{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:25Z","timestamp":1750220005736,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007)"],"award-info":[{"award-number":["61862007)"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Project of Guangxi University for Nationalities Graduate Education","award":["gxun-chxps202081"],"award-info":[{"award-number":["gxun-chxps202081"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,25]]},"DOI":"10.1145\/3532640.3532652","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T14:04:53Z","timestamp":1657202693000},"page":"88-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Consensus Algorithm of Proof-of-Stake Based on Credit Model"],"prefix":"10.1145","author":[{"given":"JIE","family":"WANG","sequence":"first","affiliation":[{"name":"Key Laboratory of Network Communication Engineering, Guangxi Minzu University, China"}]},{"given":"LINA","family":"GE","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Guangxi Minzu University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Satoshi Nakamoto. Bitcoin: a peer-to-peer electronic cash system[EB\/OL]. [2008-11-1]. https:\/\/bitcoin.org\/bitcoin.pdf.  Satoshi Nakamoto. Bitcoin: a peer-to-peer electronic cash system[EB\/OL]. [2008-11-1]. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"Ministry of Industry and Information Technology of China. White Paper on blockchain Technology and Application Development in China (2016) [EB\/OL].http:\/\/www.cbdforum.cn\/bcweb\/index\/article\/rsr-6.html","author":"Department of Information and Software Services","year":"2016","unstructured":"Department of Information and Software Services , Ministry of Industry and Information Technology of China. White Paper on blockchain Technology and Application Development in China (2016) [EB\/OL].http:\/\/www.cbdforum.cn\/bcweb\/index\/article\/rsr-6.html , 2016 -10-18. Department of Information and Software Services, Ministry of Industry and Information Technology of China. White Paper on blockchain Technology and Application Development in China (2016) [EB\/OL].http:\/\/www.cbdforum.cn\/bcweb\/index\/article\/rsr-6.html, 2016-10-18."},{"key":"e_1_3_2_1_3_1","volume-title":"An overview of blockchain technology: Architecture, consensus, and future trends.\u201dIn 2017 IEEE international congress on big data (BigData congress) IEEE: 557\u2013564","author":"Zibin Zheng","year":"2017","unstructured":"Zibin Zheng , Shaoan Xie, Hongning Dai , Xiangping Chen, and Huaimin Wang . ( 2017 ) \u201c An overview of blockchain technology: Architecture, consensus, and future trends.\u201dIn 2017 IEEE international congress on big data (BigData congress) IEEE: 557\u2013564 Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. (2017) \u201cAn overview of blockchain technology: Architecture, consensus, and future trends.\u201dIn 2017 IEEE international congress on big data (BigData congress) IEEE: 557\u2013564"},{"key":"e_1_3_2_1_4_1","volume-title":"Blockchain and cryptocurrencies: Model, techniques, and applications","author":"Yong Yuan","year":"2018","unstructured":"Yong Yuan , Fei-Yue Wang ( 2018 ) \u201c Blockchain and cryptocurrencies: Model, techniques, and applications .\u201dIEEE Transactions on Systems, Man, and Cybernetics: Systems 48(9): 1421\u20131428. Yong Yuan, Fei-Yue Wang (2018) \u201cBlockchain and cryptocurrencies: Model, techniques, and applications.\u201dIEEE Transactions on Systems, Man, and Cybernetics: Systems48(9): 1421\u20131428."},{"key":"e_1_3_2_1_5_1","volume-title":"Symmetry11(10): 1198.","author":"Leila Ismail","year":"2019","unstructured":"Leila Ismail , Huned Materwala ( 2019 ) \u201c A review of blockchain architecture and consensus protocols: Use cases, challenges, and solutions .\u201d Symmetry11(10): 1198. Leila Ismail, Huned Materwala (2019) \u201cA review of blockchain architecture and consensus protocols: Use cases, challenges, and solutions.\u201d Symmetry11(10): 1198."},{"key":"e_1_3_2_1_6_1","volume-title":"BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme.\u201dComputer Communications161: 28\u201340","author":"Yue Wang","year":"2020","unstructured":"Yue Wang , Jiguo Yu, Biwei Yan , Guijuan Wang, and Zhiguang Shan . ( 2020 ) \u201c BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme.\u201dComputer Communications161: 28\u201340 . Yue Wang, Jiguo Yu, Biwei Yan, Guijuan Wang, and Zhiguang Shan. (2020) \u201cBSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme.\u201dComputer Communications161: 28\u201340."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"e_1_3_2_1_8_1","first-page":"139","article-title":"via processing or combatting junk mail[C]\/\/Proceedings of Annual International Cryptology Conference.Berlin, Heidelberg","volume":"1992","author":"Dwork C","unstructured":"Dwork C , Naor M. Pricing via processing or combatting junk mail[C]\/\/Proceedings of Annual International Cryptology Conference.Berlin, Heidelberg : Springer , 1992 : 139 - 147 . Dwork C, Naor M.Pricing via processing or combatting junk mail[C]\/\/Proceedings of Annual International Cryptology Conference.Berlin, Heidelberg:Springer, 1992: 139-147.","journal-title":"Springer"},{"key":"e_1_3_2_1_9_1","volume-title":"The sybil attack[C]\/\/Proceedings of International Workshop on Peer-to-Peer Systems.Berlin","author":"Douceur J R","year":"2002","unstructured":"Douceur J R . The sybil attack[C]\/\/Proceedings of International Workshop on Peer-to-Peer Systems.Berlin , Heidelberg : Springer , 2002 : 251-260 Douceur J R. The sybil attack[C]\/\/Proceedings of International Workshop on Peer-to-Peer Systems.Berlin, Heidelberg:Springer, 2002:251-260"},{"key":"e_1_3_2_1_10_1","unstructured":"SUNNY K SCOTT N. PPcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake [EB\/OL]. https:\/\/decred.org\/research\/king2012.pdf 2012-8-19.  SUNNY K SCOTT N. PPcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake [EB\/OL]. https:\/\/decred.org\/research\/king2012.pdf 2012-8-19."},{"volume-title":"Delegated Proof of Stake [EB\/OL]. https:\/\/how.bitshares.works\/en\/master\/technology\/dpos.html","year":"2018","key":"e_1_3_2_1_11_1","unstructured":"LARIMER D. Delegated Proof of Stake [EB\/OL]. https:\/\/how.bitshares.works\/en\/master\/technology\/dpos.html , 2018 -8-29. LARIMER D. Delegated Proof of Stake [EB\/OL]. https:\/\/how.bitshares.works\/en\/master\/technology\/dpos.html, 2018-8-29."},{"key":"e_1_3_2_1_12_1","first-page":"357","volume-title":"37th Annual International Cryptology Conference Annual International Cryptology Conference, August 20\u201324, 2017","author":"Ouroboros","year":"2017","unstructured":"KIAYIAS A, RUSSELL A, DAVID B, Ouroboros : A Provably ecure Proof-of-Stake Blockchain Protocol[C]\/\/ Springer . 37th Annual International Cryptology Conference Annual International Cryptology Conference, August 20\u201324, 2017 , Santa Barbara, CA, USA. Cham : Springer, 2017 : 357 - 388 . KIAYIAS A, RUSSELL A, DAVID B, Ouroboros: A Provably ecure Proof-of-Stake Blockchain Protocol[C]\/\/ Springer. 37th Annual International Cryptology Conference Annual International Cryptology Conference, August 20\u201324, 2017, Santa Barbara, CA, USA. Cham: Springer, 2017: 357-388."},{"key":"e_1_3_2_1_13_1","first-page":"48","article-title":"Improved scheme of delegated Proof-of-Stake consensus mechanism","volume":"56","author":"Yaoyao FU, LI","year":"2020","unstructured":"Yaoyao FU, LI Sheng'en . Improved scheme of delegated Proof-of-Stake consensus mechanism . Computer Engineering and Applications , 2020 , 56 )19(: 48 - 54 . Yaoyao FU, LI Sheng'en. Improved scheme of delegated Proof-of-Stake consensus mechanism. Computer Engineering and Applications, 2020, 56)19(:48-54.","journal-title":"Computer Engineering and Applications"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.04.109"},{"key":"e_1_3_2_1_15_1","volume-title":"The Sleepy Model of Consensus[C]\/\/ International Conference on the Theory and Application of Cryptology and Information Security","author":"Pass R","year":"2017","unstructured":"Pass R , Shi E. The Sleepy Model of Consensus[C]\/\/ International Conference on the Theory and Application of Cryptology and Information Security . Springer , Cham , 2017 . Pass R, Shi E. The Sleepy Model of Consensus[C]\/\/ International Conference on the Theory and Application of Cryptology and Information Security. Springer, Cham, 2017."},{"key":"e_1_3_2_1_16_1","volume-title":"Cryptocurrencies without Proof of Work[C]\/\/ International Conference on Financial Cryptography & Data Security","author":"Bentov I","year":"2016","unstructured":"Bentov I , Gabizon A , Mizrahi A. Cryptocurrencies without Proof of Work[C]\/\/ International Conference on Financial Cryptography & Data Security . Springer , Berlin, Heidelberg , 2016 . Bentov I, Gabizon A, Mizrahi A. Cryptocurrencies without Proof of Work[C]\/\/ International Conference on Financial Cryptography & Data Security. Springer, Berlin, Heidelberg, 2016."},{"volume-title":"A Byzantine Fault Tolerance Algorithm for Blockchain [EB\/OL]. https:\/\/docs.neo.org\/en-us\/basic\/consensus\/whitepaper.html","year":"2019","key":"e_1_3_2_1_17_1","unstructured":"ZHANG E. A Byzantine Fault Tolerance Algorithm for Blockchain [EB\/OL]. https:\/\/docs.neo.org\/en-us\/basic\/consensus\/whitepaper.html , 2019 -1-7. ZHANG E. A Byzantine Fault Tolerance Algorithm for Blockchain [EB\/OL]. https:\/\/docs.neo.org\/en-us\/basic\/consensus\/whitepaper.html, 2019-1-7."},{"key":"e_1_3_2_1_18_1","unstructured":"Ontology Project. Consensus mechanism [EB \/OL]]. [2020-06-14]. https: \/ \/docs. ont. io \/ontology-elements\/ consensus-mechanism.  Ontology Project. Consensus mechanism [EB \/OL]]. [2020-06-14]. https: \/ \/docs. ont. io \/ontology-elements\/ consensus-mechanism."},{"key":"e_1_3_2_1_19_1","volume-title":"LaKSA: A Probabilistic Proof-of-Stake Protocol[C]\/\/ Network and Distributed System Security Symposium","author":"Reijsbergen D","year":"2021","unstructured":"Reijsbergen D , Szalachowski P , Ke J , LaKSA: A Probabilistic Proof-of-Stake Protocol[C]\/\/ Network and Distributed System Security Symposium . 2021 . Reijsbergen D, Szalachowski P, Ke J, LaKSA: A Probabilistic Proof-of-Stake Protocol[C]\/\/ Network and Distributed System Security Symposium. 2021."},{"key":"e_1_3_2_1_20_1","first-page":"530","author":"Wang Y","year":"2020","unstructured":"Wang Y , Yang G , Bracciali A , Incentive Compatible and Anti-Compounding of Wealth in Proof-of-Stake[J] . Information Sciences , 2020 , 530 . Wang Y, Yang G, Bracciali A, Incentive Compatible and Anti-Compounding of Wealth in Proof-of-Stake[J]. Information Sciences, 2020, 530.","journal-title":"Information Sciences"}],"event":{"name":"ICBCT'22: The 2022 4th International Conference on Blockchain Technology","acronym":"ICBCT'22","location":"Shanghai China"},"container-title":["The 2022 4th International Conference on Blockchain Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532640.3532652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:04Z","timestamp":1750182664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532652"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":20,"alternative-id":["10.1145\/3532640.3532652","10.1145\/3532640"],"URL":"https:\/\/doi.org\/10.1145\/3532640.3532652","relation":{},"subject":[],"published":{"date-parts":[[2022,3,25]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}