{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:36:05Z","timestamp":1771043765470,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T00:00:00Z","timestamp":1596153600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,31]]},"DOI":"10.1145\/3382734.3405704","type":"proceedings-article","created":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T22:33:55Z","timestamp":1596234835000},"page":"428-437","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Perigee: Efficient Peer-to-Peer Network Design for Blockchains"],"prefix":"10.1145","author":[{"given":"Yifan","family":"Mao","sequence":"first","affiliation":[{"name":"The Ohio State University"}]},{"given":"Soubhik","family":"Deb","sequence":"additional","affiliation":[{"name":"University of Washington Seattle"}]},{"given":"Shaileshh Bojja","family":"Venkatakrishnan","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]},{"given":"Sreeram","family":"Kannan","sequence":"additional","affiliation":[{"name":"University of Washington Seattle"}]},{"given":"Kannan","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Bitnodes network. Data drawn from website https:\/\/bitnodes.earn.com\/.  2020. Bitnodes network. Data drawn from website https:\/\/bitnodes.earn.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Falcon. https:\/\/www.falcon-net.org\/.  2020. Falcon. https:\/\/www.falcon-net.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. FIBRE. https:\/\/bitcoinfibre.org\/.  2020. FIBRE. https:\/\/bitcoinfibre.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. How many people use Bitcoin in 2019? https:\/\/www.bitcoinmarketjournal.com\/how-many-people-use-bitcoin\/.  2020. How many people use Bitcoin in 2019? https:\/\/www.bitcoinmarketjournal.com\/how-many-people-use-bitcoin\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5160955"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.51"},{"key":"e_1_3_2_1_7_1","first-page":"270","article-title":"Sync HotStuff: simple and practical synchronous state machine replication","volume":"2019","author":"Abraham Ittai","year":"2019","unstructured":"Ittai Abraham , Dahlia Malkhi , Kartik Nayak , Ling Ren , and Maofan Yin . 2019 . Sync HotStuff: simple and practical synchronous state machine replication . IACR Cryptology ePrint Archive 2019 (2019), 270 . Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Maofan Yin. 2019. Sync HotStuff: simple and practical synchronous state machine replication. IACR Cryptology ePrint Archive 2019 (2019), 270.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","author":"Auer Peter","year":"2002","unstructured":"Peter Auer . 2002 . Using confidence bounds for exploitation-exploration trade-offs . Journal of Machine Learning Research 3 , Nov (2002), 397 -- 422 . Peter Auer. 2002. Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research 3, Nov (2002), 397--422.","journal-title":"Journal of Machine Learning Research 3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.29"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_1_11_1","unstructured":"Lukas Bieri. 2019. Simulating Bitcoin?s Network Topology. (2019).  Lukas Bieri. 2019. Simulating Bitcoin?s Network Topology. (2019)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/130930984"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751427"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhz007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015471"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10852-012-9182-8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993640"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462084"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-012-9710-y"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20832"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_25_1","volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15). 129--144.","author":"Heilman Ethan","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015. Eclipse attacks on bitcoin?s peer-to-peer network . In 24th {USENIX} Security Symposium ({USENIX} Security 15). 129--144. Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin?s peer-to-peer network. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 129--144."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999603"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398790"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892324"},{"key":"e_1_3_2_1_29_1","volume-title":"bloxroute: A scalable trustless blockchain distribution network whitepaper","author":"Klarman Uri","year":"2018","unstructured":"Uri Klarman , Soumya Basu , Aleksandar Kuzmanovic , and Emin G\u00fcn Sirer . 2018. bloxroute: A scalable trustless blockchain distribution network whitepaper . IEEE Internet of Things Journal ( 2018 ). Uri Klarman, Soumya Basu, Aleksandar Kuzmanovic, and Emin G\u00fcn Sirer. 2018. bloxroute: A scalable trustless blockchain distribution network whitepaper. IEEE Internet of Things Journal (2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610546"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 7th symposium on Operating systems design and implementation. 367--380","author":"Madhyastha Harsha V","year":"2006","unstructured":"Harsha V Madhyastha , Tomas Isdal , Michael Piatek , Colin Dixon , Thomas Anderson , Arvind Krishnamurthy , and Arun Venkataramani . 2006 . iPlane: An information plane for distributed services . In Proceedings of the 7th symposium on Operating systems design and implementation. 367--380 . Harsha V Madhyastha, Tomas Isdal, Michael Piatek, Colin Dixon, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. 2006. iPlane: An information plane for distributed services. In Proceedings of the 7th symposium on Operating systems design and implementation. 367--380."},{"key":"e_1_3_2_1_32_1","volume-title":"Discovering bitcoin?s public topology and influential nodes. et al","author":"Miller Andrew","year":"2015","unstructured":"Andrew Miller , James Litton , Andrew Pachulski , Neal Gupta , Dave Levin , Neil Spring , and Bobby Bhattacharjee . 2015. Discovering bitcoin?s public topology and influential nodes. et al ( 2015 ). Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin?s public topology and influential nodes. et al (2015)."},{"key":"e_1_3_2_1_33_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.","author":"Nakamoto Satoshi","year":"2019","unstructured":"Satoshi Nakamoto . 2019 . Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot. Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot."},{"key":"e_1_3_2_1_34_1","volume-title":"Graphene: A new protocol for block propagation using set reconciliation. In Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Ozisik A Pinar","year":"2017","unstructured":"A Pinar Ozisik , Gavin Andresen , George Bissias , Amir Houmansadr , and Brian Levine . 2017 . Graphene: A new protocol for block propagation using set reconciliation. In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 420--428. A Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, and Brian Levine. 2017. Graphene: A new protocol for block propagation using set reconciliation. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 420--428."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.814666"},{"key":"e_1_3_2_1_36_1","volume-title":"31st International Symposium on Distributed Computing (DISC","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Hybrid consensus: Efficient consensus in the permissionless model . In 31st International Symposium on Distributed Computing (DISC 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In 31st International Symposium on Distributed Computing (DISC 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355469"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"key":"e_1_3_2_1_39_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 515--532","author":"Sapirshtein Ayelet","year":"2016","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2016 . Optimal selfish mining strategies in bitcoin . In International Conference on Financial Cryptography and Data Security. Springer, 515--532 . Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 515--532."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364918802957"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"}],"event":{"name":"PODC '20: ACM Symposium on Principles of Distributed Computing","location":"Virtual Event Italy","acronym":"PODC '20","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 39th Symposium on Principles of Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382734.3405704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3382734.3405704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:49Z","timestamp":1750197769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382734.3405704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,31]]},"references-count":42,"alternative-id":["10.1145\/3382734.3405704","10.1145\/3382734"],"URL":"https:\/\/doi.org\/10.1145\/3382734.3405704","relation":{},"subject":[],"published":{"date-parts":[[2020,7,31]]},"assertion":[{"value":"2020-07-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}