{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T19:03:33Z","timestamp":1767899013840,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T00:00:00Z","timestamp":1590710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,29]]},"DOI":"10.1145\/3404512.3404522","type":"proceedings-article","created":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T12:36:00Z","timestamp":1593952560000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Overview of Blockchain Consensus Mechanism"],"prefix":"10.1145","author":[{"given":"Changqiang","family":"Zhang","sequence":"first","affiliation":[{"name":"Key Laboratory of Parallel and Distributed Computing, College of Computer, National University of Defense Technology, China"}]},{"given":"Cangshuai","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, China"}]},{"given":"Xinyi","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Antonopoulos A. Mastering Bitcoin. 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_3_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system[J]. Cons- ulted","author":"Nakamoto S.","year":"2009","unstructured":"Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Cons- ulted, 2009."},{"key":"e_1_3_2_1_4_1","volume-title":"Mastering Bitcoin: Unlocking Digital Crypto-Currencies","author":"Antonopoulos AM.","year":"2015","unstructured":"Antonopoulos AM. Mastering Bitcoin: Unlocking Digital Crypto-Currencies. Oreilly Media Inc Usa, 2015."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.btcker.com\/pools\/."},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/www.dropbox.com\/s\/cbuwrorf672c0y-y\/NxtWhitepaper_v122_rev4.pdf"},{"issue":"1","key":"e_1_3_2_1_7_1","first-page":"1","article-title":"A next-generation smart contract and decentralized application platform [J]","volume":"2014","author":"Buterin V","unstructured":"Buterin V. A next-generation smart contract and decentralized application platform [J]. Etherum, 2014(1): 1--36.","journal-title":"Etherum"},{"key":"e_1_3_2_1_8_1","unstructured":"Danny R. Casper proof of stake FAQs[EB\/OL]. (2018-08-02). http-s:\/\/github.com\/ethereum\/wiki\/wiki\/Proof-of-Stake-FAQs"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/321479.321481"},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/github.co-m\/EOSIO\/Documentation","author":"Technical WhitePaper","year":"2018","unstructured":"EOS.IO Technical WhitePaper v2, [EB\/OL] (2018). https:\/\/github.co-m\/EOSIO\/Documentation."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3002702"},{"key":"e_1_3_2_1_12_1","unstructured":"Buterin V. Ethereum 2.0 mauve paper. White Paper. 2016."},{"key":"e_1_3_2_1_13_1","unstructured":"CASTRO M LISKOV B. Practical Byzantine Fault Tolerance[EB\/OL]. https:\/\/wenku.baidu.com\/view\/3cc69308bb68a98271fefa38.html"},{"key":"e_1_3_2_1_14_1","unstructured":"Ren L. Proof of stake velocity: Building the social aurrency of the digital age [EB\/OL]. 2014[2018-03-23]. http:\/\/www.reddcoin.com\/pa-pers\/PoSV.pdf"},{"key":"e_1_3_2_1_15_1","first-page":"2017","volume":"2016","author":"Lei","unstructured":"DUONG T, FAN Lei, ZHOU Hongsheng. 2-hop Blockchain: Combi-ning Proof-of-Work and Proof-of-Stake Securely [EB\/OL]. http:\/\/epri-nt.iacr.org\/2016\/716.pdf, 2017-4-15.","journal-title":"Combi-ning Proof-of-Work and Proof-of-Stake Securely [EB\/OL]. http:\/\/epri-nt.iacr.org\/"},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/arxiv.org\/abs\/1-607.01341","author":"Jing MICALI S","year":"2016","unstructured":"CHEN Jing, MICALI S. Algorand[EB\/OL]. http:\/\/arxiv.org\/abs\/1-607.01341, 2016-7-5."},{"key":"e_1_3_2_1_17_1","volume-title":"White Paper","author":"Popov S.","year":"2016","unstructured":"Popov S. The tangle. White Paper, 2016"},{"key":"e_1_3_2_1_18_1","unstructured":"What is Proof of Authority Consensus? Staking Your Identity on The Blockchain. https:\/\/blockonomi.com\/proof-of-authority."},{"key":"e_1_3_2_1_19_1","volume-title":"Secure","author":"Internet","year":"2017","unstructured":"Internet of Services: The Next-generation, Secure, Highly Scalable Ecosystem for Online Services, 2017.https:\/\/github.com\/iost-official\/-Documents\/blob\/master\/Technical_White_Paper\/EN\/Tech_white_paper_EN.md."},{"key":"e_1_3_2_1_20_1","unstructured":"Why Proof-of-Capacity could be the future of cryptocurrency.https:\/\/-minergate.com\/blog\/why-proof-of-capacity-could-be-the-future-of-cr-yptocurrency."},{"key":"e_1_3_2_1_21_1","unstructured":"NulsWhitepaper1.1.https:\/\/nuls.io\/pdf\/NulsWhitepaper1.1.pdf"},{"key":"e_1_3_2_1_22_1","unstructured":"NEM Technical Reference. https:\/\/nem.io\/wp-content\/themes\/nem\/fi-les\/NEM_techRef.pdf"},{"key":"e_1_3_2_1_23_1","unstructured":"Nebulas Technical White Paper. https:\/\/nebulas.io\/docs\/NebulasTec-hnicalWhitepaper.pdf."},{"key":"e_1_3_2_1_24_1","unstructured":"The Thunder Protocol. https:\/\/docs.thundercore.com\/thunder-whitepa-per.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"POSW-Proof of Shared (or Standardized) work. https:\/\/hackernoon.c-om\/proof-of-rental-or-shared-work-d7150965edf6."},{"issue":"2","key":"e_1_3_2_1_26_1","first-page":"352","article-title":"Blockchain Attacks, Analysis and a Model to Solve Double Spending Attack","volume":"10","author":"Begum A. H.","year":"2020","unstructured":"A. Begum, A. H. Tareq, M. Sultana, M. K. Sohel, T. Rahman, and A. H. Sarwar, \"Blockchain Attacks, Analysis and a Model to Solve Double Spending Attack,\" International Journal of Machine Learning and Computing vol. 10, no. 2, pp. 352--357, 2020.","journal-title":"International Journal of Machine Learning and Computing"}],"event":{"name":"BDE 2020: 2020 2nd International Conference on Big Data Engineering","location":"Shanghai China","acronym":"BDE 2020"},"container-title":["Proceedings of the 2020 2nd International Conference on Big Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404512.3404522","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404512.3404522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:59Z","timestamp":1750199939000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404512.3404522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,29]]},"references-count":26,"alternative-id":["10.1145\/3404512.3404522","10.1145\/3404512"],"URL":"https:\/\/doi.org\/10.1145\/3404512.3404522","relation":{},"subject":[],"published":{"date-parts":[[2020,5,29]]},"assertion":[{"value":"2020-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}