. The tangle. cit. on (2016), 131."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_43_1","volume-title":"Scalable Bias-Resistant Distributed Randomness. In 2017 IEEE Symposium on Security and Privacy, SP 2017","author":"Syta Ewa","year":"2017","unstructured":"Ewa Syta , Philipp Jovanovic , Eleftherios Kokoris-Kogias , Nicolas Gailly , Linus Gasser , Ismail Khoffi , Michael J. Fischer , and Bryan Ford . 2017 . Scalable Bias-Resistant Distributed Randomness. In 2017 IEEE Symposium on Security and Privacy, SP 2017 , San Jose, CA, USA , May 22-26, 2017. 444--460. https:\/\/doi.org\/10.1109\/SP.2017.45 10.1109\/SP.2017.45 Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris-Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, and Bryan Ford. 2017. Scalable Bias-Resistant Distributed Randomness. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. 444--460. https:\/\/doi.org\/10.1109\/SP.2017.45"},{"key":"e_1_3_2_1_44_1","volume-title":"Darmstadt","author":"Wesolowski Benjamin","year":"2019","unstructured":"Benjamin Wesolowski . 2019 . Efficient Verifiable Delay Functions. In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Darmstadt , Germany, May 19-23, 2019, Proceedings, Part III. 379--407. https:\/\/doi.org\/10.1007\/978-3-030-17659-4_13 10.1007\/978-3-030-17659-4_13 Benjamin Wesolowski. 2019. Efficient Verifiable Delay Functions. In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III. 379--407. https:\/\/doi.org\/10.1007\/978-3-030-17659-4_13"}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355467","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:33Z","timestamp":1750268973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355467"}},"subtitle":["Efficient Atomic Broadcast in Asynchronous Networks with Byzantine Nodes"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":42,"alternative-id":["10.1145\/3318041.3355467","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355467","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}