{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T04:59:29Z","timestamp":1776229169701,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,28]]},"DOI":"10.1145\/3492321.3519594","type":"proceedings-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T14:28:18Z","timestamp":1648477698000},"page":"34-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":217,"title":["Narwhal and Tusk"],"prefix":"10.1145","author":[{"given":"George","family":"Danezis","sequence":"first","affiliation":[{"name":"Mysten Labs &amp; UCL"}]},{"given":"Lefteris","family":"Kokoris-Kogias","sequence":"additional","affiliation":[{"name":"IST Austria"}]},{"given":"Alberto","family":"Sonnino","sequence":"additional","affiliation":[{"name":"Mysten Labs"}]},{"given":"Alexander","family":"Spiegelman","sequence":"additional","affiliation":[{"name":"Aptos"}]}],"member":"320","published-online":{"date-parts":[[2022,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3181853"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005","author":"Abd-El-Malek Michael","year":"2005","unstructured":"Michael Abd-El-Malek , Gregory R. Ganger , Garth R. Goodson , Michael K. Reiter , and Jay J. Wylie . 2005. Fault-scalable Byzantine fault-tolerant services . In Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005 , Brighton, UK, October 23--26 , 2005 , Andrew Herbert and Kenneth P. Birman (Eds.). ACM, 59--74. Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, and Jay J. Wylie. 2005. Fault-scalable Byzantine fault-tolerant services. In Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23--26, 2005, Andrew Herbert and Kenneth P. Birman (Eds.). ACM, 59--74."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331612"},{"key":"e_1_3_2_1_4_1","volume-title":"Chainspace: A Sharded Smart Contracts Platform. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Al-Bassam Mustafa","year":"2018","unstructured":"Mustafa Al-Bassam , Alberto Sonnino , Shehar Bano , Dave Hrycyszyn , and George Danezis . 2018 . Chainspace: A Sharded Smart Contracts Platform. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA, February 18--21 , 2018. The Internet Society. Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, and George Danezis. 2018. Chainspace: A Sharded Smart Contracts Platform. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018. The Internet Society."},{"key":"e_1_3_2_1_5_1","volume-title":"Bottlenecks in Blockchain Consensus Protocols. CoRR abs\/2103.04234","author":"Alqahtani Salem","year":"2021","unstructured":"Salem Alqahtani and Murat Demirbas . 2021. Bottlenecks in Blockchain Consensus Protocols. CoRR abs\/2103.04234 ( 2021 ). Salem Alqahtani and Murat Demirbas. 2021. Bottlenecks in Blockchain Consensus Protocols. CoRR abs\/2103.04234 (2021)."},{"key":"e_1_3_2_1_6_1","volume-title":"Prime: Byzantine replication under attack","author":"Amir Yair","year":"2010","unstructured":"Yair Amir , Brian Coan , Jonathan Kirsch , and John Lane . 2010 . Prime: Byzantine replication under attack . IEEE transactions on dependable and secure computing 8, 4 (2010), 564--577. Yair Amir, Brian Coan, Jonathan Kirsch, and John Lane. 2010. Prime: Byzantine replication under attack. IEEE transactions on dependable and secure computing 8, 4 (2010), 564--577."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_8_1","unstructured":"Georgia Avarikioti Eleftherios Kokoris-Kogias and Roger Wattenhofer. 2021. Divide and Scale: Formalization of Distributed Ledger Sharding Protocols. arXiv:1910.10434 [cs.DC]  Georgia Avarikioti Eleftherios Kokoris-Kogias and Roger Wattenhofer. 2021. Divide and Scale: Formalization of Distributed Ledger Sharding Protocols. arXiv:1910.10434 [cs.DC]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_1_11_1","volume-title":"Twins: White-Glove Approach for BFT Testing. arXiv preprint arXiv:2004.10617","author":"Bano Shehar","year":"2020","unstructured":"Shehar Bano , Alberto Sonnino , Andrey Chursin , Dmitri Perelman , and Dahlia Malkhi . 2020 . Twins: White-Glove Approach for BFT Testing. arXiv preprint arXiv:2004.10617 (2020). Shehar Bano, Alberto Sonnino, Andrey Chursin, Dmitri Perelman, and Dahlia Malkhi. 2020. Twins: White-Glove Approach for BFT Testing. arXiv preprint arXiv:2004.10617 (2020)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/4221.214134"},{"key":"e_1_3_2_1_17_1","volume-title":"Tendermint: Byzantine fault tolerance in the age of blockchains.","author":"Buchman Ethan","year":"2016","unstructured":"Ethan Buchman . 2016 . Tendermint: Byzantine fault tolerance in the age of blockchains. Ethan Buchman. 2016. Tendermint: Byzantine fault tolerance in the age of blockchains."},{"key":"e_1_3_2_1_18_1","volume-title":"Introduction to reliable and secure distributed programming","author":"Cachin Christian","unstructured":"Christian Cachin , Rachid Guerraoui , and Lu\u00eds Rodrigues . 2011. Introduction to reliable and secure distributed programming . Springer Science & Business Media . Christian Cachin, Rachid Guerraoui, and Lu\u00eds Rodrigues. 2011. Introduction to reliable and secure distributed programming. Springer Science & Business Media."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_20_1","volume-title":"Blockmania: from block DAGs to consensus. arXiv preprint arXiv:1809.01620","author":"Danezis George","year":"2018","unstructured":"George Danezis and David Hrycyszyn . 2018. Blockmania: from block DAGs to consensus. arXiv preprint arXiv:1809.01620 ( 2018 ). George Danezis and David Hrycyszyn. 2018. Blockmania: from block DAGs to consensus. arXiv preprint arXiv:1809.01620 (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(82)90776-8"},{"key":"e_1_3_2_1_22_1","volume-title":"Bounds on information exchange for Byzantine agreement. JACM","author":"Dolev Danny","year":"1985","unstructured":"Danny Dolev and Rudiger Reischuk . 1985. Bounds on information exchange for Byzantine agreement. JACM ( 1985 ). Danny Dolev and Rudiger Reischuk. 1985. Bounds on information exchange for Byzantine agreement. JACM (1985)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243812"},{"key":"e_1_3_2_1_24_1","volume-title":"Threshold logical clocks for asynchronous distributed coordination and consensus. arXiv preprint arXiv:1907.07010","author":"Ford Bryan","year":"2019","unstructured":"Bryan Ford . 2019. Threshold logical clocks for asynchronous distributed coordination and consensus. arXiv preprint arXiv:1907.07010 ( 2019 ). Bryan Ford. 2019. Threshold logical clocks for asynchronous distributed coordination and consensus. arXiv preprint arXiv:1907.07010 (2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_26_1","volume-title":"Dumbo: Faster Asynchronous BFT Protocols. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"Guo Bingyong","year":"2020","unstructured":"Bingyong Guo , Zhenliang Lu , Qiang Tang , Jing Xu , and Zhenfeng Zhang . 2020 . Dumbo: Faster Asynchronous BFT Protocols. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Virtual Event, USA, November 9--13 , 2020, Jay Ligatti, Xinming Ou, Jonathan Katz, and Giovanni Vigna (Eds.). ACM, 803--818. Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2020. Dumbo: Faster Asynchronous BFT Protocols. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9--13, 2020, Jay Ligatti, Xinming Ou, Jonathan Katz, and Giovanni Vigna (Eds.). ACM, 803--818."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100087"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467905"},{"key":"e_1_3_2_1_29_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 279--296. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/kogias Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 279--296. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/kogias"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423364"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_33_1","unstructured":"Satoshi Nakamoto. 2008. Bitcoin whitepaper.  Satoshi Nakamoto. 2008. Bitcoin whitepaper."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845168"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342082"},{"key":"e_1_3_2_1_36_1","volume-title":"ACE: Abstract Consensus Encapsulation for Liveness Boosting of State Machine Replication. In OPODIS.","author":"Spiegelman Alexander","year":"2020","unstructured":"Alexander Spiegelman , Arik Rinberg , and Dahlia Malkhi . 2020 . ACE: Abstract Consensus Encapsulation for Liveness Boosting of State Machine Replication. In OPODIS. Alexander Spiegelman, Arik Rinberg, and Dahlia Malkhi. 2020. ACE: Abstract Consensus Encapsulation for Liveness Boosting of State Machine Replication. In OPODIS."},{"key":"e_1_3_2_1_37_1","volume-title":"Mir-BFT: High-Throughput BFT for Blockchains. CoRR abs\/1906.05552","author":"Stathakopoulou Chrysoula","year":"2019","unstructured":"Chrysoula Stathakopoulou , Tudor David , and Marko Vukolic . 2019. Mir-BFT: High-Throughput BFT for Blockchains. CoRR abs\/1906.05552 ( 2019 ). arXiv:1906.05552 http:\/\/arxiv.org\/abs\/1906.05552 Chrysoula Stathakopoulou, Tudor David, and Marko Vukolic. 2019. Mir-BFT: High-Throughput BFT for Blockchains. CoRR abs\/1906.05552 (2019). arXiv:1906.05552 http:\/\/arxiv.org\/abs\/1906.05552"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_2_1_40_1","volume-title":"Performance Analysis of the Libra Blockchain: An Experimental Study. CoRR abs\/1912.05241","author":"Zhang Jiashuo","year":"2019","unstructured":"Jiashuo Zhang , Jianbo Gao , Zhenhao Wu , Wentian Yan , Qize Wu , Qingshan Li , and Zhong Chen . 2019. Performance Analysis of the Libra Blockchain: An Experimental Study. CoRR abs\/1912.05241 ( 2019 ). Jiashuo Zhang, Jianbo Gao, Zhenhao Wu, Wentian Yan, Qize Wu, Qingshan Li, and Zhong Chen. 2019. Performance Analysis of the Libra Blockchain: An Experimental Study. CoRR abs\/1912.05241 (2019)."}],"event":{"name":"EuroSys '22: Seventeenth European Conference on Computer Systems","location":"Rennes France","acronym":"EuroSys '22","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Seventeenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492321.3519594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492321.3519594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:08Z","timestamp":1750188668000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492321.3519594"}},"subtitle":["a DAG-based mempool and efficient BFT consensus"],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":38,"alternative-id":["10.1145\/3492321.3519594","10.1145\/3492321"],"URL":"https:\/\/doi.org\/10.1145\/3492321.3519594","relation":{},"subject":[],"published":{"date-parts":[[2022,3,28]]},"assertion":[{"value":"2022-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}