{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:59:50Z","timestamp":1776103190413,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1651236"],"award-info":[{"award-number":["1651236"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1705007"],"award-info":[{"award-number":["1705007"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0939370"],"award-info":[{"award-number":["CCF-0939370"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363213","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"585-602","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":178,"title":["Prism"],"prefix":"10.1145","author":[{"given":"Vivek","family":"Bagaria","sequence":"first","affiliation":[{"name":"Stanford University, Palo Alto, CA, USA"}]},{"given":"Sreeram","family":"Kannan","sequence":"additional","affiliation":[{"name":"University of Washington at Seattle, Seattle, WA, USA"}]},{"given":"David","family":"Tse","sequence":"additional","affiliation":[{"name":"Stanford University, Palo Alto, CA, USA"}]},{"given":"Giulia","family":"Fanti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Solida: A blockchain protocol based on reconfigurable byzantine consensus. arXiv preprint arXiv:1612.02916","author":"Abraham I.","year":"2016","unstructured":"I. Abraham , D. Malkhi , K. Nayak , L. Ren , and A. Spiegelman . Solida: A blockchain protocol based on reconfigurable byzantine consensus. arXiv preprint arXiv:1612.02916 , 2016 . I. Abraham, D. Malkhi, K. Nayak, L. Ren, and A. Spiegelman. Solida: A blockchain protocol based on reconfigurable byzantine consensus. arXiv preprint arXiv:1612.02916, 2016."},{"key":"e_1_3_2_2_2_1","unstructured":"Gavin Andresen. Weak block thoughts. bitcoin-dev. https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2015-September\/011157.html.  Gavin Andresen. Weak block thoughts. bitcoin-dev. https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2015-September\/011157.html."},{"key":"e_1_3_2_2_3_1","volume-title":"Prism: Deconstructing the blockchain to approach physical limits. arXiv preprint","author":"Bagaria Vivek","year":"2019","unstructured":"Vivek Bagaria , Sreeram Kannan , David Tse , Giulia Fanti , and Pramod Viswanath . Prism: Deconstructing the blockchain to approach physical limits. arXiv preprint , 2019 . Extended version. Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, and Pramod Viswanath. Prism: Deconstructing the blockchain to approach physical limits. arXiv preprint, 2019. Extended version."},{"key":"e_1_3_2_2_4_1","volume-title":"On slow and fast block times","author":"Buterin Vitalik","year":"2015","unstructured":"Vitalik Buterin . On slow and fast block times , 2015 . https:\/\/blog.ethereum.org\/2015\/09\/14\/on-slow-and-fast-block-times\/. Vitalik Buterin. On slow and fast block times, 2015. https:\/\/blog.ethereum.org\/2015\/09\/14\/on-slow-and-fast-block-times\/."},{"key":"e_1_3_2_2_5_1","first-page":"1","article-title":"Information propagation in the bitcoin network","volume":"2013","author":"Decker C.","year":"2013","unstructured":"C. Decker and R. Wattenhofer . Information propagation in the bitcoin network . In IEEE P2P 2013 Proceedings, pages 1 -- 10 , Sept 2013 . C. Decker and R. Wattenhofer. Information propagation in the bitcoin network. In IEEE P2P 2013 Proceedings, pages 1--10, Sept 2013.","journal-title":"IEEE P2P"},{"key":"e_1_3_2_2_6_1","first-page":"13","volume-title":"Proceedings of the 17th International Conference on Distributed Computing and Networking","author":"Decker Christian","unstructured":"Christian Decker , Jochen Seidel , and Roger Wattenhofer . Bitcoin meets strong consistency . In Proceedings of the 17th International Conference on Distributed Computing and Networking , page 13 . ACM, 2016. Christian Decker, Jochen Seidel, and Roger Wattenhofer. Bitcoin meets strong consistency. In Proceedings of the 17th International Conference on Distributed Computing and Networking, page 13. ACM, 2016."},{"key":"e_1_3_2_2_7_1","first-page":"45","volume-title":"NSDI","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert Van Renesse . Bitcoin-ng : A scalable blockchain protocol . In NSDI , pages 45 -- 59 , 2016 . Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. Bitcoin-ng: A scalable blockchain protocol. In NSDI, pages 45--59, 2016."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_2_10_1","volume-title":"On trees, chains and fast transactions in the blockchain","author":"Aggelos","year":"2016","unstructured":"Aggelos K. and Giorgos P . On trees, chains and fast transactions in the blockchain . 2016 . Aggelos K. and Giorgos P. On trees, chains and fast transactions in the blockchain. 2016."},{"key":"e_1_3_2_2_11_1","volume-title":"Congestion control for high bandwidth-delay product networks. ACM SIGCOMM computer communication review, 32(4):89--102","author":"Katabi Dina","year":"2002","unstructured":"Dina Katabi , Mark Handley , and Charlie Rohrs . Congestion control for high bandwidth-delay product networks. ACM SIGCOMM computer communication review, 32(4):89--102 , 2002 . Dina Katabi, Mark Handley, and Charlie Rohrs. Congestion control for high bandwidth-delay product networks. ACM SIGCOMM computer communication review, 32(4):89--102, 2002."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243814"},{"key":"e_1_3_2_2_13_1","volume-title":"25th USENIX Security Symposium","author":"Kogias Eleftherios","year":"2016","unstructured":"Eleftherios Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . Enhancing bitcoin security and performance with strong consistency via collective signing . In 25th USENIX Security Symposium , 2016 . Eleftherios Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium, 2016."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_3_2_2_15_1","volume-title":"Scaling nakamoto consensus to thousands of transactions per second. arXiv preprint arXiv:1805.03870","author":"Li Chenxing","year":"2018","unstructured":"Chenxing Li , Peilun Li , Wei Xu , Fan Long , and Andrew Chi-chih Yao . Scaling nakamoto consensus to thousands of transactions per second. arXiv preprint arXiv:1805.03870 , 2018 . Chenxing Li, Peilun Li, Wei Xu, Fan Long, and Andrew Chi-chih Yao. Scaling nakamoto consensus to thousands of transactions per second. arXiv preprint arXiv:1805.03870, 2018."},{"key":"e_1_3_2_2_16_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . Bitcoin: A peer-to-peer electronic cash system . 2008 . Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008."},{"key":"e_1_3_2_2_17_1","volume-title":"Balance attack against proof-of-work blockchains: The r3 testbed as an example. arXiv preprint arXiv:1612.09426","author":"Natoli Christopher","year":"2016","unstructured":"Christopher Natoli and Vincent Gramoli . Balance attack against proof-of-work blockchains: The r3 testbed as an example. arXiv preprint arXiv:1612.09426 , 2016 . Christopher Natoli and Vincent Gramoli. Balance attack against proof-of-work blockchains: The r3 testbed as an example. arXiv preprint arXiv:1612.09426, 2016."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_3_2_2_20_1","volume-title":"LIPIcs-Leibniz International Proceedings in Informatics. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . Hybrid consensus : Efficient consensus in the permissionless model . In LIPIcs-Leibniz International Proceedings in Informatics. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik , 2017 . Rafael Pass and Elaine Shi. Hybrid consensus: Efficient consensus in the permissionless model. In LIPIcs-Leibniz International Proceedings in Informatics. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017."},{"key":"e_1_3_2_2_21_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer","author":"Pass Rafael","year":"2018","unstructured":"Rafael Pass and Elaine Shi . Thunderella : Blockchains with optimistic instant confirmation . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer , 2018 . Rafael Pass and Elaine Shi. Thunderella: Blockchains with optimistic instant confirmation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2018."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2016.40"},{"key":"e_1_3_2_2_23_1","volume-title":"Spectre: A fast and scalable cryptocurrency protocol. IACR Cryptology ePrint Archive","author":"Sompolinsky Y","year":"2016","unstructured":"Y Sompolinsky , Y Lewenberg , and A Zohar . Spectre: A fast and scalable cryptocurrency protocol. IACR Cryptology ePrint Archive , 2016 :1159. Y Sompolinsky, Y Lewenberg, and A Zohar. Spectre: A fast and scalable cryptocurrency protocol. IACR Cryptology ePrint Archive, 2016:1159."},{"key":"e_1_3_2_2_24_1","volume-title":"Phantom: A scalable blockdag protocol","author":"Sompolinsky Y","year":"2018","unstructured":"Y Sompolinsky and A Zohar . Phantom: A scalable blockdag protocol , 2018 . Y Sompolinsky and A Zohar. Phantom: A scalable blockdag protocol, 2018."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_2_26_1","unstructured":"TierNolan. Decoupling transactions and pow. Bitcoin Forum. https:\/\/bitcointalk.org\/index.php?topic=179598.0.  TierNolan. Decoupling transactions and pow. Bitcoin Forum. https:\/\/bitcointalk.org\/index.php?topic=179598.0."},{"key":"e_1_3_2_2_27_1","volume-title":"OHIE: blockchain scaling made simple. CoRR, abs\/1811.12628","author":"Yu Haifeng","year":"2018","unstructured":"Haifeng Yu , Ivica Nikolic , Ruomu Hou , and Prateek Saxena . OHIE: blockchain scaling made simple. CoRR, abs\/1811.12628 , 2018 . Haifeng Yu, Ivica Nikolic, Ruomu Hou, and Prateek Saxena. OHIE: blockchain scaling made simple. CoRR, abs\/1811.12628, 2018."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363213","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363213","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363213"}},"subtitle":["Deconstructing the Blockchain to Approach Physical Limits"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":26,"alternative-id":["10.1145\/3319535.3363213","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363213","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}