{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:33:38Z","timestamp":1767339218680,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CCF-2006737"],"award-info":[{"award-number":["CCF-2006737"]}]},{"name":"Army Research Office","award":["W911NF1910294"],"award-info":[{"award-number":["W911NF1910294"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484752","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1006-1019","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["How Does Blockchain Security Dictate Blockchain Implementation?"],"prefix":"10.1145","author":[{"given":"Andrew","family":"Lewis-Pye","sequence":"first","affiliation":[{"name":"London School of Economics, London, United Kingdom"}]},{"given":"Tim","family":"Roughgarden","sequence":"additional","affiliation":[{"name":"Columbia University, New York City, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92221-6_4"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_2_3_1","volume-title":"Snow White: Provably Secure Proofs of Stake. IACR Cryptology ePrint Archive","author":"Bentov Iddo","year":"2016","unstructured":"Iddo Bentov, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably Secure Proofs of Stake. IACR Cryptology ePrint Archive, Vol. 2016, 919 (2016)."},{"key":"e_1_3_2_2_4_1","unstructured":"Ethan Buchman. 2016. Tendermint: Byzantine fault tolerance in the age of blockchains. Ph.D. Dissertation."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28634-9_11"},{"key":"e_1_3_2_2_7_1","first-page":"377","article-title":"ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement","volume":"2018","author":"Chen Jing","year":"2018","unstructured":"Jing Chen, Sergey Gorbunov, Silvio Micali, and Georgios Vlachos. 2018. ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. IACR Cryptol. ePrint Arch., Vol. 2018 (2018), 377.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_8_1","volume-title":"arXiv preprint arXiv:1607.01341","author":"Chen Jing","year":"2016","unstructured":"Jing Chen and Silvio Micali. 2016. Algorand. arXiv preprint arXiv:1607.01341 (2016)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_2_10_1","unstructured":"Juan A Garay Aggelos Kiayias and Nikos Leonardos. 2018. The Bitcoin Backbone Protocol: Analysis and Applications. (2018)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_2_12_1","volume-title":"Byzantine Generals in the Permissionless Setting. arXiv preprint arXiv:2101.07095","author":"Lewis-Pye Andrew","year":"2021","unstructured":"Andrew Lewis-Pye and Tim Roughgarden. 2021. Byzantine Generals in the Permissionless Setting. arXiv preprint arXiv:2101.07095 (2021)."},{"volume-title":"Distributed algorithms","author":"Lynch Nancy A","key":"e_1_3_2_2_13_1","unstructured":"Nancy A Lynch. 1996. Distributed algorithms. Elsevier."},{"key":"e_1_3_2_2_14_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.(2008).","author":"Satoshi Nakamoto","year":"2008","unstructured":"Satoshi Nakamoto et al. 2008. Bitcoin: A peer-to-peer electronic cash system.(2008)."},{"volume-title":"Distributed computing among unacquainted processors in the presence of Byzantine failures","author":"Okun Michael","key":"e_1_3_2_2_15_1","unstructured":"Michael Okun. 2005. Distributed computing among unacquainted processors in the presence of Byzantine failures. Hebrew University of Jerusalem."},{"key":"e_1_3_2_2_16_1","unstructured":"Rafael Pass Lior Seeman and abhi shelat. 2016. Analysis of the Blockchain Protocol in Asynchronous Networks. eprint.iacr.org\/2016\/454."},{"key":"e_1_3_2_2_17_1","unstructured":"Ling Ren. 2019. Analysis of nakamoto consensus. Technical Report. Cryptology ePrint Archive Report 2019\/943.(2019). https:\/\/eprint.iacr.org."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484752","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:49:12Z","timestamp":1763498952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":18,"alternative-id":["10.1145\/3460120.3484752","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484752","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}