{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:08:53Z","timestamp":1772554133775,"version":"3.50.1"},"reference-count":18,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:00:00Z","timestamp":1647907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2022,3,22]]},"abstract":"<jats:p>Existing permissioned blockchain systems designate a fixed and explicit group of committee nodes to run a consensus protocol that confirms the same sequence of blocks among all nodes. Unfortunately, when such a system runs on a large scale on the Internet, these explicit committee nodes can be easily turned down by denialof- service (DoS) or network partition attacks. Although recent studies proposed scalable BFT protocols that run on a larger number of committee nodes, these protocols' efficiency drops dramatically when only a small number of nodes are attacked.<\/jats:p>","DOI":"10.1145\/3529113.3529134","type":"journal-article","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T22:30:42Z","timestamp":1648247442000},"page":"61-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Efficient and DoS-resistant Consensus for Permissioned Blockchains"],"prefix":"10.1145","volume":"49","author":[{"given":"Xusheng","family":"Chen","sequence":"first","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Shixiong","family":"Zhao","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Ji","family":"Qi","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Jianyu","family":"Jiang","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Haoze","family":"Song","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Cheng","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Hong Kong &amp; Huawei Technologies"}]},{"given":"Tsz","family":"On Li","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"T-H.","family":"Hubert Chan","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Sen","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei Technologies"}]},{"given":"Gong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei Technologies"}]},{"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2022,3,25]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_2_1_2_1","unstructured":"Mathieu Baudet Avery Ching Andrey Chursin George Danezis Fran\u00e7ois Garillot Zekun Li Dahlia Malkhi Oded Naor Dmitri Perelman and Alberto Sonnino. 2019. State machine replication in the Libra Blockchain.  Mathieu Baudet Avery Ching Andrey Chursin George Danezis Fran\u00e7ois Garillot Zekun Li Dahlia Malkhi Oded Naor Dmitri Perelman and Alberto Sonnino. 2019. State machine replication in the Libra Blockchain."},{"key":"e_1_2_1_3_1","volume-title":"Tendermint: Byzantine Fault Tolerance in the Age of Blockchains","author":"Buchman Ethan","year":"2016","unstructured":"Ethan Buchman . 2016 . Tendermint: Byzantine Fault Tolerance in the Age of Blockchains . http:\/\/atrium.lib.uoguelph.ca\/xmlui\/bitstream\/handle\/10214\/9769\/ Buchman_Ethan_201606_MAsc.pdf. Accessed: 2017-02-06. Ethan Buchman. 2016. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains. http:\/\/atrium.lib.uoguelph.ca\/xmlui\/bitstream\/handle\/10214\/9769\/ Buchman_Ethan_201606_MAsc.pdf. Accessed: 2017-02-06."},{"key":"e_1_2_1_4_1","volume-title":"Ethereum: A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed: 2016-08--22.","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin . 2014 . Ethereum: A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed: 2016-08--22. Vitalik Buterin. 2014. Ethereum: A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed: 2016-08--22."},{"key":"e_1_2_1_5_1","volume-title":"TH Hubert Chan, Fengwei Zhang, Xiapu Luo, et al.","author":"Chen Xusheng","year":"2021","unstructured":"Xusheng Chen , Shixiong Zhao , Ji Qi , Jianyu Jiang , Haoze Song , Cheng Wang , Tsz On Li , TH Hubert Chan, Fengwei Zhang, Xiapu Luo, et al. 2021 . Efficient and DoS-resistant Consensus for Permissioned Blockchains. Performance Evaluation ( 2021), 102244. Xusheng Chen, Shixiong Zhao, Ji Qi, Jianyu Jiang, Haoze Song, Cheng Wang, Tsz On Li, TH Hubert Chan, Fengwei Zhang, Xiapu Luo, et al. 2021. Efficient and DoS-resistant Consensus for Permissioned Blockchains. Performance Evaluation (2021), 102244."},{"key":"e_1_2_1_6_1","volume-title":"Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. Accessed: 2017-06--29.","author":"Gilad Yossi","year":"2017","unstructured":"Yossi Gilad , Rotem Hemo , Silvio Micali , Georgios Vlachos , and Nickolai Zeldovich . 2017 . Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. Accessed: 2017-06--29. Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. Accessed: 2017-06--29."},{"key":"e_1_2_1_7_1","volume-title":"IEEE\/IFIP International Conference on Dependable System and Network (DSN","author":"Gueta Guy Golan","year":"2019","unstructured":"Guy Golan Gueta , Ittai Abraham , Shelly Grossman , Dahlia Malkhi , Benny Pinkas , Michael K Reiter , Dragos-Adrian Seredinschi , Orr Tamir , and Alin Tomescu . 2019 . SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains . IEEE\/IFIP International Conference on Dependable System and Network (DSN 2019). Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K Reiter, Dragos-Adrian Seredinschi, Orr Tamir, and Alin Tomescu. 2019. SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. IEEE\/IFIP International Conference on Dependable System and Network (DSN 2019)."},{"key":"e_1_2_1_8_1","volume-title":"DDoS attacks in Q2","author":"Kupreev Oleg","year":"2019","unstructured":"Oleg Kupreev , Ekaterina Badovskaya , and Alexander Gutnikov . 2019. DDoS attacks in Q2 2019 . Oleg Kupreev, Ekaterina Badovskaya, and Alexander Gutnikov. 2019. DDoS attacks in Q2 2019."},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Andrew Miller Yu Xia Kyle Croman Elaine Shi and Dawn Song. 2016. The honey badger of BFT protocols. https:\/\/eprint.iacr.org\/2016\/199.pdf.  Andrew Miller Yu Xia Kyle Croman Elaine Shi and Dawn Song. 2016. The honey badger of BFT protocols. https:\/\/eprint.iacr.org\/2016\/199.pdf.","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_2_1_10_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https: \/\/bitcoin.org\/bitcoin.pdf. Accessed: 2015-07-01.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https: \/\/bitcoin.org\/bitcoin.pdf. Accessed: 2015-07-01. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https: \/\/bitcoin.org\/bitcoin.pdf. Accessed: 2015-07-01."},{"key":"e_1_2_1_11_1","unstructured":"Christopher Natoli and Vincent Gramoli. 2016. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example.  Christopher Natoli and Vincent Gramoli. 2016. The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example."},{"key":"e_1_2_1_12_1","unstructured":"poet [n.d.]. https:\/\/www.hyperledger.org\/projects\/sawtooth.  poet [n.d.]. https:\/\/www.hyperledger.org\/projects\/sawtooth."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483574"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Robert Riemann and St\u00e9phane Grumbach. 2017. Distributed Protocols at the Rescue for Trustworthy Online Voting. arXiv:1705.04480.  Robert Riemann and St\u00e9phane Grumbach. 2017. Distributed Protocols at the Rescue for Trustworthy Online Voting. arXiv:1705.04480.","DOI":"10.5220\/0006228504990505"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00018"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423253"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529113.3529134","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529113.3529134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:25Z","timestamp":1750182685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529113.3529134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,22]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3,22]]}},"alternative-id":["10.1145\/3529113.3529134"],"URL":"https:\/\/doi.org\/10.1145\/3529113.3529134","relation":{},"ISSN":["0163-5999"],"issn-type":[{"value":"0163-5999","type":"print"}],"subject":[],"published":{"date-parts":[[2022,3,22]]},"assertion":[{"value":"2022-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}