{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:45Z","timestamp":1766449785423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Army Research Office","award":["W911NF-18-1-0332"],"award-info":[{"award-number":["W911NF-18-1-0332"]}]},{"name":"XDC network"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF- 1705007, NeTS 1718270"],"award-info":[{"award-number":["CCF- 1705007, NeTS 1718270"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1145\/3492866.3549731","type":"proceedings-article","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T16:34:33Z","timestamp":1663778073000},"page":"231-240","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Optimal bootstrapping of PoW blockchains"],"prefix":"10.1145","author":[{"given":"Ranvir","family":"Rana","sequence":"first","affiliation":[{"name":"University of Illinois Urbana"}]},{"given":"Dimitris","family":"Karakostas","sequence":"additional","affiliation":[{"name":"University of Edinburgh, UK"}]},{"given":"Sreeram","family":"Kannan","sequence":"additional","affiliation":[{"name":"University of Washington Seattle"}]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Edinburgh and IOHK, UK"}]},{"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana Champaign"}]}],"member":"320","published-online":{"date-parts":[[2022,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"anon. 2021. Advocate System implementation. https:\/\/github.com\/advocate-checkpoint\/advocate-systems."},{"key":"e_1_3_2_1_2_1","volume-title":"Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. Cryptology ePrint Archive, Report 2019\/1440. https:\/\/eprint.iacr.org\/2019\/1440.","author":"Azouvi Sarah","year":"2019","unstructured":"Sarah Azouvi, George Danezis, and Valeria Nikolaenko. 2019. Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. Cryptology ePrint Archive, Report 2019\/1440. https:\/\/eprint.iacr.org\/2019\/1440."},{"key":"e_1_3_2_1_3_1","volume-title":"Betting on Blockchain Consensus with Fantomette. CoRR abs\/1805.06786","author":"Azouvi Sarah","year":"2018","unstructured":"Sarah Azouvi, Patrick McCorry, and Sarah Meiklejohn. 2018. Betting on Blockchain Consensus with Fantomette. CoRR abs\/1805.06786 (2018). arXiv:1805.06786 http:\/\/arxiv.org\/abs\/1805.06786"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_1_5_1","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751241"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_8_1","volume-title":"Polygraph: Accountable Byzantine Agreement. Cryptology ePrint Archive, Report 2019\/587. https:\/\/eprint.iacr.org\/2019\/587.","author":"Civit Pierre","year":"2019","unstructured":"Pierre Civit, Seth Gilbert, and Vincent Gramoli. 2019. Polygraph: Accountable Byzantine Agreement. Cryptology ePrint Archive, Report 2019\/587. https:\/\/eprint.iacr.org\/2019\/587."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Bernardo David Peter Gazi Aggelos Kiayias and Alexander Russell. 2018. Ouroboros Praos: An Adaptively-Secure Semi-synchronous Proof-of-Stake Blockchain. In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques Tel Aviv Israel April 29 - May 3 2018 Proceedings Part II (Lecture Notes in Computer Science Vol. 10821) Jesper Buus Nielsen and Vincent Rijmen (Eds.). Springer 66--98. 10.1007\/978-3-319-78375-8_3","DOI":"10.1007\/978-3-319-78375-8_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57990-6_2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_14_1","unstructured":"David Gilson. 2013. Feathercoin secures its block chain with advanced checkpointing. https:\/\/www.coindesk.com\/feathercoin-secures-block-chain-advanced-check-pointing."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25283-0_18"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_18_1","volume-title":"Ppcoin: Peer-to-peer crypto-currency with proof-of-stake.","author":"King Sunny","year":"2012","unstructured":"Sunny King and Scott Nadal. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake."},{"key":"e_1_3_2_1_19_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Kokoris-Kogias Eleftherios","year":"2016","unstructured":"Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 279--296. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/kogias"},{"key":"e_1_3_2_1_20_1","unstructured":"Sergio Demian Lerner. 2015. RSK White paper Overview. https:\/\/docs.rsk.co\/RSK_White_Paper-Overview.pdf."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_3_2_1_22_1","volume-title":"Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870","author":"Li Chenxing","year":"2018","unstructured":"Chenxing Li, Peilun Li, Wei Xu, Fan Long, and AndrewChi-chih Yao. 2018. Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870 (2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_24_1","unstructured":"Satoshi Nakamoto. 2010. Bitcoin 0.3.2 released. https:\/\/bitcointalk.org\/index.php?topic=437.msg3807."},{"key":"e_1_3_2_1_25_1","volume-title":"Ertem Nusret Tas, and David Tse","author":"Neu Joachim","year":"2020","unstructured":"Joachim Neu, Ertem Nusret Tas, and David Tse. 2020. Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma. Cryptology ePrint Archive, Report 2020\/1091. https:\/\/eprint.iacr.org\/2020\/1091."},{"volume-title":"Proceedings of the ACM Symposium on Principles of Distributed Computing. ACM.","author":"Pass R.","key":"e_1_3_2_1_26_1","unstructured":"R. Pass and E. Shi. 2017. Fruitchains: A fair blockchain. In Proceedings of the ACM Symposium on Principles of Distributed Computing. ACM."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.DISC.2017.39"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Rafael Pass and Elaine Shi. 2018. Thunderella: Blockchains with Optimistic Instant Confirmation. In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques Tel Aviv Israel April 29 - May 3 2018 Proceedings Part II (Lecture Notes in Computer Science Vol. 10821) Jesper Buus Nielsen and Vincent Rijmen (Eds.). Springer 3--33. 10.1007\/978-3-319-78375-8_1","DOI":"10.1007\/978-3-319-78375-8_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Ethereum Research. 2020. Ethereum 2.0. https:\/\/github.com\/ethereum\/eth2.0-specs."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Suryanarayana Sankagiri Xuechao Wang Sreeram Kannan and Pramod Viswanath. 2020. The Checkpointed Longest Chain: User-dependent Adaptivity and Finality. arXiv:2010.13711 [cs.CR]","DOI":"10.1007\/978-3-662-64331-0_5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Peiyao Sheng Gerui Wang Kartik Nayak Sreeram Kannan and Pramod Viswanath. 2020. BFT Protocol Forensics. arXiv:2010.06785 [cs.CR]","DOI":"10.1145\/3460120.3484566"},{"key":"e_1_3_2_1_32_1","volume-title":"GRANDPA: a Byzantine Finality Gadget. CoRR abs\/2007.01560","author":"Stewart Alistair","year":"2020","unstructured":"Alistair Stewart and Eleftherios Kokoris-Kogia. 2020. GRANDPA: a Byzantine Finality Gadget. CoRR abs\/2007.01560 (2020). arXiv:2007.01560 https:\/\/arxiv.org\/abs\/2007.01560"},{"key":"e_1_3_2_1_33_1","volume-title":"Prism: Scaling Bitcoin by 10,000x. ArXiv abs\/1909.11261","author":"Yang L.","year":"2019","unstructured":"L. Yang, V. Bagaria, Gerui Wang, Mohammad Alizadeh, David M. Tse, G. Fanti, and P. Viswanath. 2019. Prism: Scaling Bitcoin by 10,000x. ArXiv abs\/1909.11261 (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"OHIE: Blockchain Scaling Made Simple. arXiv:1811.12628 [cs.DC]","author":"Yu Haifeng","year":"2019","unstructured":"Haifeng Yu, Ivica Nikolic, Ruomu Hou, and Prateek Saxena. 2019. OHIE: Blockchain Scaling Made Simple. arXiv:1811.12628 [cs.DC]"}],"event":{"name":"MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"MobiHoc '22"},"container-title":["Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492866.3549731","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492866.3549731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:27Z","timestamp":1750193307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":33,"alternative-id":["10.1145\/3492866.3549731","10.1145\/3492866"],"URL":"https:\/\/doi.org\/10.1145\/3492866.3549731","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]},"assertion":[{"value":"2022-10-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}