{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:53:42Z","timestamp":1775598822342,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,25]]},"DOI":"10.1145\/3532640.3532642","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T14:04:53Z","timestamp":1657202693000},"page":"9-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Security Analysis of Sharding in Blockchain with PBFT Consensus"],"prefix":"10.1145","author":[{"given":"Xinling","family":"Li","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haoxiang","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jingshan","family":"Duan","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Differential Fault Attack on TWINE Block Cipher with Nibble. 2020 IEEE 20th International Conference on Communication Technology (ICCT). IEEE, 1151-1155","author":"Luo H.","unstructured":"H. Luo , Y. Wu and W. Chen . 2020 . Differential Fault Attack on TWINE Block Cipher with Nibble. 2020 IEEE 20th International Conference on Communication Technology (ICCT). IEEE, 1151-1155 . htpps:\/\/doi: 10.1109\/ICCT50939.2020.9295786. H. Luo, Y. Wu and W. Chen. 2020. Differential Fault Attack on TWINE Block Cipher with Nibble. 2020 IEEE 20th International Conference on Communication Technology (ICCT). IEEE, 1151-1155. htpps:\/\/doi: 10.1109\/ICCT50939.2020.9295786."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062665"},{"key":"e_1_3_2_1_3_1","volume-title":"Blockchain meets IoT: An architecture for scalable access management in IoT.\u00a0IEEE Internet Things J. 5, 2 (April","author":"Novo O.","year":"2018","unstructured":"O. Novo . 2018. Blockchain meets IoT: An architecture for scalable access management in IoT.\u00a0IEEE Internet Things J. 5, 2 (April 2018 ), 1184-1195. https:\/\/ doi: 10.1109\/JIOT.2018.2812239. O. Novo. 2018. Blockchain meets IoT: An architecture for scalable access management in IoT.\u00a0IEEE Internet Things J. 5, 2 (April 2018), 1184-1195. https:\/\/ doi: 10.1109\/JIOT.2018.2812239."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"T. Jiang H. Fang and H. Wang. 2019. Blockchain-based Internet of vehicles: Distributed network architecture and performance analysis.\u00a0IEEE Internet Things J. 6 3 (Jun 2019) 4640-4649. https: doi: 10.1109\/JIOT.2018.2874398.  T. Jiang H. Fang and H. Wang. 2019. Blockchain-based Internet of vehicles: Distributed network architecture and performance analysis.\u00a0IEEE Internet Things J. 6 3 (Jun 2019) 4640-4649. https: doi: 10.1109\/JIOT.2018.2874398.","DOI":"10.1109\/JIOT.2018.2874398"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Y. Chen H. Luo and Q. Bian. 2021. A Privacy Protection Method Based on Key Encapsulation Mechanism in Medical Blockchain.\u00a0 2021 IEEE 21st International Conference on Communication Technology (ICCT). 295-300 2021. doi: 10.1109\/ICCT52962.2021.9658006.  Y. Chen H. Luo and Q. Bian. 2021. A Privacy Protection Method Based on Key Encapsulation Mechanism in Medical Blockchain.\u00a0 2021 IEEE 21st International Conference on Communication Technology (ICCT). 295-300 2021. doi: 10.1109\/ICCT52962.2021.9658006.","DOI":"10.1109\/ICCT52962.2021.9658006"},{"key":"e_1_3_2_1_6_1","volume-title":"Blockchain and the Internet of Things in the Industrial Sector.\u00a0IT Professional. 20, 3 (May\/Jun","author":"Miller D.","year":"2018","unstructured":"D. Miller . 2018. Blockchain and the Internet of Things in the Industrial Sector.\u00a0IT Professional. 20, 3 (May\/Jun 2018 .), 15-18. https:\/\/ doi: 10.1109\/MITP.2018.032501742. D. Miller. 2018. Blockchain and the Internet of Things in the Industrial Sector.\u00a0IT Professional. 20, 3 (May\/Jun 2018.), 15-18. https:\/\/ doi: 10.1109\/MITP.2018.032501742."},{"key":"e_1_3_2_1_7_1","unstructured":"S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https:\/\/www.bitcoin.org.  S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https:\/\/www.bitcoin.org."},{"key":"e_1_3_2_1_8_1","unstructured":"P. Vasin. Blackcoin's proof-of-stake protocol v2. https:\/\/blackcoin.co\/blackcoin-pos-protocol-v2-whitepaper.  P. Vasin. Blackcoin's proof-of-stake protocol v2. https:\/\/blackcoin.co\/blackcoin-pos-protocol-v2-whitepaper."},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX 3rd Symp. Operating Syst. Des. Implementation, 173-186","author":"Castro M.","year":"1999","unstructured":"M. Castro 1999 . Practical Byzantine fault tolerance.\u00a0Proc . USENIX 3rd Symp. Operating Syst. Des. Implementation, 173-186 . M. Castro 1999. Practical Byzantine fault tolerance.\u00a0Proc. USENIX 3rd Symp. Operating Syst. Des. Implementation, 173-186."},{"key":"e_1_3_2_1_10_1","first-page":"305","volume-title":"USENIX Conf. USENIX Annu. Tech. Conf.","author":"Ongaro D.","year":"2014","unstructured":"D. Ongaro and J. Ousterhout . 2014. In search of an understandable consensus algorithm.\u00a0Proc . USENIX Conf. USENIX Annu. Tech. Conf. , 305 - 320 , 2014 . D. Ongaro and J. Ousterhout. 2014. In search of an understandable consensus algorithm.\u00a0Proc. USENIX Conf. USENIX Annu. Tech. Conf., 305-320, 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2918296"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391665"},{"key":"e_1_3_2_1_13_1","volume-title":"Blockchain: Blueprint for a new economy","author":"Swan M.","year":"2015","unstructured":"M. Swan . 2015 . Blockchain: Blueprint for a new economy . O'Reilly Media, Inc. M. Swan. 2015. Blockchain: Blueprint for a new economy. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16)","author":"Luu Loi","unstructured":"Loi Luu , Viswesh Narayanan , Chaodong Zheng . et al. 2016. A Secure Sharding Protocol For Open Blockchains . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) . ACM, New York, NY, USA, 17\u201330. https:\/\/doi.org\/10.1145\/2976749.2978389. Loi Luu, Viswesh Narayanan, Chaodong Zheng.et al. 2016. A Secure Sharding Protocol For Open Blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 17\u201330. https:\/\/doi.org\/10.1145\/2976749.2978389."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"E. Kokoris-Kogias P. Jovanovic L. Gasser N. Gailly E. Syta and B. Ford. 2018. OmniLedger: A Secure Scale-Out Decentralized Ledger via Sharding.\u00a02018 IEEE Symposium on Security and Privacy (SP) 583-598. htpps:\/\/doi: 10.1109\/SP.2018.000-5.  E. Kokoris-Kogias P. Jovanovic L. Gasser N. Gailly E. Syta and B. Ford. 2018. OmniLedger: A Secure Scale-Out Decentralized Ledger via Sharding.\u00a02018 IEEE Symposium on Security and Privacy (SP) 583-598. htpps:\/\/doi: 10.1109\/SP.2018.000-5.","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_2_1_17_1","volume-title":"International Cogress on Blockchain and Applications","author":"Hafid","unstructured":"Hafid A., Hafid A.S. , Samih M. 2020. A Methodology for a Probabilistic Security Analysis of Sharding-Based Blockchain Protocols . International Cogress on Blockchain and Applications . Springer , vol 1010. https:\/\/doi.org\/10.1007\/978-3-030-23813-1_13. Hafid A., Hafid A.S., Samih M. 2020. A Methodology for a Probabilistic Security Analysis of Sharding-Based Blockchain Protocols. International Cogress on Blockchain and Applications. Springer, vol 1010. https:\/\/doi.org\/10.1007\/978-3-030-23813-1_13."},{"key":"e_1_3_2_1_18_1","first-page":"1030","article-title":"Security Analysis of Sharding in the Blockchain System.\u00a02021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","author":"Yu D.","year":"2021","unstructured":"D. Yu , H. Xu , L. Zhang , B. Cao and M. A. Imran . 2021 . Security Analysis of Sharding in the Blockchain System.\u00a02021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) . IEEE , 1030 - 1035 . htpps:\/\/doi: 10.1109\/PIMRC50174.2021.956935. D. Yu, H. Xu, L. Zhang, B. Cao and M. A. Imran. 2021. Security Analysis of Sharding in the Blockchain System.\u00a02021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 1030-1035. htpps:\/\/doi: 10.1109\/PIMRC50174.2021.956935.","journal-title":"IEEE"},{"key":"e_1_3_2_1_19_1","volume-title":"Adil Senhaji.","author":"Hafid Abdelatif","year":"2021","unstructured":"Abdelatif Hafid , Abdelhakim Senhaji Hafid , Adil Senhaji. 2021 . Sharding-Based Proof-of-Stake Blockchain Protocols : Security Analysis . https:\/\/arxiv.org\/abs\/2108.05835. Abdelatif Hafid, Abdelhakim Senhaji Hafid, Adil Senhaji. 2021. Sharding-Based Proof-of-Stake Blockchain Protocols: Security Analysis. https:\/\/arxiv.org\/abs\/2108.05835."},{"key":"e_1_3_2_1_20_1","volume-title":"In\u00a0International Conference on Algorithms and Architectures for Parallel Processing. Springer, Cham,\u00a0324-339","author":"Q.","year":"2020","unstructured":"Liu, Y., Liu, J., Yin, J., Li, G., Yu, H., & Wu, Q. 2020 . Cross-shard transaction processing in sharding blockchains . In\u00a0International Conference on Algorithms and Architectures for Parallel Processing. Springer, Cham,\u00a0324-339 . Liu, Y., Liu, J., Yin, J., Li, G., Yu, H., & Wu, Q. 2020. Cross-shard transaction processing in sharding blockchains. In\u00a0International Conference on Algorithms and Architectures for Parallel Processing. Springer, Cham,\u00a0324-339."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884764"}],"event":{"name":"ICBCT'22: The 2022 4th International Conference on Blockchain Technology","location":"Shanghai China","acronym":"ICBCT'22"},"container-title":["The 2022 4th International Conference on Blockchain Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532640.3532642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:04Z","timestamp":1750182664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":21,"alternative-id":["10.1145\/3532640.3532642","10.1145\/3532640"],"URL":"https:\/\/doi.org\/10.1145\/3532640.3532642","relation":{},"subject":[],"published":{"date-parts":[[2022,3,25]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}