{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:00Z","timestamp":1750221000428,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1617745, CCF-1705007, CNS-1718270"],"award-info":[{"award-number":["CCF-1617745, CCF-1705007, CNS-1718270"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-18-1-0332-(73198-NS)"],"award-info":[{"award-number":["W911NF-18-1-0332-(73198-NS)"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3323679.3326533","type":"proceedings-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T16:07:11Z","timestamp":1559664431000},"page":"351-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Barracuda"],"prefix":"10.1145","author":[{"given":"Giulia","family":"Fanti","sequence":"first","affiliation":[{"name":"Carnegie-Mellon University"}]},{"given":"Jiantao","family":"Jiao","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Ashok","family":"Makkuva","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Sewoong","family":"Oh","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Ranvir","family":"Rana","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2014.07.026"},{"key":"e_1_3_2_1_2_1","unstructured":"Vivek Bagaria Sreeram Kannan David Tse Giulia Fanti and Pramod Viswanath. {n. d.}. Deconstructing the Blockchain to Approach Physical Limits. https:\/\/arxiv.org\/abs\/1810.08092.  Vivek Bagaria Sreeram Kannan David Tse Giulia Fanti and Pramod Viswanath. {n. d.}. Deconstructing the Blockchain to Approach Physical Limits. https:\/\/arxiv.org\/abs\/1810.08092."},{"key":"e_1_3_2_1_3_1","unstructured":"S Basu Ittay Eyal and EG Sirer. {n. d.}. The Falcon Network.  S Basu Ittay Eyal and EG Sirer. {n. d.}. The Falcon Network."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_1_5_1","volume-title":"Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith . 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 ( 2017 ). Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"Cardano. {n. d.}. Cardano Settlement Layer Documentation. https:\/\/cardanodocs.com\/technical\/.  Cardano. {n. d.}. Cardano Settlement Layer Documentation. https:\/\/cardanodocs.com\/technical\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11134-014-9397-7"},{"key":"e_1_3_2_1_8_1","volume-title":"2013 IEEE Thirteenth International Conference on. IEEE, 1--10","author":"Decker Christian","year":"2013","unstructured":"Christian Decker and Roger Wattenhofer . 2013 . Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P) , 2013 IEEE Thirteenth International Conference on. IEEE, 1--10 . Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 1--10."},{"key":"e_1_3_2_1_9_1","volume-title":"Emin G\u00fcn Sirer, and Robbert Van Renesse.","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016 . Bitcoin-NG: A Scalable Blockchain Protocol. In NSDI. 45--59. Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In NSDI. 45--59."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Giulia Fanti Jiantao Jiao Ashok Makkuva Sewoong Oh Ranvir Rana and Pramod Viswanath. 2018. Barracuda: the Power of &ell;-polling in Proof-of-Stake Blockchains. (2018). available at http:\/\/swoh.web.engr.illinois.edu\/polling.pdf and arXiv.  Giulia Fanti Jiantao Jiao Ashok Makkuva Sewoong Oh Ranvir Rana and Pramod Viswanath. 2018. Barracuda: the Power of &ell;-polling in Proof-of-Stake Blockchains. (2018). available at http:\/\/swoh.web.engr.illinois.edu\/polling.pdf and arXiv.","DOI":"10.1145\/3323679.3326533"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"MJ Fischer N Lynch and MS Paterson. 1985. Impossibility of Distributed Consensus with One Faulty Process.  MJ Fischer N Lynch and MS Paterson. 1985. Impossibility of Distributed Consensus with One Faulty Process.","DOI":"10.1145\/323596.323602"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2016.07.001"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium. 129--144","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In USENIX Security Symposium. 129--144 . Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In USENIX Security Symposium. 129--144."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_18_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing bitcoin security and performance with strong consistency via collective signing . In 25th USENIX Security Symposium (USENIX Security 16) . 279--296. Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16). 279--296."},{"key":"e_1_3_2_1_19_1","unstructured":"Timothy Lee. 2017. Bitcoin?s insane energy consumption explained. (2017).  Timothy Lee. 2017. Bitcoin?s insane energy consumption explained. (2017)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_3_2_1_21_1","volume-title":"Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870","author":"Li Chenxing","year":"2018","unstructured":"Chenxing Li , Peilun Li , Wei Xu , Fan Long , and Andrew Chi-chih Yao . 2018. Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870 ( 2018 ). Chenxing Li, Peilun Li, Wei Xu, Fan Long, and Andrew Chi-chih Yao. 2018. Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870 (2018)."},{"key":"e_1_3_2_1_22_1","volume-title":"The stellar consensus protocol: A federated model for internet-level consensus","author":"Mazieres David","year":"2015","unstructured":"David Mazieres . 2015. The stellar consensus protocol: A federated model for internet-level consensus . Stellar Development Foundation ( 2015 ). David Mazieres. 2015. The stellar consensus protocol: A federated model for internet-level consensus. Stellar Development Foundation (2015)."},{"key":"e_1_3_2_1_23_1","unstructured":"Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. 2015. Discovering bitcoin?s public topology and influential nodes. et al. (2015).  Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. 2015. Discovering bitcoin?s public topology and influential nodes. et al. (2015)."},{"volume-title":"Probability and computing: Randomized algorithms and probabilistic analysis","author":"Mitzenmacher Michael","key":"e_1_3_2_1_24_1","unstructured":"Michael Mitzenmacher and Eli Upfal . 2005. Probability and computing: Randomized algorithms and probabilistic analysis . Cambridge university press . Michael Mitzenmacher and Eli Upfal. 2005. Probability and computing: Randomized algorithms and probabilistic analysis. Cambridge university press."},{"key":"e_1_3_2_1_25_1","volume-title":"Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 2546--2554","author":"Papadis Nikolaos","year":"2018","unstructured":"Nikolaos Papadis , Sem Borst , Anwar Walid , Mohamed Grissa , and Leandros Tassiulas . 2018 . Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 2546--2554 . Nikolaos Papadis, Sem Borst, Anwar Walid, Mohamed Grissa, and Leandros Tassiulas. 2018. Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 2546--2554."},{"key":"e_1_3_2_1_26_1","volume-title":"LIPIcs-Leibniz International Proceedings in Informatics","volume":"91","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Hybrid consensus: Efficient consensus in the permissionless model . In LIPIcs-Leibniz International Proceedings in Informatics , Vol. 91 . Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In LIPIcs-Leibniz International Proceedings in Informatics, Vol. 91. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Team Rocket. 2018. Snowflake to avalanche: A novel metastable consensus protocol family for cryptocurrencies ?  Team Rocket. 2018. Snowflake to avalanche: A novel metastable consensus protocol family for cryptocurrencies ?"},{"key":"e_1_3_2_1_29_1","first-page":"1159","article-title":"SPECTRE: A Fast and Scalable Cryptocurrency Protocol","volume":"2016","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky , Yoad Lewenberg , and Aviv Zohar . 2016 . SPECTRE: A Fast and Scalable Cryptocurrency Protocol . IACR ePrint Archive 2016 (2016), 1159 . Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR ePrint Archive 2016 (2016), 1159.","journal-title":"IACR ePrint Archive"},{"key":"e_1_3_2_1_30_1","unstructured":"Yonatan Sompolinsky and Aviv Zohar. {n. d.}. PHANTOM. ({n. d.}).  Yonatan Sompolinsky and Aviv Zohar. {n. d.}. PHANTOM. ({n. d.})."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"}],"event":{"name":"Mobihoc '19: The Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Catania Italy","acronym":"Mobihoc '19"},"container-title":["Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326533","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:40Z","timestamp":1750206340000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326533"}},"subtitle":["The Power of \u2113-polling in Proof-of-Stake Blockchains"],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":31,"alternative-id":["10.1145\/3323679.3326533","10.1145\/3323679"],"URL":"https:\/\/doi.org\/10.1145\/3323679.3326533","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}