{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T21:00:11Z","timestamp":1760821211842,"version":"3.41.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chinese National Research Fund","award":["61702330"],"award-info":[{"award-number":["61702330"]}]},{"name":"Chinese National Research Fund (NSFC) Key Project","award":["61532013 and 61872239"],"award-info":[{"award-number":["61532013 and 61872239"]}]},{"name":"DCT-MoST Joint-project","award":["025\/2015\/AMJ"],"award-info":[{"award-number":["025\/2015\/AMJ"]}]},{"name":"National China 973","award":["2015CB352401"],"award-info":[{"award-number":["2015CB352401"]}]},{"DOI":"10.13039\/501100004733","name":"University of Macau","doi-asserted-by":"crossref","award":["MYRG2018-00237-RTO, CPG2019-0,0004-FST and SRG2018-00111-FST"],"award-info":[{"award-number":["MYRG2018-00237-RTO, CPG2019-0,0004-FST and SRG2018-00111-FST"]}],"id":[{"id":"10.13039\/501100004733","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100006469","name":"FDCT","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"crossref"}]},{"name":"SAR Macau, China"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2020,11,30]]},"abstract":"<jats:p>\n            With the increasing number of users in blockchain-based cryptocurrencies, the public has raised the demand for transaction throughput, and many protocols are designed to improve the throughput following the\n            <jats:italic>Nakamoto<\/jats:italic>\n            consensus. Although astonishing progress has been made in the on-chain throughput improvement, high throughput makes the blockchains suffer from the increasing blockchain size, hard forks, and possible attacks. In this work, we propose a quantitative model to describe and analyze the\n            <jats:italic>Nakamoto<\/jats:italic>\n            consensus. We then design a robust scheme named Ursa to reduce storage requirements and to reduce the forks by automatically adjusting block size according to users\u2019 needs.\n          <\/jats:p>","DOI":"10.1145\/3412341","type":"journal-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T17:16:30Z","timestamp":1604596590000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Ursa"],"prefix":"10.1145","volume":"20","author":[{"given":"Na","family":"Ruan","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R. China"}]},{"given":"Dongli","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R. China"}]},{"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[{"name":"University of Macau, Macau, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_2_1_2_1","unstructured":"Bitcoin Cash 2019. BCH. Retrieved from https:\/\/www.Bitcoincash.org\/.  Bitcoin Cash 2019. BCH. Retrieved from https:\/\/www.Bitcoincash.org\/."},{"key":"e_1_2_1_3_1","unstructured":"Bitcoin Classic 2009. BTC. Retrieved from https:\/\/bitcoinclassic.com\/.  Bitcoin Classic 2009. BTC. Retrieved from https:\/\/bitcoinclassic.com\/."},{"key":"e_1_2_1_4_1","unstructured":"Bitcoin Gold 2017. BTG. Retrieved from https:\/\/Bitcoingold.org\/.  Bitcoin Gold 2017. BTG. Retrieved from https:\/\/Bitcoingold.org\/."},{"key":"e_1_2_1_5_1","unstructured":"Bitcoin Hot 2018. BTH. Retrieved from http:\/\/www.bithot.org\/.  Bitcoin Hot 2018. BTH. Retrieved from http:\/\/www.bithot.org\/."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"volume-title":"The Double Spending Problem and Cryptocurrencies (December 19","year":"2017","author":"Chohan Usman W.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","unstructured":"Coinmarketcap. 2013. Coinmarketcap. Retrieved from https:\/\/coinmarketcap.com  Coinmarketcap. 2013. Coinmarketcap. Retrieved from https:\/\/coinmarketcap.com"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"e_1_2_1_13_1","unstructured":"Ethereum. 2014. Ethereum. Retrieved from https:\/\/www.ethereum.org\/.  Ethereum. 2014. Ethereum. Retrieved from https:\/\/www.ethereum.org\/."},{"volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation. 45--59","year":"2016","author":"Eyal Ittay","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"volume-title":"Proceedings of the USENIX Security Symposium. 129--144","year":"2015","author":"Heilman Ethan","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","unstructured":"IOTA. 2018. IOTA. Retrieved from https:\/\/www.iota.org\/.  IOTA. 2018. IOTA. Retrieved from https:\/\/www.iota.org\/."},{"volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916)","year":"2016","author":"Kogias Eleftherios Kokoris","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095233"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_17"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"volume-title":"Bitcoin: A peer-to-peer electronic cash system.","year":"2008","author":"Nakamoto Satoshi","key":"e_1_2_1_26_1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_2_1_29_1","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin lightning network: Scalable off-chain instant payments. Retrieved from https:\/\/lightning.network\/lightning-network-paper.pdf.  Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin lightning network: Scalable off-chain instant payments. Retrieved from https:\/\/lightning.network\/lightning-network-paper.pdf."},{"volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 515--532","year":"2016","author":"Sapirshtein Ayelet","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","unstructured":"Bitcoindeveloper Six Comfirm. [n.d.]. The Network has Spent About an Hour Working to Protect the Transaction Against Double Spending when the Transaction is Buried Under Six Blocks. Retrieved from https:\/\/developer.bitcoin.org\/devguide\/payment_processing.html.  Bitcoindeveloper Six Comfirm. [n.d.]. The Network has Spent About an Hour Working to Protect the Transaction Against Double Spending when the Transaction is Buried Under Six Blocks. Retrieved from https:\/\/developer.bitcoin.org\/devguide\/payment_processing.html."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_2_1_33_1","first-page":"104","article-title":"PHANTOM: A Scalable BlockDAG Protocol","volume":"2018","author":"Sompolinsky Yonatan","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"volume-title":"The gap game. CoRR abs\/1805.05288","year":"2018","author":"Tsabary Itay","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","unstructured":"VISA 2016. Retrieved from https:\/\/usa.visa.com\/about-visa\/visanet.html.  VISA 2016. Retrieved from https:\/\/usa.visa.com\/about-visa\/visanet.html."},{"volume-title":"Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201919)","year":"2019","author":"Wang Jiaping","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"volume-title":"Proceedings of the IEEE 21st International Conference on High Performance Computing and Communications","author":"Zhou Dongli","key":"e_1_2_1_38_1"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:01Z","timestamp":1750195501000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412341"}},"subtitle":["Robust Performance for\n            <i>Nakamoto<\/i>\n            Consensus with Self-adaptive Throughput"],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,11,30]]}},"alternative-id":["10.1145\/3412341"],"URL":"https:\/\/doi.org\/10.1145\/3412341","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2020,11,5]]},"assertion":[{"value":"2019-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}